Given an incident response workstation configured with the latest SCAP Compliance Checker, a current Open Vulnerability and Assessment Language (OVAL) file, and a copy of the configuration file for the device to be tested.
Operator Note: SCAP scanning is primarily used for configuration compliance (STIG, CIS Benchmarks). It does not find vulnerabilities in software but verifies hardening status.
Operator Note: Not all SCAP benchmarks apply to every system. Select benchmarks carefully based on OS and system classification (e.g., MAC-1_Sensitive).
All configuration vulnerabilities present in the device configuration file are found.
Operator Note: The scan report is the authoritative record for compliance and should be saved with incident and assessment records.
Operator Note: Scan results will typically include XCCDF and HTML formatted outputs. Review HTML version for readability.
Operator Note: Update SCAP content regularly to align with evolving DISA STIGs and CIS Benchmarks.
SCC 5.3 GUI Scanner
Cisco OVAL content
OVAL Adoption Program
The Security Content Automation Protocol
Platform | Tool | Purpose |
---|---|---|
Windows/Linux/macOS | SCAP Compliance Checker (SCC) | Primary GUI scanning tool for DISA STIG and USGCB |
Linux | OpenSCAP | Open-source SCAP CLI/GUI scanner |
Universal | CIS-CAT Lite | Lightweight configuration compliance scanner (optional alternative) |
oscap xccdf eval --profile stig --results scan-results.xml --report scan-report.html /path/to/benchmark-xccdf.xml
oscap-ssh username@remote-host 22 xccdf eval --profile stig --report remote-scan.html /usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml
Operator Note: OpenSCAP is best suited for Linux environments. SCC is better suited for Windows and enterprise mixed environments.
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enriched SCAP/OVAL tools usage, CLI examples, and operator guidance | Leo |