This is the Linux app named SCAP Security Guide whose latest release can be downloaded as scap-security-guide-0.1.70.zip. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named SCAP Security Guide with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start the OnWorks Linux online or Windows online emulator or MACOS online emulator from this website.
- 5. From the OnWorks Linux OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application, install it and run it.
SCREENSHOTS:
SCAP Security Guide
DESCRIPTION:
The purpose of this project is to create security policy content for various platforms, Red Hat Enterprise Linux, Fedora, Ubuntu, Debian, SUSE Linux Enterprise Server (SLES), as well as products, Firefox, Chromium, JRE. We aim to make it as easy as possible to write new and maintain existing security content in all the commonly used formats. "SCAP content" refers to documents in the XCCDF, OVAL and Source DataStream formats. These documents can be presented in different forms and by different organizations to meet their security automation and technical implementation needs. For general use, we recommend Source DataStreams because they contain all the data you need to evaluate and put machines into compliance. The datastreams are part of our release ZIP archives. "Ansible content" refers to Ansible playbooks generated from security profiles. These can be used both in check-mode to evaluate compliance, as well as run-mode to put machines into compliance.
Features
- The build system combines the easy-to-edit YAML rule files with OVAL checks
- We use an OpenControl-inspired YAML rule format for input
- Templating is provided at every step to avoid boilerplate
- Security identifiers (CCE, NIST ID, STIG, ...) appear in all of our output formats but are all sourced from the YAML rule files
- Our security content can be used to scan bare-metal machines, virtual machines, virtual machine images
- We use platform checks to detect whether we should or should not evaluate some of the rules
Programming Language
Unix Shell
Categories
This is an application that can also be fetched from https://sourceforge.net/projects/scap-security-guide.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.