This was a script I created to facilitate in updating STIG references within SCAP content.
It was intended to address the challenge of keeping the SCAP content in alignment with current STIG content. In general, the script parses through each STIG requirement in the STIG overlay file, finds the associated rule id, then updates the STIG overlay file and the rule id references with the following data from the STIG: - Requirement Title - CCI - CCE - Severity - SVKey - VRelease - IA Controls This helps reduce allot of the administrative overhead so that more focus can be directed to the actual content. On Wed, 2016-02-17 at 14:14 +0000, Mike Kuhnkey wrote: > Has someone checked out the script in DISA's STIG Release? > ->U_Red_Hat_Enterprise_Linux_7_V1R0-1_Manual_STIG/Test/stig_refs.sh > I find the instructions alarming on how to use the script. > It is to be placed in the RHEL 5 folder (scap-security-guide project) and > run..... > ....am I off in left field here? > What happens during make rhel7-dist -> content? > Is this where/how the DRAFT was created? > -- > SCAP Security Guide mailing list > [email protected] > https://lists.fedorahosted.org/admin/lists/[email protected] > https://github.com/OpenSCAP/scap-security-guide/ > -- Best regards, Trey Henefield, CISSP Senior IAVA Engineer Ultra Electronics Advanced Tactical Systems, Inc. 4101 Smith School Road Building IV, Suite 100 Austin, TX 78744 USA [email protected] Tel: +1 512 327 6795 ext. 647 Fax: +1 512 327 8043 Mobile: +1 512 541 6450 www.ultra-ats.com Disclaimer The information contained in this communication from [email protected] sent at 2016-02-17 10:06:11 is confidential and may be legally privileged. It is intended solely for use by [email protected] and others authorized to receive it. If you are not [email protected] you are hereby notified that any disclosure, copying, distribution or taking action in reliance of the contents of this information is strictly prohibited and may be unlawful.
-- SCAP Security Guide mailing list [email protected] https://lists.fedorahosted.org/admin/lists/[email protected] https://github.com/OpenSCAP/scap-security-guide/
