Have requested public publication of the CKL schema. There is one, it's
just not public for some reason.

On Fri, Nov 30, 2018 at 8:45 PM Trevor Vaughan <tvaug...@onyxpoint.com>
wrote:

> Yeah, the material could easily be OCIL.
>
> An XSLT layer could be added to convert from OCIL and OVAL Reports to the
> CKL format. That would be a vast improvement over the 'just wing it'
> approach that we have now.
>
> Trevor
>
> On Thu, Nov 29, 2018 at 9:22 PM Shawn Wells <sh...@redhat.com> wrote:
>
>>
>>
>> On 11/29/18 5:54 PM, Trevor Vaughan wrote:
>> > The issue is less the automation (that's easy) and more that it isn't
>> > actually a codified standard.
>>
>> Could these be expressed as OCIL?
>>
>>
>> https://csrc.nist.gov/projects/security-content-automation-protocol/specifications/ocil
>>
>> For example, here's the codified OCIL for manual inspection to make sure
>> /var/log/httpd is 0700 or less permissive :
>> >         <ns0:questionnaire
>> > id="ocil:ssg-dir_perms_var_log_httpd_ocil:questionnaire:1">
>> >           <ns0:title>Set Permissions on the /var/log/httpd/
>> > Directory</ns0:title>
>> >           <ns0:actions>
>> >
>> <ns0:test_action_ref>ocil:ssg-dir_perms_var_log_httpd_action:testaction:1</ns0:test_action_ref>
>> >           </ns0:actions>
>> >         </ns0:questionnaire>
>> > .....
>> >         <ns0:boolean_question_test_action
>> > id="ocil:ssg-dir_perms_var_log_httpd_action:testaction:1"
>> > question_ref="ocil:ssg-dir_perms_var_log_httpd_question:question:1">
>> >           <ns0:when_true>
>> >             <ns0:result>PASS</ns0:result>
>> >           </ns0:when_true>
>> >           <ns0:when_false>
>> >             <ns0:result>FAIL</ns0:result>
>> >           </ns0:when_false>
>> >         </ns0:boolean_question_test_action>
>> > ..........
>> >         <ns0:boolean_question
>> > id="ocil:ssg-dir_perms_var_log_httpd_question:question:1">
>> >           <ns0:question_text>Run the following command to check the
>> > mode of the httpd log
>> > directory:
>> > $ ls -l /var/log/ | grep httpd
>> > Log directory must be mode 0700 or less permissive.
>> >             Is it the case that it is more permissive?
>> >             </ns0:question_text>
>> >         </ns0:boolean_question>
>>
>> If these manual checks can be coded in OCIL they can be included in
>> SCAP-based reports natively.
>>
>> Also means we could create an organizational answers file, such as "Do
>> you do backups?" that Tom mentioned earlier in the thread.
>> Organizational answers could automatically be incorporated into the
>> results files.
>>
>>
>>
>> >
>> > I'll hop onto the STIG feedback space on SoftwareForge and see if they
>> > have a schema anywhere. The last time I asked, there wasn't one, but
>> > that was quite some time ago.
>> Thanks Trevor!
>> _______________________________________________
>> scap-security-guide mailing list --
>> scap-security-guide@lists.fedorahosted.org
>> To unsubscribe send an email to
>> scap-security-guide-le...@lists.fedorahosted.org
>> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>> List Archives:
>> https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
>>
>
>
> --
> Trevor Vaughan
> Vice President, Onyx Point, Inc
> (410) 541-6699 x788
>
> -- This account not approved for unencrypted proprietary information --
>


-- 
Trevor Vaughan
Vice President, Onyx Point, Inc
(410) 541-6699 x788

-- This account not approved for unencrypted proprietary information --
_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org

Reply via email to