SCAP Validation Report

Validation Details

Target:
file:/root/ssg-rhel8-ds-1.3.xml
Start:
April 29th, 2019 11:25:59 GMT-4
End:
April 29th, 2019 11:33:02 GMT-4
Type:
SCAP 1.3 Source
Version:
scapval-1.3.2
Notes:
  • Validation occurred while in OFFLINE mode.

Validation Overview

Validation Summary

Total Requirements:
65
Applicable Requirements:
56
Requirements Passed:
54 of 54
Requirements Failed:
0 of 54
Tests Failed:
2417
Overall Result:
Pass

Validation Result Summary

Requirement # Summary Result
SRC-10 The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:description> element SHALL be provided. Each instance SHALL contain a text value that describes the purpose of the containing element. Pass
SRC-118 The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the OVAL checking system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://oval.mitre.org/XMLSchema/oval-definitions-5 ". Pass
SRC-15 Each CPE name [CPE-N] in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document SHALL match at least one CPE entry in a dictionary referenced by the data stream. A match is considered an EQUAL or SUPERSET result when matching the CPE name to a dictionary entry, as defined in the CPE Name Matching specification [CPE-M]. Only non-deprecated names SHOULD be used. Pass
SRC-169 An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The source data stream SHALL include the OVAL source data stream component referenced by the patches up-to-date rule, which contains one or more OVAL patch class definitions. Pass
SRC-171 An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~Each <xccdf:check-content-ref> element SHALL omit the @name attribute. Pass
SRC-175 The following requirements and recommendations apply to the <xccdf:check> element:~At least one <xccdf:check-content-ref> element SHALL be provided for each <xccdf:check> Pass
SRC-2 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:Benchmark> element SHALL have an @xml:lang attribute. Pass
SRC-207 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~If an OVAL compliance class definition maps to one or more CCE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: ~<oval-def:reference source="http://cce.mitre.org" ref_id="CCE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cce.mitre.org" (preferred method) or "CCE". Warning
SRC-208 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and compliance classes. Pass
SRC-209 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~If an OVAL inventory class definition maps to one or more CPE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: _x000B__x000B_<oval-def:reference source="http://cpe.mitre.org" ref_id="CPE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cpe.mitre.org" (preferred method) or "CPE". Warning
SRC-210 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~Definitions that are directly or indirectly extended SHALL be limited to the inventory class. Pass
SRC-213 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and patch classes. Pass
SRC-214 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~If an OVAL vulnerability class definition maps to one or more CVE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format:_x000B__x000B_<oval-def:reference source="http://cve.mitre.org" ref_id="CVE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cve.mitre.org" (preferred method) or "CVE". Pass
SRC-215 Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and vulnerability classes. Pass
SRC-216 Within the SCAP component specifications, certain constructs can be deprecated. SCAP content consumers SHALL support all deprecated constructs, unless specifically noted in the annex, because they are still valid within SCAP 1.3 and supported legacy SCAP versions. This requirement ensures that legacy SCAP content making use of these deprecated constructs continues to be supported.~Content consumers supporting OVAL SHALL support OVAL Definition documents written against all versions of OVAL component specifications listed in the annex. Pass
SRC-236 The SCAP source data stream component that SHALL be included for compliance checking is the XCCDF benchmark, which expresses the checklist. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL compliance definition. This definition SHALL be contained in an OVAL component, which holds definitions of compliance checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL compliance class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting configuration information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component.~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its compliance activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3. Pass
SRC-242 The SCAP source data stream component that SHALL be included for vulnerability scanning is the XCCDF benchmark, which expresses the checklist of the flaws to be checked for. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL vulnerability definition. This definition SHALL be contained in an OVAL component, which holds definitions of vulnerability checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL vulnerability class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect. An example of OCIL use is to give step-by-step directions for manually examining a system for a vulnerability that cannot be detected with OVAL. In such a case, OCIL is used for capturing information collected using manual examination. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component. ~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its vulnerability scanning activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3. Pass
SRC-248 The SCAP source data stream component that SHALL be included for inventory scanning is the XCCDF benchmark, which references the inventory checks and captures the results. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL inventory definition. This definition SHALL be contained in an OVAL component, which holds definitions of technical procedures for determining whether or not a specific target asset has software (product, platform, malware, etc.) of interest. An XCCDF benchmark's rules MAY reference one or more OVAL inventory class definitions in an OVAL component. ~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting inventory information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component. Pass
SRC-25 The following requirements and recommendations apply to the <xccdf:check> element:~The <xccdf:check-content> element SHALL NOT be used to embed check content directly into XCCDF content. Pass
SRC-251 Each <xccdf:Rule> element SHALL include an <xccdf:ident> element containing a CVE, CCE, or CPE identifier reference if an appropriate identifier exists. The meaning of the identifier SHALL be consistent with the recommendation implemented by the <xccdf:Rule> element. If the rule references an OVAL Definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s) if an appropriate identifier exists and if that OVAL Definition is the only input to the rule's final result. Warning
SRC-257 An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers. Identifiers from previous revisions of CCE or CPE MAY also be specified following the SCAP identifiers. Pass
SRC-262 Each XCCDF benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL component. Pass
SRC-265 Each XCCDF benchmark SHALL have at least one rule that references either an OVAL vulnerability class definition in an OVAL component or an OCIL questionnaire in an OCIL component. Pass
SRC-276 Use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, use of the <xccdf:complex-choice> element SHALL NOT be allowed. Pass
SRC-282 Each <dsig:Signature> element SHALL sign only one data stream Not Applicable
SRC-284 A <dsig:Manifest> element SHALL be included within the <dsig:Signature> element as a <dsig:Object> element. The <dsig:Manifest> element SHALL have a <dsig:Reference> element for each local component referenced by the data stream being signed. External components MAY be omitted from the <dsig:Manifest> element. Each <dsig:Reference> element referencing a <ds:component> or <ds:extended-component> element SHALL point to the component being signed by identifying the component in the @URI attribute using "#" + @Id of the component. Not Applicable
SRC-285 A <dsig:SignatureProperties> element SHALL be included within the <dsig:Signature> element as a <dsig:Object> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD] Not Applicable
SRC-286 The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <ds:data-stream> element being signed. The <ds:data-stream> element SHALL be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream> Not Applicable
SRC-287 The second <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element. Not Applicable
SRC-288 The third <dsig:Reference> element SHALL be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element SHALL be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest> Not Applicable
SRC-290 Cryptographic key information SHOULD be provided in the <dsig:Signature> element through use of the <dsig:KeyInfo> subelement. Not Applicable
SRC-3 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:version> element and the @id attribute SHALL be used together to uniquely identify all revisions of a benchmark.~Multiple revisions of a single benchmark SHOULD have the same @id attribute value and different <xccdf:version> element values, so that someone who reviews the revisions can readily identify them as multiple versions of a single benchmark. ~Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined. ~The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined. Warning
SRC-30 If the XCCDF benchmark component references any CPE names, then the SCAP source data stream SHALL include a CPE component, which specifies the products or platforms of interest, and SHALL include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest. Pass
SRC-31 When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either SHALL contain a "#" + @id of a <ds:component-ref> element or SHALL be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute SHALL ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution. Pass
SRC-324 The @use-case attribute in the <ds:data-stream> element SHALL be set to "CONFIGURATION". Pass
SRC-329 The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all associated Schematron schemas. Pass
SRC-33 If the XCCDF benchmark component references any CPE names, then the SCAP source data stream SHALL include a CPE component, which specifies the products or platforms of interest, and SHALL include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest. Pass
SRC-330 If applicable, each component SHALL validate against its associated Schematron schema. For the SCAP source data stream collection, it SHALL validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element's @schematron-version attribute, and it SHOULD also validate against the latest Schematron rules. Pass
SRC-331 When referencing a CVE, CCE, or CPE identifier, an <xccdf:Rule> element SHALL have a purpose consistent with one of the rows in ~Table 17. Based on the purpose of the <xccdf:Rule> element, the <xccdf:Rule> SHALL define its <xccdf:ident> element's @system attribute using the corresponding value from Table 17. Also, if the <xccdf:Rule> element references an OVAL Definition, it SHALL reference an OVAL Definition of the specified class. ~~Table 17: <xccdf:Rule> and <xccdf:ident> Element Values~Purpose of the <xccdf:Rule>~OVAL Definition Class~Identifier Type~Value for <xccdf:ident> @system attribute~~Check compliance with a configuration setting~compliance~CCE~http://cce.mitre.org~~Perform a software inventory check ~inventory~CPE~http://cpe.mitre.org~~Check for a software flaw vulnerability~vulnerability~CVE~http://cve.mitre.org~~ Pass
SRC-333 Any single data stream in a data stream collection SHALL NOT reference any component in the collection more than once. Pass
SRC-339 XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE]. Pass
SRC-341 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @update attribute of the <xccdf:version> element SHOULD be used for a URI that specifies where updates to the benchmark can be obtained. Pass
SRC-343 Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed. Pass
SRC-345 The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OVAL source data stream component using the <ds:component-ref> approach defined above. Pass
SRC-346 The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. Pass
SRC-348 The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OCIL source data stream component using the <ds:component-ref> approach defined above. Pass
SRC-349 The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute. Pass
SRC-377 When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL patch class definition, the following approach SHALL be used:~The source data stream SHALL include the OVAL source data stream component referenced by the patches up-to-date rule, which contains one or more OVAL patch class definitions, and MAY contain other class definitions. Pass
SRC-379 When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition, the following approach SHALL be used:~Each <xccdf:check-content-ref> element SHALL refer to the single OVAL definition performing the patches up-to-date check. Pass
SRC-38 The type and value binding of the specified <xccdf:Value> is constrained to match that lexical representation of the indicated OVAL Variable data type. Table 18 summarizes the constraints regarding data type usage. Additional information regarding OVAL data types can be found in the OVAL Language documentation and the XCCDF specification [XCCDF]. Additional information on OVAL data types may also be added to Section 4 of the SCAP 1.3 annex document, NIST SP 800-126A.~Table 18: XCCDF-OVAL Data Export Matching Constraints~OVAL Variable Data Type~Matching XCCDF Data Type~ ~int~number~~float~number~~boolean~boolean~~string, evr_string, version, ios_version, fileset_revision, binary~string~~ Pass
SRC-4 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @style attribute SHOULD have the value "SCAP_1.3". Warning
SRC-5 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:status> element SHALL indicate the current status of the benchmark document. The associated text value SHALL be "draft" for documents released in public draft state and "accepted" for documents that have been officially released by an organization. The @date attribute SHALL be populated with the date of the status change. Additional <xccdf:status> elements MAY be included to indicate historic status transitions. Pass
SRC-72 If a <cpe2_dict:cpe-item> element contained in a CPE component references an OVAL inventory class definition, then that definition SHALL be resolved by an @href attribute referencing an OVAL source data stream component in the same data stream. Pass
SRC-74 SCAP content referencing a configuration setting SHALL use the official CCE identifier if a CCE entry for a particular configuration setting exists in the official CCE list. Pass
SRC-8 The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:metadata> element SHALL be provided and SHALL, at minimum, contain the Dublin Core [DCES] terms from Table 16. If provided, additional Dublin Core terms SHALL follow the required terms within the element sequence.~Table 16: Use of Dublin Core Terms in <xccdf:metadata>~Dublin Core Term~Description of Use~~<dc:creator>~The person, organization, and/or service that created the benchmark~~<dc:publisher>~The person, organization, and/or service that published the benchmark~~<dc:contributor>~The person, organization, and/or service that contributed to the creation of the benchmark~~<dc:source>~An identifier that indicates the organizational context of the benchmark's @id attribute. An organizationally specific URI SHOULD be used.~~ Pass
SRC-9 The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:title> element SHALL be provided. Each instance SHALL contain a text value that briefly indicates the purpose of the containing element. Pass
A-15 Check for unused OVAL definitions. Pass
A-16 CCE number is expected, but missing as a reference. Pass
A-17 CCE number is in an invalid format or the check-digit does not match. It should be of format CCE-XXXX-X or CCE-XXXXX-X where each X is a digit, and the final X is a check-digit. Pass
A-18 The attribute @content-type on <scap:check-system-content> must match the content as such: OVAL_COMPLIANCE, OVAL_PATCH, CPE_INVENTORY, OVAL_VULNERABILITY must contain an <oval-def:oval_definitions> element; OCIL_QUESTIONS must contain an <ocil:ocil> element. Not Applicable
A-21 The OVAL test type is not checked in the NIST SCAP Validation Program. Informational
A-22 A custom XPath function is not available. Informational
A-25 This requirement for unique xccdf:Profile @id cannot be handled by the XCCDF schema in SCAP source data streams. There is no direct reference to the req in 800-126r2 but this still needs to be checked. Pass
A-26 Explicitly specify all default attributes when creating content that will be signed. Warning
A-27 Check for @href and @id-ref value of <cpe:check-fact-ref> element Not Applicable

Validation Result Details

RES-126

Not Tested

Requirement

Content consumers SHALL apply the mapping illustrated in Table 23 when deriving <xccdf:check> results from OVAL Definition processing. The corresponding result value SHALL be recorded based on the @class attribute of the OVAL Definition and the @negate attribute of the <xccdf:check> element where applicable. ~Table 23: Deriving XCCDF Check Results from OVAL Definition Results~OVAL Definition Result~XCCDF Check Result~(@negate is set to "false")~XCCDF Check Result~(@negate is set to "true")~~error~error~error~~unknown~unknown~unknown~~not applicable~notapplicable~notapplicable~~not evaluated~notchecked~notchecked~~Definition Class~Definition Result~~compliance~true~~vulnerability~false~~inventory~true~~patch~false~~~pass~fail~~Definition Class~Definition Result~~compliance~False~~vulnerability~true~~inventory~false~~patch~true~~~fail~pass~~

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
RES-126-1 If the <xccdf:result> value for a <xccdf:rule-result> is 'error', 'unknown', 'notapplicable', or 'notchecked', then the result of at least one OVAL definition referenced by that rule SHALL be 'error', 'unknown', 'not applicable', or 'not evaluated', respectively. If the <xccdf:result> value is 'fail' then the result of at least one of the OVAL definitions referenced SHALL match the fail category as defined in the SCAP table. If the <xccdf:result> value is 'pass' then the result of all of the OVAL definitions referenced SHALL match the pass category as defined in the SCAP table. Not Tested
RES-126-2 The @class attribute of an OVAL definition used in a check cannot be found. scapval may not be able to properly verify OVAL result to XCCDF result mapping. If you have the source content containing the OVAL definition, try the -sourceds option to include it. Not Tested
RES-126-3 If the <xccdf:result> value for a <xccdf:rule-result> is 'notapplicable' and OVAL definitions apply, then the OVAL definition referenced by that rule is expected to be 'not applicable' or 'not evaluated'. Not Tested
RES-126-4 If OVAL results component contain multiple instances of the same OVAL definition, SCAPVal cannot verify the mappings between OVAL results to XCCDF results. Not Tested
RES-126-5 If <xccdf:check-content-ref> @name is not present, the <xccdf:Rule> referenced should also contain no @name reference and should not contain @multi-check="true". Not Tested

Derived Requirement Details

RES-126-1

If the <xccdf:result> value for a <xccdf:rule-result> is 'error', 'unknown', 'notapplicable', or 'notchecked', then the result of at least one OVAL definition referenced by that rule SHALL be 'error', 'unknown', 'not applicable', or 'not evaluated', respectively. If the <xccdf:result> value is 'fail' then the result of at least one of the OVAL definitions referenced SHALL match the fail category as defined in the SCAP table. If the <xccdf:result> value is 'pass' then the result of all of the OVAL definitions referenced SHALL match the pass category as defined in the SCAP table.

Not Tested

Derived Requirement

If the <xccdf:result> value for a <xccdf:rule-result> is 'error', 'unknown', 'notapplicable', or 'notchecked', then the result of at least one OVAL definition referenced by that rule SHALL be 'error', 'unknown', 'not applicable', or 'not evaluated', respectively. If the <xccdf:result> value is 'fail' then the result of at least one of the OVAL definitions referenced SHALL match the fail category as defined in the SCAP table. If the <xccdf:result> value is 'pass' then the result of all of the OVAL definitions referenced SHALL match the pass category as defined in the SCAP table.

RES-126-2

The @class attribute of an OVAL definition used in a check cannot be found. scapval may not be able to properly verify OVAL result to XCCDF result mapping. If you have the source content containing the OVAL definition, try the -sourceds option to include it.

Not Tested

Derived Requirement

The @class attribute of an OVAL definition used in a check cannot be found. scapval may not be able to properly verify OVAL result to XCCDF result mapping. If you have the source content containing the OVAL definition, try the -sourceds option to include it.

RES-126-3

If the <xccdf:result> value for a <xccdf:rule-result> is 'notapplicable' and OVAL definitions apply, then the OVAL definition referenced by that rule is expected to be 'not applicable' or 'not evaluated'.

Not Tested

Derived Requirement

If the <xccdf:result> value for a <xccdf:rule-result> is 'notapplicable' and OVAL definitions apply, then the OVAL definition referenced by that rule is expected to be 'not applicable' or 'not evaluated'.

RES-126-4

If OVAL results component contain multiple instances of the same OVAL definition, SCAPVal cannot verify the mappings between OVAL results to XCCDF results.

Not Tested

Derived Requirement

If OVAL results component contain multiple instances of the same OVAL definition, SCAPVal cannot verify the mappings between OVAL results to XCCDF results.

RES-126-5

If <xccdf:check-content-ref> @name is not present, the <xccdf:Rule> referenced should also contain no @name reference and should not contain @multi-check="true".

Not Tested

Derived Requirement

If <xccdf:check-content-ref> @name is not present, the <xccdf:Rule> referenced should also contain no @name reference and should not contain @multi-check="true".

RES-133

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~The @start-time and @end-time attributes SHALL be provided to indicate when the scan started and completed, respectively.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-133-1

The @start-time and @end-time attributes SHALL be provided to indicate when the scan started and completed, respectively.

Not Tested

Derived Requirement

The @start-time and @end-time attributes SHALL be provided to indicate when the scan started and completed, respectively.

RES-134

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~The @test-system attribute SHALL be provided, and it SHALL be a CPE name value indicating the product that was responsible for generating the results.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-134-1

The @test-system attribute SHALL be provided with a CPE Name value indicating the product that evaluated the checklist.

Not Tested

Derived Requirement

The @test-system attribute SHALL be provided with a CPE Name value indicating the product that evaluated the checklist.

RES-136

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~Each IP address(es) associated with the <xccdf:target> SHALL be enumerated using the <xccdf:target-address> element.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-136-1

The <xccdf:target> and <xccdf:target-address> elements SHALL be provided.

Not Tested

Derived Requirement

The <xccdf:target> and <xccdf:target-address> elements SHALL be provided.

RES-136-2

The <xccdf:target-address> SHALL contain an IP address

Not Tested

Derived Requirement

The <xccdf:target-address> SHALL contain an IP address

RES-137

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~Where applicable to the target system, each of the <xccdf:fact> elements in Table 22 SHALL be provided. Previous versions of SCAP required additional facts; these have been incorporated into the use of the Asset Identification specification, as discussed in Section 4.4.2.~~Table 22: XCCDF Fact Descriptions~XCCDF Fact~Description of Use~~urn:scap:fact:asset:identifier:ein~Equipment identification number or other inventory tag number~~urn:scap:fact:asset:identifier:guid~Globally unique identifier for the asset, if assigned~~urn:scap:fact:asset:environmental_information:owning_organization~Organization that tracks the asset on its inventory~~urn:scap:fact:asset:environmental_information:current_region~Geographic region where the asset is located~~urn:scap:fact:asset:environmental_information:administration_unit~Name of the organization that does system administration for the asset~~

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-137-1

Where applicable to the target system, each of the <xccdf:fact> elements in Table 22 SHALL be provided. Previous versions of SCAP required additional facts; these have been incorporated into the use of the Asset Identification specification, as discussed in Section 4.4.2.~~Table 22: XCCDF Fact Descriptions~XCCDF Fact~Description of Use~~urn:scap:fact:asset:identifier:ein~Equipment identification number or other inventory tag number~~urn:scap:fact:asset:identifier:guid~Globally unique identifier for the asset, if assigned~~urn:scap:fact:asset:environmental_information:owning_organization~Organization that tracks the asset on its inventory~~urn:scap:fact:asset:environmental_information:current_region~Geographic region where the asset is located~~urn:scap:fact:asset:environmental_information:administration_unit~Name of the organization that does system administration for the asset

Not Tested

Derived Requirement

Where applicable to the target system, each of the <xccdf:fact> elements in Table 22 SHALL be provided. Previous versions of SCAP required additional facts; these have been incorporated into the use of the Asset Identification specification, as discussed in Section 4.4.2.~~Table 22: XCCDF Fact Descriptions~XCCDF Fact~Description of Use~~urn:scap:fact:asset:identifier:ein~Equipment identification number or other inventory tag number~~urn:scap:fact:asset:identifier:guid~Globally unique identifier for the asset, if assigned~~urn:scap:fact:asset:environmental_information:owning_organization~Organization that tracks the asset on its inventory~~urn:scap:fact:asset:environmental_information:current_region~Geographic region where the asset is located~~urn:scap:fact:asset:environmental_information:administration_unit~Name of the organization that does system administration for the asset

RES-138

Not Tested

Requirement

If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions.

Section 4.5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
RES-138-1 If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions. Not Tested

Derived Requirement Details

RES-138-1

If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions.

Not Tested

Derived Requirement

If the <xccdf:ident> element is included, for tracking purposes it is important that produced XCCDF results have specific meanings. If an <xccdf:ident> element is present and it identifies a CVE, CCE, or CPE entry, then an <xccdf:rule-result> of "pass" SHALL indicate that the check content evaluated within the rule complied with one of the following:~For a CVE entry, the target platform satisfies all the conditions of the XCCDF rule and is unaffected by the vulnerability or exposure referenced by the CVE.~For a CCE entry, the target platform complies with the configuration setting guidance expressed in the XCCDF rule.~For a CPE entry, the target platform was identified on the system.~It is important that these interpretations of <xccdf:ident> elements be preserved. For example, consider two policy recommendations. One is that a particular piece of software be installed, and the second that another piece of software not be installed. Both rules for these policy recommendations could use the same CPE entry in their <xccdf:ident> elements. However, because the interpretation of a CPE entry is that a "pass" result indicates software was installed, the second policy recommendation's rule would violate this. This can be corrected by using the @con:negate attribute, a Boolean attribute that inverts the rule result. The second rule could check for the software being installed and then negate that result, thus giving a result consistent in meaning with the first rule. For rules that cannot have their interpretations preserved through the use of the @con:negate attribute, an alternative is to have a CCE entry corresponding to the recommendation. Rules that do not use <xccdf:ident> elements have no such restrictions.

RES-179

Not Tested

Requirement

data results SHALL be expressed as Single Machine Without System Characteristics, Single Machine With System Characteristics, or Single Machine With Thin Results

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-179-1

The <oval-res:directives> element SHALL be:<definition_true content="full" reported="true"/>~<definition_false content="full" reported="true"/>~<definition_unknown content="full" reported="true"/>~<definition_error content="full" reported="true"/>~<definition_not_evaluated content="full" reported="true"/>~<definition_not_applicable content="full" reported="true"/> or <definition_true reported="true"/>~<definition_false reported="true"/>~<definition_unknown reported="true"/>~<definition_error reported="true"/>~<definition_not_evaluated reported="true"/>~<definition_not_applicable reported="true"/> or <definition_true content="thin" reported="true"/>~<definition_false content="thin" reported="true"/>~<definition_unknown content="thin" reported="true"/>~<definition_error content="thin" reported="true"/>~<definition_not_evaluated content="thin" reported="true"/>~<definition_not_applicable content="thin" reported="true"/>

Not Tested

Derived Requirement

The <oval-res:directives> element SHALL be:<definition_true content="full" reported="true"/>~<definition_false content="full" reported="true"/>~<definition_unknown content="full" reported="true"/>~<definition_error content="full" reported="true"/>~<definition_not_evaluated content="full" reported="true"/>~<definition_not_applicable content="full" reported="true"/> or <definition_true reported="true"/>~<definition_false reported="true"/>~<definition_unknown reported="true"/>~<definition_error reported="true"/>~<definition_not_evaluated reported="true"/>~<definition_not_applicable reported="true"/> or <definition_true content="thin" reported="true"/>~<definition_false content="thin" reported="true"/>~<definition_unknown content="thin" reported="true"/>~<definition_error content="thin" reported="true"/>~<definition_not_evaluated content="thin" reported="true"/>~<definition_not_applicable content="thin" reported="true"/>

RES-180

Not Tested

Requirement

Single Machine Without System Characteristics – A single result file that includes the results of all OVAL Definitions evaluated and "full" results types as described in the <oval-res:ContentEnumeration> element, without system characteristics. ~For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="full" reported="true"/>~ <oval-res:definition_false content="full" reported="true"/>~ <oval-res:definition_unknown content="full" reported="true"/>~ <oval-res:definition_error content="full" reported="true"/>~ <oval-res:definition_not_evaluated content="full" reported="true"/>~ <oval-res:definition_not_applicable content="full" reported="true"/>~</oval-res:directives>~~When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL NOT be provided.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-180-1

When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL NOT be provided. There is nothing to check. If the described elements are provided it is considered Single Machine With System Characteristics and that's being checked with the RES-181-1 schematron assert.

Not Tested

Derived Requirement

When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL NOT be provided. There is nothing to check. If the described elements are provided it is considered Single Machine With System Characteristics and that's being checked with the RES-181-1 schematron assert.

RES-181

Not Tested

Requirement

Single Machine With System Characteristics – A single result file that includes the results of all OVAL Definitions evaluated and "full" results types as described in the <oval-res:ContentEnumeration> element and the System Characteristics of the target evaluated.~For this format, the values for the <oval-res:directives> element SHALL be:~~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="full" reported="true"/>~ <oval-res:definition_false content="full" reported="true"/>~ <oval-res:definition_unknown content="full" reported="true"/>~ <oval-res:definition_error content="full" reported="true"/>~ <oval-res:definition_not_evaluated content="full" reported="true"/>~ <oval-res:definition_not_applicable content="full" reported="true"/> ~</oval-res:directives>~~When creating the OVAL System Characteristics as defined by the <oval-sc:oval_system_characteristics> element, the <oval-sc:collected_objects> and <oval-sc:system_data> elements SHALL be provided.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-181-1

Error if oval-res directives definitions have @content='full' or @content is not provided and oval-res:oval_system_characteristics does not have both oval-res:collected_objects and oval-res:system_data. In that case it is Single Machine Without System Characteristics.

Not Tested

Derived Requirement

Error if oval-res directives definitions have @content='full' or @content is not provided and oval-res:oval_system_characteristics does not have both oval-res:collected_objects and oval-res:system_data. In that case it is Single Machine Without System Characteristics.

RES-182

Not Tested

Requirement

Single Machine With Thin Results – A single result file that includes the results of all OVAL Definitions evaluated and "thin" results types as described in the OVAL Results schema. A value of "thin" means only the minimal amount of information will be provided.~For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="thin" reported="true"/>~ <oval-res:definition_false content="thin" reported="true"/>~ <oval-res:definition_unknown content="thin" reported="true"/>~ <oval-res:definition_error content="thin" reported="true"/>~ <oval-res:definition_not_evaluated content="thin" reported="true"/>~ <oval-res:definition_not_applicable content="thin" reported="true"/>

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-182-1

For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="thin" reported="true"/>~ <oval-res:definition_false content="thin" reported="true"/>~ <oval-res:definition_unknown content="thin" reported="true"/>~ <oval-res:definition_error content="thin" reported="true"/>~ <oval-res:definition_not_evaluated content="thin" reported="true"/>~ <oval-res:definition_not_applicable content="thin" reported="true"/> There is nothing to check. Either the content for each element is all "full" or all "thin", this check is being handled with the RES-179-1 schematron assert.

Not Tested

Derived Requirement

For this format, the values for the <oval-res:directives> element SHALL be:~<oval-res:directives include_source_definitions="false">~ <oval-res:definition_true content="thin" reported="true"/>~ <oval-res:definition_false content="thin" reported="true"/>~ <oval-res:definition_unknown content="thin" reported="true"/>~ <oval-res:definition_error content="thin" reported="true"/>~ <oval-res:definition_not_evaluated content="thin" reported="true"/>~ <oval-res:definition_not_applicable content="thin" reported="true"/> There is nothing to check. Either the content for each element is all "full" or all "thin", this check is being handled with the RES-179-1 schematron assert.

RES-235

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating OCIL result data stream components.~An SCAP OCIL result data stream component SHALL include the results of every <ocil:questionnaire>, <ocil:question_test_action>, and <ocil:question> element used to generate the reported results.

Section 4.7 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-235-1

The following requirements and recommendations pertain to content consumers generating OCIL result data stream components.~An SCAP OCIL result data stream component SHALL include the results of every <ocil:questionnaire>, <ocil:question_test_action>, and <ocil:question> element used to generate the reported results.

Not Tested

Derived Requirement

The following requirements and recommendations pertain to content consumers generating OCIL result data stream components.~An SCAP OCIL result data stream component SHALL include the results of every <ocil:questionnaire>, <ocil:question_test_action>, and <ocil:question> element used to generate the reported results.

RES-253

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~When the <xccdf:TestResult> is the root XCCDF element, then it will include an <xccdf:benchmark> element [XCCDF:6.6.2]. ~The <xccdf:benchmark> element SHALL have an @id attribute specified. The @id attribute SHALL match the value of the <xccdf:Benchmark> element's @id attribute that was processed. ~The <xccdf:benchmark> element SHALL have an @href attribute specified. The @href attribute SHALL hold the URI referencing the XCCDF component (either local to the data stream collection or remote) that was processed. The URI SHALL be in the form specified for the @href attribute in Table 8.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-253-1

The <xccdf:benchmark> element SHALL have an @id attribute specified.

Not Tested

Derived Requirement

The <xccdf:benchmark> element SHALL have an @id attribute specified.

RES-253-2

The <xccdf:benchmark> element SHALL have an @href attribute specified. The @href attribute SHALL hold the URI to the XCCDF component (either local to the data stream collection or remote) that was processed. The URI SHALL be in the form specified for the @href attribute in Table 8. When referencing a local component, the URI SHALL be in the form ‘#’ + componentId (e.g. “#component1”). When referencing external content, the URI SHALL be in the form of scheme:[//[user:password@]host[:port]][/]path[?query][#fragment]

Not Tested

Derived Requirement

The <xccdf:benchmark> element SHALL have an @href attribute specified. The @href attribute SHALL hold the URI to the XCCDF component (either local to the data stream collection or remote) that was processed. The URI SHALL be in the form specified for the @href attribute in Table 8. When referencing a local component, the URI SHALL be in the form ‘#’ + componentId (e.g. “#component1”). When referencing external content, the URI SHALL be in the form of scheme:[//[user:password@]host[:port]][/]path[?query][#fragment]

RES-255

Not Tested

Requirement

When evaluating an <xccdf:Rule> element that references an OVAL Definition, the <xccdf:rule-result> element SHALL be used to capture the result of this evaluation. This result SHALL be determined by evaluating the referenced OVAL Definition on a target host. The result value of an individual <xccdf:check> SHALL be mapped from the OVAL Definition result produced during evaluation.

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-255-1

When evaluating an <xccdf:Rule> element that references an OVAL Definition, the <xccdf:rule-result> element SHALL be used to capture the result of this evaluation. This result SHALL be determined by evaluating the referenced OVAL Definition on a target host. The result value of an individual <xccdf:check> SHALL be mapped from the OVAL Definition result produced during evaluation.

Not Tested

Derived Requirement

When evaluating an <xccdf:Rule> element that references an OVAL Definition, the <xccdf:rule-result> element SHALL be used to capture the result of this evaluation. This result SHALL be determined by evaluating the referenced OVAL Definition on a target host. The result value of an individual <xccdf:check> SHALL be mapped from the OVAL Definition result produced during evaluation.

RES-258

Not Tested

Requirement

If the <xccdf:Rule> element under evaluation has an <xccdf:check-content-ref> element with the @name attribute omitted and an <xccdf:check> element with its @multi-check attribute set to "true", then the result of each evaluated OVAL Definition SHALL be recorded as a separate <xccdf:rule-result> element.

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
RES-258-1 This requirement was not tested but the user should check their content for adherence. Not Tested

Derived Requirement Details

RES-258-1

This requirement was not tested but the user should check their content for adherence.

Not Tested

Derived Requirement

This requirement was not tested but the user should check their content for adherence.

RES-260

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~~The <xccdf:rule-result> elements report the result of the application of each selected rule [XCCDF:6.6.2].~The <xccdf:check/xccdf:check-content-ref> element SHALL record the reference to the checking system specific result component report ID and check name within the result file using the @href and @name attributes, respectively.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-260-1

Every <xccdf:rule-result> other than 'notapplicable', 'notchecked', or 'notselected' must have a <xccdf:check>/<xccdf:check-content-ref> that has attributes @href and @name. One exception is when the referenced <xccdf:Rule> contains @multi-check=false(the default) and has no @name.

Not Tested

Derived Requirement

Every <xccdf:rule-result> other than 'notapplicable', 'notchecked', or 'notselected' must have a <xccdf:check>/<xccdf:check-content-ref> that has attributes @href and @name. One exception is when the referenced <xccdf:Rule> contains @multi-check=false(the default) and has no @name.

RES-271

Not Tested

Requirement

In this case the <xccdf:rule-result/xccdf:check-content-ref> element SHALL identify the specific check result of each evaluated OVAL Definition using the @href and @name attributes as described in Section 4.5, item 8.

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-271-1

In this case the <xccdf:rule-result/xccdf:check-content-ref> element SHALL identify the specific check result of each evaluated OVAL Definition using the @href and @name attributes as described in Section 4.5, item 8.

Not Tested

Derived Requirement

In this case the <xccdf:rule-result/xccdf:check-content-ref> element SHALL identify the specific check result of each evaluated OVAL Definition using the @href and @name attributes as described in Section 4.5, item 8.

RES-299

Not Tested

Requirement

The target asset SHALL be represented in the ARF report using the <ai:assets> part of ARF. The <ai:asset> element populated about a target asset SHOULD include the fields specified in Table 20, where applicable

Section 4.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-299-1

The target asset SHALL be represented in the ARF report using the <ai:assets> part of ARF. The <ai:asset> element populated about a target asset SHOULD include the fields specified in Table 20, where applicable

Not Tested

Derived Requirement

The target asset SHALL be represented in the ARF report using the <ai:assets> part of ARF. The <ai:asset> element populated about a target asset SHOULD include the fields specified in Table 20, where applicable

RES-300

Not Tested

Requirement

The source data stream collection that was used to generate the results against the target SHOULD be included in the ARF report as an <arf:report-request>. If the source data stream collection is included in the ARF report and an <xccdf:Tailoring> component was used during processing, the tailoring component SHALL be included as well.

Section 4.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-300-1

The source data stream collection that was used to generate the results against the target SHOULD be included in the ARF report as an <arf:report-request>.

Not Tested

Derived Requirement

The source data stream collection that was used to generate the results against the target SHOULD be included in the ARF report as an <arf:report-request>.

RES-300-2

If the source data stream collection is included in the ARF report and an <xccdf:Tailoring> component was used during processing, the tailoring component SHALL be included as well.

Not Tested

Derived Requirement

If the source data stream collection is included in the ARF report and an <xccdf:Tailoring> component was used during processing, the tailoring component SHALL be included as well.

RES-300-3

The source data stream collection SHOULD be included in the ARF report as an <arf:report-request>. The user should run SCAPVal using the -sourceds argument to specify the source data stream collection that was used to generate the results.

Not Tested

Derived Requirement

The source data stream collection SHOULD be included in the ARF report as an <arf:report-request>. The user should run SCAPVal using the -sourceds argument to specify the source data stream collection that was used to generate the results.

RES-301

Not Tested

Requirement

Table 21 outlines the relationships that SHALL be specified in the ARF report if the stated condition is satisfied.

Section 4.4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-301-1

Table 21 outlines the relationships that SHALL be specified in the ARF report if the stated condition is satisfied.

Not Tested

Derived Requirement

Table 21 outlines the relationships that SHALL be specified in the ARF report if the stated condition is satisfied.

RES-304

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~An <xccdf:target-id-ref> SHALL be specified with a @system attribute of "http://scap.nist.gov/schema/asset-identification/1.1", an @href attribute value of "", and a @name attribute value of the ID of the <ai:asset> element in the ARF that this <xccdf:TestResult> is about.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-304-1

An <xccdf:target-id-ref> SHALL be specified with a @system attribute of "http://scap.nist.gov/schema/asset-identification/1.1", an @href attribute value of "", and a @name attribute value of the ID of the <ai:asset> element in the ARF that this <xccdf:TestResult> is about.

Not Tested

Derived Requirement

An <xccdf:target-id-ref> SHALL be specified with a @system attribute of "http://scap.nist.gov/schema/asset-identification/1.1", an @href attribute value of "", and a @name attribute value of the ID of the <ai:asset> element in the ARF that this <xccdf:TestResult> is about.

RES-306

Not Tested

Requirement

When specifying OVAL system characteristics, a reference SHOULD be made to the target asset in the ARF report collection. Specifically, the <oval-sc:oval_system_characteristics>/<oval-sc:system_info> SHOULD be populated with a <con:asset-identification> element. That element SHALL be populated with a single <arf:object-ref> element that points to the <ai:asset> element in the ARF report collection pertaining to the OVAL result. See [ARF] for details on populating the <arf:object-ref> element.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-306-1

When specifying OVAL system characteristics, a reference SHOULD be made to the target asset in the ARF report collection. Specifically, the <oval-sc:oval_system_characteristics>/<oval-sc:system_info> SHOULD be populated with a <con:asset-identification> element. That element SHALL be populated with a single <arf:object-ref> element that points to the <ai:asset> element in the ARF report collection pertaining to the OVAL result. See [ARF] for details on populating the <arf:object-ref> element.

Not Tested

Derived Requirement

When specifying OVAL system characteristics, a reference SHOULD be made to the target asset in the ARF report collection. Specifically, the <oval-sc:oval_system_characteristics>/<oval-sc:system_info> SHOULD be populated with a <con:asset-identification> element. That element SHALL be populated with a single <arf:object-ref> element that points to the <ai:asset> element in the ARF report collection pertaining to the OVAL result. See [ARF] for details on populating the <arf:object-ref> element.

RES-307

Not Tested

Requirement

One XML digital signature MAY be included in an <arf:extended-info> element in the ARF report.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-307-1

One XML digital signature MAY be included in an <arf:extended-info> element in the ARF report.

Not Tested

Derived Requirement

One XML digital signature MAY be included in an <arf:extended-info> element in the ARF report.

RES-309

Not Tested

Requirement

The <dsig:Signature> element SHALL sign the ARF report collection root element.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-309-1

The overall signature is optional "content consumers MAY digitally sign result content following the guidelines in [TMSAD]" If it's included SCAPVal runs the tmsad-1.0.sch schematron against SCAP content along with XML schema validation.

Not Tested

Derived Requirement

The overall signature is optional "content consumers MAY digitally sign result content following the guidelines in [TMSAD]" If it's included SCAPVal runs the tmsad-1.0.sch schematron against SCAP content along with XML schema validation.

RES-311

Not Tested

Requirement

A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-311-1

A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

Not Tested

Derived Requirement

A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

RES-312

Not Tested

Requirement

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <arf:asset-report-collection> element. The element SHALL be referenced in the @URI attribute using the empty string convention "".

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-312-1

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <arf:asset-report-collection> element. The element SHALL be referenced in the @URI attribute using the empty string convention "".

Not Tested

Derived Requirement

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <arf:asset-report-collection> element. The element SHALL be referenced in the @URI attribute using the empty string convention "".

RES-313

Not Tested

Requirement

Two XPath Filter 2 transforms SHALL exist on the first <dsig:Reference> element in a <dsig:Signature> element. Both SHALL specify a filter type of "subtract". The first transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos[count(arf:extended-info[dsig:Signature]) = count(*)]". The second transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos/arf:extended-info[dsig:Signature]". In both cases, the namespace prefix "arf" SHALL map to the ARF namespace specified in this document.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-313-1

Two XPath Filter 2 transforms SHALL exist on the first <dsig:Reference> element in a <dsig:Signature> element. Both SHALL specify a filter type of "subtract". The first transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos[count(arf:extended-info[dsig:Signature]) = count(*)]". The second transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos/arf:extended-info[dsig:Signature]". In both cases, the namespace prefix "arf" SHALL map to the ARF namespace specified in this document.

Not Tested

Derived Requirement

Two XPath Filter 2 transforms SHALL exist on the first <dsig:Reference> element in a <dsig:Signature> element. Both SHALL specify a filter type of "subtract". The first transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos[count(arf:extended-info[dsig:Signature]) = count(*)]". The second transform SHALL specify the XPath "/arf:asset-report-collection/arf:extended-infos/arf:extended-info[dsig:Signature]". In both cases, the namespace prefix "arf" SHALL map to the ARF namespace specified in this document.

RES-315

Not Tested

Requirement

Key information SHOULD be provided on the <dsig:Signature> element.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
RES-315-1 Key information SHOULD be provided on the <dsig:Signature> element. Not Tested

Derived Requirement Details

RES-315-1

Key information SHOULD be provided on the <dsig:Signature> element.

Not Tested

Derived Requirement

Key information SHOULD be provided on the <dsig:Signature> element.

RES-316

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The <arf:extended-info> element containing the original signature SHALL be removed from the resulting document.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-316-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The <arf:extended-info> element containing the original signature SHALL be removed from the resulting document.

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The <arf:extended-info> element containing the original signature SHALL be removed from the resulting document.

RES-318

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The first <dsig:Reference> element on the new <dsig:Signature> element SHALL reference the <dsig:Object> element containing the original signature. The <dsig:Object> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:Object>

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-318-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The first <dsig:Reference> element on the new <dsig:Signature> element SHALL reference the <dsig:Object> element containing the original signature. The <dsig:Object> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:Object>

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The first <dsig:Reference> element on the new <dsig:Signature> element SHALL reference the <dsig:Object> element containing the original signature. The <dsig:Object> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:Object>

RES-319

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-319-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

RES-320

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-320-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~A <dsig:SignatureProperties> element SHALL be included in the <dsig:Signature> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD].

RES-321

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~Key information SHOULD be provided on the <dsig:Signature> element in accordance with [TMSAD].

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-321-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~Key information SHOULD be provided on the <dsig:Signature> element in accordance with [TMSAD].

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~Key information SHOULD be provided on the <dsig:Signature> element in accordance with [TMSAD].

RES-322

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The new <dsig:Signature> element SHALL be placed in a new <arf:extended-info> element in the ARF report collection.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-322-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The new <dsig:Signature> element SHALL be placed in a new <arf:extended-info> element in the ARF report collection.

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The new <dsig:Signature> element SHALL be placed in a new <arf:extended-info> element in the ARF report collection.

RES-323

Not Tested

Requirement

When signing a result data stream, the source data stream collection SHOULD be captured in the ARF report being signed.

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-323-1

When signing a result data stream, the source data stream collection SHOULD be captured in the ARF report being signed.

Not Tested

Derived Requirement

When signing a result data stream, the source data stream collection SHOULD be captured in the ARF report being signed.

RES-363

Not Tested

Requirement

An SCAP result data stream SHALL conform to the [ARF] specification.

Section 4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-363-1

An SCAP result data stream SHALL conform to the [ARF] specification. SCAPVal performs the Schema validation against SCAP results [ARF] content.

Not Tested

Derived Requirement

An SCAP result data stream SHALL conform to the [ARF] specification. SCAPVal performs the Schema validation against SCAP results [ARF] content.

RES-363-2

An SCAP result data stream SHALL conform to the [ARF] specification. SCAPVal performs the Schematron validation against SCAP results [ARF] content. SCAP schematrons have their own associated IDs and will be used in the results.

Not Tested

Derived Requirement

An SCAP result data stream SHALL conform to the [ARF] specification. SCAPVal performs the Schematron validation against SCAP results [ARF] content. SCAP schematrons have their own associated IDs and will be used in the results.

RES-364

Not Tested

Requirement

In all situations, one or more component results (e.g., XCCDF, check results), the target asset, and/or the SCAP source data stream collection represented as a report request in ARF MAY be represented either as a local component in the ARF or as a remote resource, leveraging the remote resource capability built into ARF.

Section 4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-364-1

In all situations, one or more component results (e.g., XCCDF, check results), the target asset, and/or the SCAP source data stream collection represented as a report request in ARF MAY be represented either as a local component in the ARF or as a remote resource, leveraging the remote resource capability built into ARF.

Not Tested

Derived Requirement

In all situations, one or more component results (e.g., XCCDF, check results), the target asset, and/or the SCAP source data stream collection represented as a report request in ARF MAY be represented either as a local component in the ARF or as a remote resource, leveraging the remote resource capability built into ARF.

RES-365

Not Tested

Requirement

It MAY contain additional report objects for other results, such as <oval-var:oval_variables> or extended component results.

Section 4.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-365-1

It MAY contain additional report objects for other results, such as <oval-var:oval_variables> or extended component results.

Not Tested

Derived Requirement

It MAY contain additional report objects for other results, such as <oval-var:oval_variables> or extended component results.

RES-366

Not Tested

Requirement

Each component result SHALL be captured as a separate <arf:report> element in the <arf:asset-report-collection> element, and when reporting on XCCDF, OVAL, or OCIL, each component report SHALL use the element specified in Table 19 as its root element.

Section 4.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-366-1

This requirement was not tested. The user should inspect SCAP results to verify that the ARF report contains a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target. Each component result SHALL be captured as a separate <arf:report> element in the <arf:asset-report-collection> element. XCCDF: xccdf:TestResult, OVAL: oval-res:oval_results, OCIL:ocil:ocil

Not Tested

Derived Requirement

This requirement was not tested. The user should inspect SCAP results to verify that the ARF report contains a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target. Each component result SHALL be captured as a separate <arf:report> element in the <arf:asset-report-collection> element. XCCDF: xccdf:TestResult, OVAL: oval-res:oval_results, OCIL:ocil:ocil

RES-367

Not Tested

Requirement

Each SCAP result data stream component SHOULD NOT use any deprecated constructs in its associated specification.

Section 4.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-367-1

Each SCAP result data stream component SHOULD NOT use any deprecated constructs in its associated specification.

Not Tested

Derived Requirement

Each SCAP result data stream component SHOULD NOT use any deprecated constructs in its associated specification.

RES-369

Not Tested

Requirement

Additional identification information MAY be captured in the <ai:asset> element (asset tag, system GUID, etc.) The guidelines specified in [AI] SHALL be followed when populating the asset identification information.

Section 4.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-369-1

Additional identification information MAY be captured in the <ai:asset> element (asset tag, system GUID, etc.) The guidelines specified in [AI] SHALL be followed when populating the asset identification information.

Not Tested

Derived Requirement

Additional identification information MAY be captured in the <ai:asset> element (asset tag, system GUID, etc.) The guidelines specified in [AI] SHALL be followed when populating the asset identification information.

RES-370

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~~The <xccdf:rule-result> elements report the result of the application of each selected rule [XCCDF:6.6.2].~The @href attribute SHALL contain "#" + the @id of the <arf:report> containing the check result. This approach provides traceability between XCCDF and check results.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-370-1

The @href attribute SHALL contain "#" + the @id of the <arf:report> containing the check result. This approach provides traceability between XCCDF and check results.

Not Tested

Derived Requirement

The @href attribute SHALL contain "#" + the @id of the <arf:report> containing the check result. This approach provides traceability between XCCDF and check results.

RES-370-2

Depending on the checking engine used (OVAL or OCIL), the the <arf:report> element should contain the relevant (OVAL or OCIL) content.

Not Tested

Derived Requirement

Depending on the checking engine used (OVAL or OCIL), the the <arf:report> element should contain the relevant (OVAL or OCIL) content.

RES-371

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~~The <xccdf:rule-result> elements report the result of the application of each selected rule [XCCDF:6.6.2].~Note that if @multi-check is not set to "true" and the <xccdf:rule-result> represents a group of checks, then the @name attribute SHALL be omitted.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-371-1

Note that if @multi-check is not set to "true" and the <xccdf:rule-result> represents a group of checks, then the @name attribute SHALL be omitted.

Not Tested

Derived Requirement

Note that if @multi-check is not set to "true" and the <xccdf:rule-result> represents a group of checks, then the @name attribute SHALL be omitted.

RES-388

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~If a child profile of an <xccdf:Tailoring> element was applied during processing, then the <xccdf:tailoring-file> element SHALL be present and SHALL provide the following information about the <xccdf:Tailoring> element: @href, @id, @version, and @time. The @href attribute SHALL hold the URI to the XCCDF Tailoring component and SHALL comply with the format described above (item 3).

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-388-1

If a child profile of an <xccdf:Tailoring> element was applied during processing, then the <xccdf:tailoring-file> element SHALL be present and SHALL provide the following information about the <xccdf:Tailoring> element: @href, @id, @version, and @time. The @href attribute SHALL hold the URI to the XCCDF Tailoring component and SHALL comply with the format described above (item 3). If <xccdf:tailoring-file> is provided, the XCCDF schema will check for this.

Not Tested

Derived Requirement

If a child profile of an <xccdf:Tailoring> element was applied during processing, then the <xccdf:tailoring-file> element SHALL be present and SHALL provide the following information about the <xccdf:Tailoring> element: @href, @id, @version, and @time. The @href attribute SHALL hold the URI to the XCCDF Tailoring component and SHALL comply with the format described above (item 3). If <xccdf:tailoring-file> is provided, the XCCDF schema will check for this.

RES-389

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~The <xccdf:Profile> element SHALL be included if a profile was applied during processing. This is also applicable to selected profiles part of <xccdf:Tailoring>.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-389-1

The <xccdf:Profile> element SHALL be included if a profile was applied during processing. This is also applicable to selected profiles part of <xccdf:Tailoring>.

Not Tested

Derived Requirement

The <xccdf:Profile> element SHALL be included if a profile was applied during processing. This is also applicable to selected profiles part of <xccdf:Tailoring>.

RES-390

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~Regarding the definition and use of <xccdf:Profile> elements, reported <xccdf:set-value> elements SHALL include all those values that are exported by the reported rules. The specific settings are those determined by the reported <xccdf:Profile>.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-390-1

Regarding the definition and use of <xccdf:Profile> elements, reported <xccdf:set-value> elements SHALL include all those values that are exported by the reported rules. The specific settings are those determined by the reported <xccdf:Profile>.

Not Tested

Derived Requirement

Regarding the definition and use of <xccdf:Profile> elements, reported <xccdf:set-value> elements SHALL include all those values that are exported by the reported rules. The specific settings are those determined by the reported <xccdf:Profile>.

RES-391

Not Tested

Requirement

According to [XCCDF:Table 9;Table 35;Table 39], if the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unchecked", then the rule result SHALL be set to "notchecked". If the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unscored", then the rule result SHALL be set to "informational".

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-391-1

If the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unchecked", then the rule result SHALL be set to "notchecked".

Not Tested

Derived Requirement

If the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unchecked", then the rule result SHALL be set to "notchecked".

RES-391-2

If the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unscored", then the rule result SHALL be set to "informational".

Not Tested

Derived Requirement

If the <xccdf:Rule> element under evaluation is selected and its @role attribute is set to "unscored", then the rule result SHALL be set to "informational".

RES-392

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~~The <xccdf:rule-result> elements report the result of the application of each selected rule [XCCDF:6.6.2].~The @role, @severity, and @weight attributes of the <xccdf:rule-result> element SHALL be provided to indicate their values used during assessment.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-392-1

The @role, @severity, and @weight attributes of the <xccdf:rule-result> element SHALL be provided to indicate their values used during assessment.

Not Tested

Derived Requirement

The @role, @severity, and @weight attributes of the <xccdf:rule-result> element SHALL be provided to indicate their values used during assessment.

RES-42

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~~To be considered valid SCAP result content, the <xccdf:TestResult> element SHALL meet the following conditions~The <xccdf:identity> element SHALL identify the security principal used to access rule evaluation on the target(s). This will include the identity name or username used to perform the evaluation.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-42-1

At least one <xccdf:identity> element SHALL be provided and SHALL contain text to identify the security principal.

Not Tested

Derived Requirement

At least one <xccdf:identity> element SHALL be provided and SHALL contain text to identify the security principal.

RES-44

Not Tested

Requirement

If the target <xccdf:Rule> identified by the <xccdf:rule-result> element's @idref attribute has one or more <xccdf:ident> elements with a @system attribute value listed in Section 3.2.4.1, then each <xccdf:ident> element SHALL also appear within the <xccdf:rule-result> element.

Section 4.5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-44-1

If the target <xccdf:Rule> identified by the <xccdf:rule-result idref=""> attribute has one or more <ident> elements with the "http://cve.mitre.org" or "http://cpe.mitre.org" or "http://cpe.mitre.org" system identifier, then each <xccdf:ident> element SHALL also appear within the <xccdf:rule-result> element.

Not Tested

Derived Requirement

If the target <xccdf:Rule> identified by the <xccdf:rule-result idref=""> attribute has one or more <ident> elements with the "http://cve.mitre.org" or "http://cpe.mitre.org" or "http://cpe.mitre.org" system identifier, then each <xccdf:ident> element SHALL also appear within the <xccdf:rule-result> element.

RES-68

Not Tested

Requirement

SCAP-conformant content SHALL include full status reporting, including Error, Unknown, Not Applicable, Not Evaluated, True, and False.

Section 4.5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-68-1

SCAP-conformant content SHALL include full status reporting, including Error, Unknown, Not Applicable, Not Evaluated, True, and False.

Not Tested

Derived Requirement

SCAP-conformant content SHALL include full status reporting, including Error, Unknown, Not Applicable, Not Evaluated, True, and False.

RES-69

Not Tested

Requirement

An SCAP OVAL result data stream component SHALL include the results of every OVAL Definition used to generate the reported results.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-69-1

An SCAP OVAL result data stream component SHALL include the results of every OVAL Definition used to generate the reported results.

Not Tested

Derived Requirement

An SCAP OVAL result data stream component SHALL include the results of every OVAL Definition used to generate the reported results.

RES-70

Not Tested

Requirement

In order to support SCAP instances where OVAL thin content (only the ID of the definition and the results) is preferred, SCAP content consumers SHALL support all valid values for the <oval-res:directives> controlling the expected content of the results file.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

RES-70-1

In order to support SCAP instances where OVAL thin content (only the ID of the definition and the results) is preferred, SCAP products SHALL support all valid values for the <oval-res:directives> controlling the expected content of the results file.

Not Tested

Derived Requirement

In order to support SCAP instances where OVAL thin content (only the ID of the definition and the results) is preferred, SCAP products SHALL support all valid values for the <oval-res:directives> controlling the expected content of the results file.

SRC-10

Pass

Requirement

The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:description> element SHALL be provided. Each instance SHALL contain a text value that describes the purpose of the containing element.

Section 3.2.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-10-1

For each <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> element, a <xccdf:description> SHALL be provided.

Pass

Derived Requirement

For each <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> element, a <xccdf:description> SHALL be provided.

SRC-118

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the OVAL checking system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://oval.mitre.org/XMLSchema/oval-definitions-5 ".

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-118-1

@system on <xccdf:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

Pass

Derived Requirement

@system on <xccdf:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

SRC-118-2

@system on <cpe-dict:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

Pass

Derived Requirement

@system on <cpe-dict:check> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

SRC-118-3

@system on <cpe-lang:check-fact-ref> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

Not Applicable

Derived Requirement

@system on <cpe-lang:check-fact-ref> MUST be "http://oval.mitre.org/XMLSchema/oval-definitions-5" or "http://scap.nist.gov/schema/ocil/2"

SRC-119

Not Tested

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~Use of the OCIL checking system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://scap.nist.gov/schema/ocil/2".

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-119-1

Use of the OCIL check system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://scap.nist.gov/schema/ocil/2. This is already checked with schematron asserts SRC-118

Not Tested

Derived Requirement

Use of the OCIL check system SHALL be indicated by setting the <xccdf:check> element's @system attribute to "http://scap.nist.gov/schema/ocil/2. This is already checked with schematron asserts SRC-118

SRC-125

Not Tested

Requirement

One or more <xccdf:check-export> elements MAY be used to define the binding of <xccdf:Value> elements to OVAL variables. The format of the <xccdf:check-export> element is:~<xccdf:check-export value-id="XCCDF_Value_id" _x000B_ export-name="OVAL_External_Variable_id"/>

Section 3.2.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-125-1

One or more <xccdf:check-export> elements MAY be used to define the binding of <xccdf:Value> elements to OVAL variables. The format of the <xccdf:check-export> element is:~<xccdf:check-export value-id="XCCDF_Value_id" _x000B_ export-name="OVAL_External_Variable_id"/>

Not Tested

Derived Requirement

One or more <xccdf:check-export> elements MAY be used to define the binding of <xccdf:Value> elements to OVAL variables. The format of the <xccdf:check-export> element is:~<xccdf:check-export value-id="XCCDF_Value_id" _x000B_ export-name="OVAL_External_Variable_id"/>

SRC-131

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-131-1 XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element. Not Tested

Derived Requirement Details

SRC-131-1

XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element.

Not Tested

Derived Requirement

XCCDF test results SHALL be documented as the contents of an <xccdf:TestResult> element.

SRC-149

Not Tested

Requirement

A <cpe2_dict:cpe-item> element MAY contain one or more <cpe2-dict:check> elements that reference OVAL inventory class definitions using the following format:~<cpe2_dict:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5"~[href="oval_URL"]>oval_inventory_definition_id</cpe2_dict:check>

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-149-1

A <cpe2_dict:cpe-item> element MAY contain one or more <cpe2-dict:check> elements that reference OVAL inventory class definitions using the following format:~<cpe2_dict:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5"~[href="oval_URL"]>oval_inventory_definition_id</cpe2_dict:check>

Not Tested

Derived Requirement

A <cpe2_dict:cpe-item> element MAY contain one or more <cpe2-dict:check> elements that reference OVAL inventory class definitions using the following format:~<cpe2_dict:check system="http://oval.mitre.org/XMLSchema/oval-definitions-5"~[href="oval_URL"]>oval_inventory_definition_id</cpe2_dict:check>

SRC-15

Pass

Requirement

Each CPE name [CPE-N] in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document SHALL match at least one CPE entry in a dictionary referenced by the data stream. A match is considered an EQUAL or SUPERSET result when matching the CPE name to a dictionary entry, as defined in the CPE Name Matching specification [CPE-M]. Only non-deprecated names SHOULD be used.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-15-1

Every <xccdf:platform> or <cpe2:fact-ref> MUST match as EQUAL or SUPERSET to a CPE in a CPE dictionary component of this data stream.

Pass

Derived Requirement

Every <xccdf:platform> or <cpe2:fact-ref> MUST match as EQUAL or SUPERSET to a CPE in a CPE dictionary component of this data stream.

SRC-150

Not Tested

Requirement

CVE references in SCAP content MAY include both "candidate" and "entry" status identifiers.

Section 3.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-150-1

CVE references in SCAP content MAY include both "candidate" and "entry" status identifiers.

Not Tested

Derived Requirement

CVE references in SCAP content MAY include both "candidate" and "entry" status identifiers.

SRC-151

Not Tested

Requirement

Deprecated CVE identifiers SHALL NOT be used.

Section 3.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-151-1 Deprecated CVE identifiers SHALL NOT be used. Not Tested

Derived Requirement Details

SRC-151-1

Deprecated CVE identifiers SHALL NOT be used.

Not Tested

Derived Requirement

Deprecated CVE identifiers SHALL NOT be used.

SRC-152

Not Tested

Requirement

If a CVE identifier exists for a particular vulnerability, the official CVE identifier SHALL be used. If no CVE exists for the software flaw, an alternate identifier MAY be used, but the user SHOULD seek to have a CVE identifier issued for the vulnerability.

Section 3.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-152-1

If a CVE identifier exists for a particular vulnerability, the official CVE identifier SHALL be used. If no CVE exists for the software flaw, an alternate identifier MAY be used, but the user SHOULD seek to have a CVE identifier issued for the vulnerability.

Not Tested

Derived Requirement

If a CVE identifier exists for a particular vulnerability, the official CVE identifier SHALL be used. If no CVE exists for the software flaw, an alternate identifier MAY be used, but the user SHOULD seek to have a CVE identifier issued for the vulnerability.

SRC-154

Not Tested

Requirement

Each SCAP source data stream component SHALL use one of the elements specified in Table 14 as its document element.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-154-1

Each SCAP source data stream component SHALL use one of the elements specified in Table 12 as its document element.

Not Tested

Derived Requirement

Each SCAP source data stream component SHALL use one of the elements specified in Table 12 as its document element.

SRC-169

Pass

Requirement

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The source data stream SHALL include the OVAL source data stream component referenced by the patches up-to-date rule, which contains one or more OVAL patch class definitions.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-169-1

An xccdf:Rule with @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" and @multi-check=true SHALL reference an OVAL component that contains two or more oval definition of class 'patch'. This schematron assert also covers SRC-275-1 If your content contains external references, SCAPVal will attempt to resolve them in -online mode.

Pass

Derived Requirement

An xccdf:Rule with @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" and @multi-check=true SHALL reference an OVAL component that contains two or more oval definition of class 'patch'. This schematron assert also covers SRC-275-1 If your content contains external references, SCAPVal will attempt to resolve them in -online mode.

SRC-171

Pass

Requirement

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~Each <xccdf:check-content-ref> element SHALL omit the @name attribute.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-171-1

When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, then each <xccdf:check-content-ref> element SHALL omit the @name attribute.

Pass

Derived Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, then each <xccdf:check-content-ref> element SHALL omit the @name attribute.

SRC-175

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~At least one <xccdf:check-content-ref> element SHALL be provided for each <xccdf:check>

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-175-1

At least one <xccdf:check-content-ref> element SHALL be provided in each <xccdf:check>

Pass

Derived Requirement

At least one <xccdf:check-content-ref> element SHALL be provided in each <xccdf:check>

SRC-2

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:Benchmark> element SHALL have an @xml:lang attribute.

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-2-1 @xml:lang attribute SHALL be provided on <xccdf:Benchmark> elements. Pass

Derived Requirement Details

SRC-2-1

@xml:lang attribute SHALL be provided on <xccdf:Benchmark> elements.

Pass

Derived Requirement

@xml:lang attribute SHALL be provided on <xccdf:Benchmark> elements.

SRC-206

Not Tested

Requirement

During scoring, current CVSS scores acquired dynamically, such as from a data feed, SHOULD be used in place of the @weight attribute within XCCDF vulnerability-related rules.

Section 3.2.4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-206-1

During scoring, current CVSS scores acquired dynamically, such as from a data feed, SHOULD be used in place of the @weight attribute within XCCDF vulnerability-related rules.

Not Tested

Derived Requirement

During scoring, current CVSS scores acquired dynamically, such as from a data feed, SHOULD be used in place of the @weight attribute within XCCDF vulnerability-related rules.

SRC-207

Warning

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~If an OVAL compliance class definition maps to one or more CCE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: ~<oval-def:reference source="http://cce.mitre.org" ref_id="CCE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cce.mitre.org" (preferred method) or "CCE".

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-207-1

OVAL definitions of class 'compliance' should include a reference to a CCE, where applicable.

Warning

Derived Requirement

OVAL definitions of class 'compliance' should include a reference to a CCE, where applicable.

Test Details

# Test Result Message Context (Line/Column)
1 Fail 'oval-def:definition oval:ssg-rsyslog_nolisten:def:1' 51 : 93  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-rsyslog_nolisten:def:1" version="2">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
2 Fail 'oval-def:definition oval:ssg-logwatch_configured_splithosts:def:1' 139 : 107  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_splithosts:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
3 Fail 'oval-def:definition oval:ssg-logwatch_configured_hostlimit:def:1' 152 : 106  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-logwatch_configured_hostlimit:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
4 Fail 'oval-def:definition oval:ssg-directory_permissions_var_log_audit:def:1' 375 : 112  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-directory_permissions_var_log_audit:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria operator="OR">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
5 Fail 'oval-def:definition oval:ssg-auditd_data_retention_space_left:def:1' 854 : 109  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-auditd_data_retention_space_left:def:1" version="2">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
6 Fail 'oval-def:definition oval:ssg-auditd_data_disk_full_action:def:1' 881 : 105  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-auditd_data_disk_full_action:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
7 Fail 'oval-def:definition oval:ssg-auditd_data_disk_error_action:def:1' 964 : 106  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-auditd_data_disk_error_action:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
8 Fail 'oval-def:definition oval:ssg-accounts_have_homedir_login_defs:def:1' 1033 : 109  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-accounts_have_homedir_login_defs:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
9 Fail 'oval-def:definition oval:ssg-file_permissions_home_dirs:def:1' 1080 : 103  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-file_permissions_home_dirs:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
10 Fail 'oval-def:definition oval:ssg-root_path_no_dot:def:1' 1109 : 93  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="compliance" id="oval:ssg-root_path_no_dot:def:1" version="2">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria comment="environment variable PATH contains dangerous path" operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
Omitting 243 additional results.

SRC-208

Pass

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For compliance class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and compliance classes.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-208-1

For OVAL definitions of @class 'compliance', only definitions of class 'compliance' or 'inventory' can be extended.

Pass

Derived Requirement

For OVAL definitions of @class 'compliance', only definitions of class 'compliance' or 'inventory' can be extended.

SRC-209

Warning

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~If an OVAL inventory class definition maps to one or more CPE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format: _x000B__x000B_<oval-def:reference source="http://cpe.mitre.org" ref_id="CPE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cpe.mitre.org" (preferred method) or "CPE".

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-209-1

OVAL definitions of class 'inventory' should include a reference to a CPE, where applicable.

Warning

Derived Requirement

OVAL definitions of class 'inventory' should include a reference to a CPE, where applicable.

Test Details

# Test Result Message Context (Line/Column)
1 Fail 'oval-def:definition oval:ssg-installed_OS_is_opensuse:def:1' 7198 : 100  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
2 Fail 'oval-def:definition oval:ssg-installed_OS_is_part_of_Unix_family:def:1' 7244 : 111  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
3 Fail 'oval-def:definition oval:ssg-installed_OS_is_ubuntu:def:1' 7426 : 98  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria comment="System is Ubuntu" operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
4 Fail 'oval-def:definition oval:ssg-installed_OS_is_opensuse:def:1' 140424 : 100  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-cpe-oval.xml" timestamp="2019-04-29T17:20:01">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_opensuse:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
5 Fail 'oval-def:definition oval:ssg-installed_OS_is_part_of_Unix_family:def:1' 140467 : 111  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-cpe-oval.xml" timestamp="2019-04-29T17:20:01">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_part_of_Unix_family:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria>
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
6 Fail 'oval-def:definition oval:ssg-installed_OS_is_ubuntu:def:1' 140639 : 98  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-cpe-oval.xml" timestamp="2019-04-29T17:20:01">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:definitions>
...
<ns3:definition class="inventory" id="oval:ssg-installed_OS_is_ubuntu:def:1" version="1">
<ns3:metadata>
...
</ns3:metadata>
<ns3:criteria comment="System is Ubuntu" operator="AND">
...
</ns3:criteria>
</ns3:definition>
...
</ns3:definitions>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>

SRC-210

Pass

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For inventory class definitions:~Definitions that are directly or indirectly extended SHALL be limited to the inventory class.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-210-1

For OVAL definitions of @class 'inventory', only definitions of class 'inventory' can be extended.

Pass

Derived Requirement

For OVAL definitions of @class 'inventory', only definitions of class 'inventory' can be extended.

SRC-211

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition maps to one or more CVE identifiers, the definition MAY include <oval-def:reference> elements that reference those identifiers using the following format:_x000B__x000B_<oval-def:reference source="http://cve.mitre.org" ref_id="CVE_identifier"/>_x000B__x000B_This recommendation is weaker than its counterparts for the other class definition types because a CVE identifier is not an identifier for a patch; it is more of an association. For example, one patch could fix multiple vulnerabilities, so it would map to multiple CVE identifiers._x000B__x000B_The source attribute SHALL be defined using either "http://cve.mitre.org" (preferred method) or "CVE".

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-211-1

OVAL patch class MAY reference a CVE. This requirement changed from "SHOULD" to "MAY" in SCAP Schematron version 1.1

Not Tested

Derived Requirement

OVAL patch class MAY reference a CVE. This requirement changed from "SHOULD" to "MAY" in SCAP Schematron version 1.1

SRC-212

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition is associated with a source specific identifier (for example, Knowledge Base numbers for Microsoft patches), these identifiers SHOULD be included in <oval-def:reference> elements contained by the definition. For example:_x000B__x000B_<oval-def:reference source="www.microsoft.com/Patch" ref_id="KB912919"/>

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-212-1

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition is associated with a source specific identifier (for example, Knowledge Base numbers for Microsoft patches), these identifiers SHOULD be included in <oval-def:reference> elements contained by the definition. For example:_x000B__x000B_<oval-def:reference source="www.microsoft.com/Patch" ref_id="KB912919"/>

Not Tested

Derived Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~If an OVAL patch class definition is associated with a source specific identifier (for example, Knowledge Base numbers for Microsoft patches), these identifiers SHOULD be included in <oval-def:reference> elements contained by the definition. For example:_x000B__x000B_<oval-def:reference source="www.microsoft.com/Patch" ref_id="KB912919"/>

SRC-213

Pass

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For patch class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and patch classes.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-213-1

For OVAL definitions of @class 'patch', only definitions of class 'patch' or 'inventory' can be extended.

Pass

Derived Requirement

For OVAL definitions of @class 'patch', only definitions of class 'patch' or 'inventory' can be extended.

SRC-214

Pass

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~If an OVAL vulnerability class definition maps to one or more CVE identifiers, the definition SHOULD include <oval-def:reference> elements that reference those identifiers using the following format:_x000B__x000B_<oval-def:reference source="http://cve.mitre.org" ref_id="CVE_identifier"/>_x000B__x000B_The source attribute SHALL be defined using either "http://cve.mitre.org" (preferred method) or "CVE".

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-214-1

OVAL definitions of class 'vulnerability' should include a reference to a CVE, where applicable.

Pass

Derived Requirement

OVAL definitions of class 'vulnerability' should include a reference to a CVE, where applicable.

SRC-215

Pass

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.~"inventory" if it represents a check for the presence of a product of interest on the system.~The following requirements apply to particular classes of OVAL Definitions:~~For vulnerability class definitions:~Definitions that are directly or indirectly extended SHALL be limited to inventory and vulnerability classes.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-215-1

For OVAL definitions of @class 'vulnerability', only definitions of class 'inventory' or 'vulnerability' can be extended.

Pass

Derived Requirement

For OVAL definitions of @class 'vulnerability', only definitions of class 'inventory' or 'vulnerability' can be extended.

SRC-216

Pass

Requirement

Within the SCAP component specifications, certain constructs can be deprecated. SCAP content consumers SHALL support all deprecated constructs, unless specifically noted in the annex, because they are still valid within SCAP 1.3 and supported legacy SCAP versions. This requirement ensures that legacy SCAP content making use of these deprecated constructs continues to be supported.~Content consumers supporting OVAL SHALL support OVAL Definition documents written against all versions of OVAL component specifications listed in the annex.

Section 4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-216-1

OVAL documents shall be written in one of the following versions: 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 5.10, 5.10.1, 5.11, 5.11.1, 5.11.2

Pass

Derived Requirement

OVAL documents shall be written in one of the following versions: 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 5.10, 5.10.1, 5.11, 5.11.1, 5.11.2

SRC-216-2

OVAL platform schema versions shall be approved for SCAP 1.3 (Annex to NIST Special Publication 800-126 Revision 3)

Pass

Derived Requirement

OVAL platform schema versions shall be approved for SCAP 1.3 (Annex to NIST Special Publication 800-126 Revision 3)

SRC-227

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-227-1

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).

Not Tested

Derived Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"compliance" if it represents a check for the system's configuration complying with policy requirements (for example, having the required value for a specific configuration setting).

SRC-228

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-228-1

Required values for the @class attribute of an OVAL Definition are as follows:~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.

Not Tested

Derived Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"vulnerability" if it represents a check for the presence of a particular software flaw vulnerability on a system.

SRC-229

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-229-1

Required values for the @class attribute of an OVAL Definition are as follows:~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.

Not Tested

Derived Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"patch" if it represents a check for whether a discrete patch needs to be installed on the system.

SRC-230

Not Tested

Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"inventory" if it represents a check for the presence of a product of interest on the system.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-230-1

Required values for the @class attribute of an OVAL Definition are as follows:~"inventory" if it represents a check for the presence of a product of interest on the system.

Not Tested

Derived Requirement

Required values for the @class attribute of an OVAL Definition are as follows:~"inventory" if it represents a check for the presence of a product of interest on the system.

SRC-236

Pass

Requirement

The SCAP source data stream component that SHALL be included for compliance checking is the XCCDF benchmark, which expresses the checklist. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL compliance definition. This definition SHALL be contained in an OVAL component, which holds definitions of compliance checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL compliance class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting configuration information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component.~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its compliance activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3.

Section 5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-236-1

For this CONFIGURATION @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

For this CONFIGURATION @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-236-2

Each xccdf:Rule shall reference at least one of the follow items: OVAL compliance class, OCIL Questionnaire, OVAL patch class

Pass

Derived Requirement

Each xccdf:Rule shall reference at least one of the follow items: OVAL compliance class, OCIL Questionnaire, OVAL patch class

SRC-242

Pass

Requirement

The SCAP source data stream component that SHALL be included for vulnerability scanning is the XCCDF benchmark, which expresses the checklist of the flaws to be checked for. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL vulnerability definition. This definition SHALL be contained in an OVAL component, which holds definitions of vulnerability checks used by the checklist. An XCCDF benchmark's rules MAY reference one or more OVAL vulnerability class definitions in an OVAL component.~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect. An example of OCIL use is to give step-by-step directions for manually examining a system for a vulnerability that cannot be detected with OVAL. In such a case, OCIL is used for capturing information collected using manual examination. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component. ~An OVAL patch definition. This definition SHALL be contained in an OVAL component, which holds definitions for patch compliance checks. These checks may be needed if an organization includes patch verification in its vulnerability scanning activities. An XCCDF benchmark MAY reference an OVAL patch definition through a patches up-to-date rule in a manner consistent with Section 3.2.4.3.

Section 5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-242-1

For this VULNERABILITY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

For this VULNERABILITY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-242-2

Each xccdf:Rule shall reference at least one of the follow components: OVAL vulnerability class, OCIL Questionnaire, OVAL patch class

Pass

Derived Requirement

Each xccdf:Rule shall reference at least one of the follow components: OVAL vulnerability class, OCIL Questionnaire, OVAL patch class

SRC-248

Pass

Requirement

The SCAP source data stream component that SHALL be included for inventory scanning is the XCCDF benchmark, which references the inventory checks and captures the results. Each rule in the XCCDF benchmark SHALL reference one of the following:~An OVAL inventory definition. This definition SHALL be contained in an OVAL component, which holds definitions of technical procedures for determining whether or not a specific target asset has software (product, platform, malware, etc.) of interest. An XCCDF benchmark's rules MAY reference one or more OVAL inventory class definitions in an OVAL component. ~An OCIL questionnaire. This questionnaire SHALL be contained in an OCIL component, which holds questionnaires that collect information that OVAL is not being used to collect, such as posing questions to users or harvesting inventory information from an existing database. An XCCDF benchmark's rules MAY reference one or more OCIL questionnaires in an OCIL component.

Section 5.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-248-1

For this INVENTORY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

For this INVENTORY @use-case, unable to find at least one <xccdf:Benchmark> element referenced in the <ds:checklists> child elements. Check your <ds:component-ref> @xlink:href values for validity. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-248-2

Each xccdf:Rule shall reference at least one OVAL definition in CPE_INVENTORY

Pass

Derived Requirement

Each xccdf:Rule shall reference at least one OVAL definition in CPE_INVENTORY

SRC-25

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~The <xccdf:check-content> element SHALL NOT be used to embed check content directly into XCCDF content.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-25-1 A XCCDF document SHALL NOT contain an <xccdf:check-content> element Pass

Derived Requirement Details

SRC-25-1

A XCCDF document SHALL NOT contain an <xccdf:check-content> element

Pass

Derived Requirement

A XCCDF document SHALL NOT contain an <xccdf:check-content> element

SRC-251

Warning

Requirement

Each <xccdf:Rule> element SHALL include an <xccdf:ident> element containing a CVE, CCE, or CPE identifier reference if an appropriate identifier exists. The meaning of the identifier SHALL be consistent with the recommendation implemented by the <xccdf:Rule> element. If the rule references an OVAL Definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s) if an appropriate identifier exists and if that OVAL Definition is the only input to the rule's final result.

Section 3.2.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-251-1

An xccdf:Rule should include an xccdf:ident containing a CVE, CCE, or CPE

Warning

Derived Requirement

An xccdf:Rule should include an xccdf:ident containing a CVE, CCE, or CPE

Test Details

# Test Result Message Context (Line/Column)
1 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost' 50724 : 121  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
2 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_nolisten' 50862 : 115  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
3 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_package_syslogng_installed' 50990 : 125  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_syslogng_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
4 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_service_syslogng_enabled' 51038 : 123  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_syslogng_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
5 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_tcp' 51121 : 134  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_tcp" selected="false" severity="unknown">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
6 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp' 51164 : 134  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="unknown">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
7 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership' 51247 : 127  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
8 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_files_ownership' 51316 : 122  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
9 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_files_permissions' 51385 : 124  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">
</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">
</ns10:reference>
<ns10:reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">
</ns10:reference>
<ns10:reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">
</ns10:reference>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:platform idref="cpe:/a:machine"/>
<ns10:ident system="https://nvd.nist.gov/cce/index.cfm">
</ns10:ident>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
10 Fail 'xccdf:Rule xccdf_org.ssgproject.content_rule_rsyslog_cron_logging' 51467 : 119  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_cron_logging" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="http://www.isaca.org/COBIT/Pages/default.aspx">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
Omitting 1042 additional results.

SRC-251-2

If an XCCDF rule references an OVAL definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s).

Pass

Derived Requirement

If an XCCDF rule references an OVAL definition, then <xccdf:ident> element content SHALL match the corresponding CVE, CCE, or CPE identifier found in the associated OVAL Definition(s).

SRC-257

Pass

Requirement

An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers. Identifiers from previous revisions of CCE or CPE MAY also be specified following the SCAP identifiers.

Section 3.2.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-257-1

An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier (using the @system value specified in the 800-126) SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers.

Pass

Derived Requirement

An <xccdf:ident> element referencing a CVE, CCE, or CPE identifier (using the @system value specified in the 800-126) SHALL be ordered before other <xccdf:ident> elements referencing non-SCAP identifiers.

SRC-262

Pass

Requirement

Each XCCDF benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL component.

Section 5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-262-1

Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL Questionnaire component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL compliance class definition in an OVAL component or an OCIL questionnaire in an OCIL Questionnaire component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-263

Not Tested

Requirement

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

Section 5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-263-1

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

Not Tested

Derived Requirement

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

SRC-265

Pass

Requirement

Each XCCDF benchmark SHALL have at least one rule that references either an OVAL vulnerability class definition in an OVAL component or an OCIL questionnaire in an OCIL component.

Section 5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-265-1

Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL vulnerability definition in the an OVAL component or an OCIL questionnaire in the OCIL Questionnaire component.

Pass

Derived Requirement

Each XCCDF Benchmark SHALL have at least one rule that references either an OVAL vulnerability definition in the an OVAL component or an OCIL questionnaire in the OCIL Questionnaire component.

SRC-266

Not Tested

Requirement

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

Section 5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-266-1

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

Not Tested

Derived Requirement

All OVAL components and OCIL components referenced by the XCCDF benchmark SHALL be included in the SCAP source data stream.

SRC-267

Not Tested

Requirement

Each SCAP source data stream component SHOULD NOT use any constructs that are deprecated in its associated specification.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-267-1

Each SCAP source data stream component SHOULD NOT use any constructs that are deprecated in its associated specification.

Not Tested

Derived Requirement

Each SCAP source data stream component SHOULD NOT use any constructs that are deprecated in its associated specification.

SRC-275

Not Tested

Requirement

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The @multi-check attribute of the <xccdf:check> element SHALL be set to "true". This causes a separate <xccdf:rule-result> to be generated for each OVAL Patch Definition. See Section 4.5.2 for more information.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-275-1

SRC-169-1 covers this check. When the @multi-check attribute of the <xccdf:check> element SHALL is set to "true". This Patches Up-To-Date Rule is considered a multi-check and shall have two or more OVAL Patch definition references.

Not Tested

Derived Requirement

SRC-169-1 covers this check. When the @multi-check attribute of the <xccdf:check> element SHALL is set to "true". This Patches Up-To-Date Rule is considered a multi-check and shall have two or more OVAL Patch definition references.

SRC-276

Pass

Requirement

Use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, use of the <xccdf:complex-choice> element SHALL NOT be allowed.

Section 3.2.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-276-1

The use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, the use of the <xccdf:complex-choice> element SHALL NOT be allowed.

Pass

Derived Requirement

The use of the <xccdf:source>, <xccdf:complex-value>, and <xccdf:complex-default> elements within the <xccdf:Value> element SHALL NOT be allowed. Within the <xccdf:choices> element of the <xccdf:Value> element, the use of the <xccdf:complex-choice> element SHALL NOT be allowed.

SRC-278

Not Tested

Requirement

This section lists requirements and recommendations for using Common Platform Enumeration (CPE) to express a CPE component of an SCAP source data stream (see Table 14). ~The Official CPE Dictionary data feed MAY be used by SCAP components to reference CPE names. If use of the Official CPE Dictionary is impractical, a subset of the dictionary MAY be used instead. Creating the reduced official dictionary involves first identifying every CPE in <xccdf:platform> and <cpe2:fact-ref> elements contained within referenced <cpe2:platform-specification> elements in every benchmark in the data stream. Then these CPEs SHALL be matched against every entry in the Official CPE Dictionary using the CPE name matching algorithm [CPE-M]. All CPEs matched in the official dictionary with a result of EQUAL or SUPERSET SHALL be included in the reduced official dictionary

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-278-1

The Official CPE Dictionary data feed MAY be used by SCAP components to reference CPE names. This is optional and currently not checked.

Not Tested

Derived Requirement

The Official CPE Dictionary data feed MAY be used by SCAP components to reference CPE names. This is optional and currently not checked.

SRC-279

Not Tested

Requirement

One or more third-party dictionaries MAY be included in a data stream as well. All such third-party dictionaries SHOULD follow the requirements of the CPE Dictionary specification [CPE-D]. If including an entire third-party dictionary is impractical, a subset of the dictionary MAY be used instead. The reduced dictionary SHALL be created using the same procedure outlined for creating a subset of the official dictionary. ~In all cases, a dictionary component MAY be remote to the data stream collection.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-279-1

One or more third-party dictionaries MAY be included in a data stream as well. This is optional and currently not checked.

Not Tested

Derived Requirement

One or more third-party dictionaries MAY be included in a data stream as well. This is optional and currently not checked.

SRC-280

Not Tested

Requirement

When creating a subset of the Official CPE Dictionary or a third-party dictionary, a <cpe2_dict:check> element on an entry MAY be added or modified if the existing check does not provide satisfactory content to test the presence of the CPE name.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-280-1

When creating a subset of the Official CPE Dictionary or a third-party dictionary, a <cpe2_dict:check> element on an entry MAY be added or modified if the existing check does not provide satisfactory content to test the presence of the CPE name. This is optional and currently not checked.

Not Tested

Derived Requirement

When creating a subset of the Official CPE Dictionary or a third-party dictionary, a <cpe2_dict:check> element on an entry MAY be added or modified if the existing check does not provide satisfactory content to test the presence of the CPE name. This is optional and currently not checked.

SRC-281

Not Tested

Requirement

Each signature SHALL be represented as a <dsig:Signature> element and follow the W3C recommendation [DSIG].

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-281-1

Each signature SHALL be represented as a <dsig:Signature> element and follow the W3C recommendation [DSIG].

Not Tested

Derived Requirement

Each signature SHALL be represented as a <dsig:Signature> element and follow the W3C recommendation [DSIG].

SRC-282

Not Applicable

Requirement

Each <dsig:Signature> element SHALL sign only one data stream

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-282-1 Each <dsig:Signature> element SHALL sign only one data stream Not Applicable

Derived Requirement Details

SRC-282-1

Each <dsig:Signature> element SHALL sign only one data stream

Not Applicable

Derived Requirement

Each <dsig:Signature> element SHALL sign only one data stream

SRC-284

Not Applicable

Requirement

A <dsig:Manifest> element SHALL be included within the <dsig:Signature> element as a <dsig:Object> element. The <dsig:Manifest> element SHALL have a <dsig:Reference> element for each local component referenced by the data stream being signed. External components MAY be omitted from the <dsig:Manifest> element. Each <dsig:Reference> element referencing a <ds:component> or <ds:extended-component> element SHALL point to the component being signed by identifying the component in the @URI attribute using "#" + @Id of the component.

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-284-1

A <dsig:Manifest> SHALL be included in the <dsig:Signature> as a <dsig:Object>

Not Applicable

Derived Requirement

A <dsig:Manifest> SHALL be included in the <dsig:Signature> as a <dsig:Object>

SRC-284-2

The <dsig:Manifest> SHALL have a <dsig:Reference> for each local component referenced by the data stream being signed.

Not Applicable

Derived Requirement

The <dsig:Manifest> SHALL have a <dsig:Reference> for each local component referenced by the data stream being signed.

SRC-285

Not Applicable

Requirement

A <dsig:SignatureProperties> element SHALL be included within the <dsig:Signature> element as a <dsig:Object> element. At least one <dsig:SignatureProperty> element SHALL be populated with <dt:signature-info> as specified in [TMSAD]

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-285-1

A <dsig:SignatureProperties> SHALL be included in the <dsig:Signature> as a <dsig:Object> with a dsig:SignatureProperty populated with tmsad:signature-info

Not Applicable

Derived Requirement

A <dsig:SignatureProperties> SHALL be included in the <dsig:Signature> as a <dsig:Object> with a dsig:SignatureProperty populated with tmsad:signature-info

SRC-286

Not Applicable

Requirement

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <ds:data-stream> element being signed. The <ds:data-stream> element SHALL be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream>

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-286-1

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <ds:data-stream> element being signed. The <ds:data-stream> element SHALL be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream>

Not Applicable

Derived Requirement

The first <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <ds:data-stream> element being signed. The <ds:data-stream> element SHALL be referenced in the @URI attribute using "#" + @Id of the <ds:data-stream>

SRC-287

Not Applicable

Requirement

The second <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element.

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-287-1

The second <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element.

Not Applicable

Derived Requirement

The second <dsig:Reference> element in a <dsig:Signature> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element within the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the<dsig:SignatureProperties> element.

SRC-288

Not Applicable

Requirement

The third <dsig:Reference> element SHALL be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element SHALL be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest>

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-288-1

The third <dsig:Reference> element SHALL be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element SHALL be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest>

Not Applicable

Derived Requirement

The third <dsig:Reference> element SHALL be to the <dsig:Manifest> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:Manifest> element SHALL be referenced in the @URI attribute using "#" + @Id attribute of the <dsig:Manifest>

SRC-289

Not Tested

Requirement

<dsig:Reference> elements on the <dsig:Manifest> element SHOULD be in the same order as the <ds:component-ref> elements on the data stream being signed

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-289-1

<dsig:Reference> elements on the <dsig:Manifest> element SHOULD be in the same order as the <ds:component-ref> elements on the data stream being signed

Not Tested

Derived Requirement

<dsig:Reference> elements on the <dsig:Manifest> element SHOULD be in the same order as the <ds:component-ref> elements on the data stream being signed

SRC-290

Not Applicable

Requirement

Cryptographic key information SHOULD be provided in the <dsig:Signature> element through use of the <dsig:KeyInfo> subelement.

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-290-1

Cryptographic key information SHOULD be provided in the <dsig:Signature> element through use of the <dsig:KeyInfo> subelement.

Not Applicable

Derived Requirement

Cryptographic key information SHOULD be provided in the <dsig:Signature> element through use of the <dsig:KeyInfo> subelement.

SRC-3

Warning

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:version> element and the @id attribute SHALL be used together to uniquely identify all revisions of a benchmark.~Multiple revisions of a single benchmark SHOULD have the same @id attribute value and different <xccdf:version> element values, so that someone who reviews the revisions can readily identify them as multiple versions of a single benchmark. ~Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined. ~The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined.

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-3-1

Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined.

Not Tested

Derived Requirement

Multiple revisions of a single benchmark SHOULD have <xccdf:version> element values that indicate the revision sequence, so that the history of changes from the original benchmark can be determined.

SRC-3-2

The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined.

Warning

Derived Requirement

The @time attribute of the <xccdf:version> element SHOULD be used for a timestamp of when the benchmark was defined.

Test Details

# Test Result Message Context (Line/Column)
1 Fail ' - TEST: exists(xccdf:version/@time)' 46583 : 119  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
<ns10:status date="2019-04-29">
</ns10:status>
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:notice id="terms_of_use" xml:lang="en-US">
</ns10:notice>
<ns10:front-matter xml:lang="en-US">
...
</ns10:front-matter>
<ns10:rear-matter xml:lang="en-US">
</ns10:rear-matter>
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:8"/>
<ns10:version update="https://github.com/OpenSCAP/scap-security-guide/releases/latest">
</ns10:version>
<ns10:metadata>
...
</ns10:metadata>
<ns10:model system="urn:xccdf:scoring:default"/>
... [other children omitted for brevity]
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>

SRC-3-3

The @id and <xccdf:version> together MUST uniquely identify an xccdf:Benchmark in a <scap:data-stream-collection>

Pass

Derived Requirement

The @id and <xccdf:version> together MUST uniquely identify an xccdf:Benchmark in a <scap:data-stream-collection>

SRC-30

Pass

Requirement

If the XCCDF benchmark component references any CPE names, then the SCAP source data stream SHALL include a CPE component, which specifies the products or platforms of interest, and SHALL include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest.

Section 5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-30-1

If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component must be reference from the same data stream, and an OVAL component with a definition of class "inventory" must also be referenced.

Pass

Derived Requirement

If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component must be reference from the same data stream, and an OVAL component with a definition of class "inventory" must also be referenced.

SRC-31

Pass

Requirement

When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either SHALL contain a "#" + @id of a <ds:component-ref> element or SHALL be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute SHALL ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-31-1

When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either SHALL contain a "#" + @id of a <ds:component-ref> element or SHALL be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute SHALL ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

When evaluating an <xccdf:check-content-ref> element within an <xccdf:check> element, its @href attribute either SHALL contain a "#" + @id of a <ds:component-ref> element or SHALL be resolved in the context of the XML Catalog specified as part of the <ds:component-ref> element that is referencing this benchmark. In either case, the @href attribute SHALL ultimately resolve to a <ds:component-ref> element in the data stream referencing the benchmark containing this <xccdf:check-content-ref> element. See Section 3.1.1 for additional information on <ds:component-ref> resolution. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-314

Not Tested

Requirement

The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-314-1

The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

Not Tested

Derived Requirement

The second <dsig:Reference> element SHALL be to the <dsig:SignatureProperties> element captured in a <dsig:Object> element with the <dsig:Signature> element. The <dsig:SignatureProperties> element SHALL be referenced in the @URI attribute using "#" + @Id of the <dsig:SignatureProperties>

SRC-317

Not Tested

Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The original signature SHALL be captured as a <dsig:Object> element on the new <dsig:Signature>

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-317-1

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The original signature SHALL be captured as a <dsig:Object> element on the new <dsig:Signature>

Not Tested

Derived Requirement

In situations where it is desirable to countersign a result data stream (e.g., when a content consumer automatically signs a result data stream and then a person also wants to sign the results), the following requirements apply.~The original signature SHALL be captured as a <dsig:Object> element on the new <dsig:Signature>

SRC-324

Pass

Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "CONFIGURATION".

Section 5.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-324-1

The @use-case attribute in the <ds:data-stream> element SHALL be set to "CONFIGURATION", "VULNERABILITY", "INVENTORY" or "OTHER"

Pass

Derived Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "CONFIGURATION", "VULNERABILITY", "INVENTORY" or "OTHER"

SRC-325

Not Tested

Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "VULNERABILITY".

Section 5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-325-1

The @use-case attribute in the <ds:data-stream> element SHALL be set to "VULNERABILITY". All @use-case attributes are being checked with SRC-324-1 schematron asserts.

Not Tested

Derived Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "VULNERABILITY". All @use-case attributes are being checked with SRC-324-1 schematron asserts.

SRC-327

Not Tested

Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "INVENTORY".

Section 5.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-327-1

The @use-case attribute in the <ds:data-stream> element SHALL be set to "INVENTORY". All @use-case attributes are being checked with SRC-324-1 schematron asserts.

Not Tested

Derived Requirement

The @use-case attribute in the <ds:data-stream> element SHALL be set to "INVENTORY". All @use-case attributes are being checked with SRC-324-1 schematron asserts.

SRC-329

Pass

Requirement

The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all associated Schematron schemas.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-329-1

The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all Schematron rules associated with that schema. SCAPVal performs the Schema validation against source data streams. Result Schema issues are reported under requirement ID RES-363 Component Schema issues are reported under requirement ID A-10

Pass

Derived Requirement

The SCAP source data stream collection SHALL validate against the XML schema representation for the source data stream, as well as all Schematron rules associated with that schema. SCAPVal performs the Schema validation against source data streams. Result Schema issues are reported under requirement ID RES-363 Component Schema issues are reported under requirement ID A-10

SRC-33

Pass

Requirement

If the XCCDF benchmark component references any CPE names, then the SCAP source data stream SHALL include a CPE component, which specifies the products or platforms of interest, and SHALL include one or more OVAL inventory class definitions in an OVAL component that contain the technical procedures for determining whether or not a specific target asset has a product or platform of interest.

Section 5.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-33-1

If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component shall be reference from the same data stream, and an OVAL component with a definition of class "inventory" shall also be referenced.

Pass

Derived Requirement

If an XCCDF referenced from a data stream contains an <xccdf:platform> or <cpe-lang:fact-ref>, then a CPE dictionary component shall be reference from the same data stream, and an OVAL component with a definition of class "inventory" shall also be referenced.

SRC-330

Pass

Requirement

If applicable, each component SHALL validate against its associated Schematron schema. For the SCAP source data stream collection, it SHALL validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element's @schematron-version attribute, and it SHOULD also validate against the latest Schematron rules.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-330-1

For the SCAP source data stream collection, it SHALL validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element’s @schematron-version attribute. SCAPVal performs the schematron rules validation.

Not Tested

Derived Requirement

For the SCAP source data stream collection, it SHALL validate against the version of the SCAP Schematron rules as specified on the <ds:data-stream-collection> element’s @schematron-version attribute. SCAPVal performs the schematron rules validation.

SRC-330-2

SCAP 1.3 source content shall specify schematron-version="1.3"

Pass

Derived Requirement

SCAP 1.3 source content shall specify schematron-version="1.3"

SRC-330-3

If applicable, each component SHALL validate against its associated Schematron stylesheet. SCAPVal will run the appropriate schematron against the components.

Pass

Derived Requirement

If applicable, each component SHALL validate against its associated Schematron stylesheet. SCAPVal will run the appropriate schematron against the components.

Test Details

# Test Result Message Context (Line/Column)
1 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 46627 : 64  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:8"/>
...
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
2 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 50696 : 50  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
3 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 50718 : 52  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
4 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 50812 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="medium">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
5 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 50861 : 52  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
6 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 50985 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="false" severity="medium">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
7 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 51033 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_syslogng_installed" selected="false" severity="medium">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
8 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 51116 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_syslogng_enabled" selected="false" severity="medium">
...
<ns10:platform idref="cpe:/a:machine"/>
...
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
9 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 51162 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_tcp" selected="false" severity="unknown">
...
<ns10:platform idref="cpe:/a:machine"/>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
10 Warning 'Warning: The 'cpe:/' prefix (CPE URI binding) is allowed within an @idref attribute, but the CPE Formatted String binding is preferred. See the XCCDF 1.2.1 specification, Section 6.2.5. - TEST: false()' 51206 : 54  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="unknown">
...
<ns10:platform idref="cpe:/a:machine"/>
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
Omitting 820 additional results.

SRC-331

Pass

Requirement

When referencing a CVE, CCE, or CPE identifier, an <xccdf:Rule> element SHALL have a purpose consistent with one of the rows in ~Table 17. Based on the purpose of the <xccdf:Rule> element, the <xccdf:Rule> SHALL define its <xccdf:ident> element's @system attribute using the corresponding value from Table 17. Also, if the <xccdf:Rule> element references an OVAL Definition, it SHALL reference an OVAL Definition of the specified class. ~~Table 17: <xccdf:Rule> and <xccdf:ident> Element Values~Purpose of the <xccdf:Rule>~OVAL Definition Class~Identifier Type~Value for <xccdf:ident> @system attribute~~Check compliance with a configuration setting~compliance~CCE~http://cce.mitre.org~~Perform a software inventory check ~inventory~CPE~http://cpe.mitre.org~~Check for a software flaw vulnerability~vulnerability~CVE~http://cve.mitre.org~~

Section 3.2.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-331-1

If an <xccdf:Rule> has an <xccdf:ident> with a CCE and that rule reference an OVAL definition, the definition SHALL have @class 'compliance'.

Pass

Derived Requirement

If an <xccdf:Rule> has an <xccdf:ident> with a CCE and that rule reference an OVAL definition, the definition SHALL have @class 'compliance'.

SRC-331-2

If an <xccdf:Rule> has an <xccdf:ident> with a CVE and that rule reference an OVAL definition, the definition SHALL have @class 'vulnerability'.

Pass

Derived Requirement

If an <xccdf:Rule> has an <xccdf:ident> with a CVE and that rule reference an OVAL definition, the definition SHALL have @class 'vulnerability'.

SRC-331-3

If an <xccdf:Rule> has an <xccdf:ident> with a CPE and that rule reference an OVAL definition, the definition SHALL have @class 'inventory'.

Pass

Derived Requirement

If an <xccdf:Rule> has an <xccdf:ident> with a CPE and that rule reference an OVAL definition, the definition SHALL have @class 'inventory'.

SRC-332

Not Tested

Requirement

Content authors MAY place components in any order.

Section 3.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-332-1 Content authors MAY place components in any order. Not Tested

Derived Requirement Details

SRC-332-1

Content authors MAY place components in any order.

Not Tested

Derived Requirement

Content authors MAY place components in any order.

SRC-333

Pass

Requirement

Any single data stream in a data stream collection SHALL NOT reference any component in the collection more than once.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-333-1

Any single data stream in a data stream collection SHALL NOT reference any component in the collection more than once.

Pass

Derived Requirement

Any single data stream in a data stream collection SHALL NOT reference any component in the collection more than once.

SRC-334

Not Tested

Requirement

The SCAP components referenced by each <ds:component> and <ds:extended-component> element SHALL validate against the corresponding component schema and its embedded Schematron rules.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-334-1

The SCAP components referenced by each <ds:component> and <ds:extended-component> element SHALL validate against the corresponding component schema and its embedded Schematron rules. SCAPVal performs the Schematron rules and Schema validation.

Not Tested

Derived Requirement

The SCAP components referenced by each <ds:component> and <ds:extended-component> element SHALL validate against the corresponding component schema and its embedded Schematron rules. SCAPVal performs the Schematron rules and Schema validation.

SRC-338

Not Tested

Requirement

The elements listed in Table 15 have special conventions around the format of their identifiers (@id attribute). Authors SHALL follow these conventions because they preserve the global uniqueness of the resulting identifiers. In Table 15, namespace contains a valid reverse-DNS style string (limited to letters, numbers, periods, and the hyphen character) that is associated with the content author. Examples include "com.acme.finance" and "gov.tla". These namespace strings MAY have any number of parts, and SCAP content consumers processing them SHALL treat them as case-insensitive (e.g., com.ABC is considered identical to com.abc). The name in the format conventions SHALL be an NCName-compliant string [XMLS].

Section 3.1.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-338-1

The elements listed in Table 15 have special conventions around the format of their identifiers (@id attribute). Authors SHALL follow these conventions because they preserve the global uniqueness of the resulting identifiers. In Table 15, namespace contains a valid reverse-DNS style string (limited to letters, numbers, periods, and the hyphen character) that is associated with the content author. Examples include "com.acme.finance" and "gov.tla". These namespace strings MAY have any number of parts, and SCAP content consumers processing them SHALL treat them as case-insensitive (e.g., com.ABC is considered identical to com.abc). The name in the format conventions SHALL be an NCName-compliant string [XMLS].

Not Tested

Derived Requirement

The elements listed in Table 15 have special conventions around the format of their identifiers (@id attribute). Authors SHALL follow these conventions because they preserve the global uniqueness of the resulting identifiers. In Table 15, namespace contains a valid reverse-DNS style string (limited to letters, numbers, periods, and the hyphen character) that is associated with the content author. Examples include "com.acme.finance" and "gov.tla". These namespace strings MAY have any number of parts, and SCAP content consumers processing them SHALL treat them as case-insensitive (e.g., com.ABC is considered identical to com.abc). The name in the format conventions SHALL be an NCName-compliant string [XMLS].

SRC-339

Pass

Requirement

XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE].

Section 3.2.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-339-1 XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE]. Pass

Derived Requirement Details

SRC-339-1

XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE].

Pass

Derived Requirement

XInclude elements SHALL NOT be included in XCCDF content [XINCLUDE].

SRC-341

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @update attribute of the <xccdf:version> element SHOULD be used for a URI that specifies where updates to the benchmark can be obtained.

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-341-1 @update on <xccdf:version> SHOULD be specified Pass

Derived Requirement Details

SRC-341-1

@update on <xccdf:version> SHOULD be specified

Pass

Derived Requirement

@update on <xccdf:version> SHOULD be specified

SRC-343

Pass

Requirement

Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed.

Section 3.2.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-343-1

Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed.

Pass

Derived Requirement

Use of the <xccdf:set-complex-value> element within the <xccdf:Profile> element SHALL NOT be allowed.

SRC-345

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OVAL source data stream component using the <ds:component-ref> approach defined above.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-345-1

<xccdf:check-content-ref> in an OVAL <xccdf:check> SHALL reference an OVAL component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

Pass

Derived Requirement

<xccdf:check-content-ref> in an OVAL <xccdf:check> SHALL reference an OVAL component. If your content contains external references, SCAPVal will attempt to resolve it in -online mode.

SRC-346

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-346-1

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

Pass

Derived Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OVAL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OVAL Definition in the designated OVAL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

SRC-348

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OCIL source data stream component using the <ds:component-ref> approach defined above.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-348-1

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OCIL source data stream component using the <ds:component-ref> approach defined above.

Pass

Derived Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~The @href attribute in the <xccdf:check-content-ref> element SHALL reference an OCIL source data stream component using the <ds:component-ref> approach defined above.

SRC-349

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-349-1

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

Pass

Derived Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~Use of the @name attribute in the <xccdf:check-content-ref> element is OPTIONAL. If present, it SHALL reference an OCIL questionnaire in the designated OCIL source data stream component, otherwise see Section 4.5.2 for information on use of the @multi-check attribute.

SRC-358

Not Tested

Requirement

Checklist authors SHOULD ensure that each CPE name [CPE-N] they specify in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document has a check associated with its CPE name. If a corresponding check does not exist, then it will not be possible to fully detect the presence of the product and determine platform applicability. Because there may be a lag between the time that a new product is available and the Official CPE Dictionary is updated to include a CPE name for that product, third-party dictionaries would need to be used to compensate for the lag.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-358-1

Checklist authors SHOULD ensure that each CPE name [CPE-N] they specify in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document has a check associated with its CPE name. This optional requirement is not currently checked.

Not Tested

Derived Requirement

Checklist authors SHOULD ensure that each CPE name [CPE-N] they specify in an <xccdf:platform> or <cpe2:fact-ref> element within an XCCDF document has a check associated with its CPE name. This optional requirement is not currently checked.

SRC-360

Not Tested

Requirement

One or more XML digital signatures MAY be included as the last elements in the SCAP source data stream collection root element.

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-360-1

One or more XML digital signatures MAY be included as the last elements in the SCAP source data stream collection root element.

Not Tested

Derived Requirement

One or more XML digital signatures MAY be included as the last elements in the SCAP source data stream collection root element.

SRC-376

Not Tested

Requirement

Note that as stated in Table 3 in Section 3.1, each data stream is required to have a @use-case attribute in its <ds:data-stream> element with a value corresponding either to one of the content types defined in this section or to "OTHER", for data streams not corresponding to a defined use case.

Section 5.0 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-376-1

Note that as stated in Table 3 in Section 3.1, each data stream is required to have a @use-case attribute in its <ds:data-stream> element with a value corresponding either to one of the content types defined in this section or to "OTHER", for data streams not corresponding to a defined use case.

Not Tested

Derived Requirement

Note that as stated in Table 3 in Section 3.1, each data stream is required to have a @use-case attribute in its <ds:data-stream> element with a value corresponding either to one of the content types defined in this section or to "OTHER", for data streams not corresponding to a defined use case.

SRC-377

Pass

Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL patch class definition, the following approach SHALL be used:~The source data stream SHALL include the OVAL source data stream component referenced by the patches up-to-date rule, which contains one or more OVAL patch class definitions, and MAY contain other class definitions.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-377-1

An xccdf:Rule with @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" and @multi-check=false the rule MUST reference an OVAL component and a single oval definition of class 'patch'. If your content contains external references, SCAPVal will attempt to resolve them in -online mode.

Pass

Derived Requirement

An xccdf:Rule with @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" and @multi-check=false the rule MUST reference an OVAL component and a single oval definition of class 'patch'. If your content contains external references, SCAPVal will attempt to resolve them in -online mode.

SRC-379

Pass

Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition, the following approach SHALL be used:~Each <xccdf:check-content-ref> element SHALL refer to the single OVAL definition performing the patches up-to-date check.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-379-1

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition the xccdf:check-content-ref> element SHALL refer to the single OVAL definition performing the patches up-to-date check.

Pass

Derived Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition the xccdf:check-content-ref> element SHALL refer to the single OVAL definition performing the patches up-to-date check.

SRC-380

Not Tested

Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition, the following approach SHALL be used:~The @multi-check attribute of the <xccdf:check> element SHALL be set to "false", which is the default value.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-380-1

SRC-377-1 covers this check. When the @multi-check attribute of the <xccdf:check> element SHALL is set to "false" (this is the default). This Patches Up-To-Date Rule is not considered a multi-check and must a single OVAL Patch definition references.

Not Tested

Derived Requirement

SRC-377-1 covers this check. When the @multi-check attribute of the <xccdf:check> element SHALL is set to "false" (this is the default). This Patches Up-To-Date Rule is not considered a multi-check and must a single OVAL Patch definition references.

SRC-381

Not Tested

Requirement

Since the required CVSS version has been updated in SCAP 1.3 to CVSS v3, CVSS v3 scores SHOULD be used instead of CVSS v2 scores when a v3 score is available.

Section 3.2.4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-381-1

Since the required CVSS version has been updated in SCAP 1.3 to CVSS v3, CVSS v3 scores SHOULD be used instead of CVSS v2 scores when a v3 score is available.

Not Tested

Derived Requirement

Since the required CVSS version has been updated in SCAP 1.3 to CVSS v3, CVSS v3 scores SHOULD be used instead of CVSS v2 scores when a v3 score is available.

SRC-38

Pass

Requirement

The type and value binding of the specified <xccdf:Value> is constrained to match that lexical representation of the indicated OVAL Variable data type. Table 18 summarizes the constraints regarding data type usage. Additional information regarding OVAL data types can be found in the OVAL Language documentation and the XCCDF specification [XCCDF]. Additional information on OVAL data types may also be added to Section 4 of the SCAP 1.3 annex document, NIST SP 800-126A.~Table 18: XCCDF-OVAL Data Export Matching Constraints~OVAL Variable Data Type~Matching XCCDF Data Type~ ~int~number~~float~number~~boolean~boolean~~string, evr_string, version, ios_version, fileset_revision, binary~string~~

Section 3.2.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-38-1

Values of XCCDF datatype 'number', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: int, float

Pass

Derived Requirement

Values of XCCDF datatype 'number', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: int, float

SRC-38-2

Values of XCCDF datatype 'boolean', when bound to OVAL variables, the OVAL variables must be the following OVAL type: boolean

Pass

Derived Requirement

Values of XCCDF datatype 'boolean', when bound to OVAL variables, the OVAL variables must be the following OVAL type: boolean

SRC-38-3

Values of XCCDF datatype 'string', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: string, evr_string, version, ios_version, fileset_revision, binary

Pass

Derived Requirement

Values of XCCDF datatype 'string', when bound to OVAL variables, the OVAL variables must be of the following OVAL types: string, evr_string, version, ios_version, fileset_revision, binary

SRC-4

Warning

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The @style attribute SHOULD have the value "SCAP_1.3".

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-4-1

The style attribute of the <xccdf:Benchmark> element SHOULD contain the value "SCAP_1.3".

Warning

Derived Requirement

The style attribute of the <xccdf:Benchmark> element SHOULD contain the value "SCAP_1.3".

Test Details

# Test Result Message Context (Line/Column)
1 Fail 'xccdf:Benchmark xccdf_org.ssgproject.content_benchmark_RHEL-8' 46583 : 119  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
<ns10:status date="2019-04-29">
</ns10:status>
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:notice id="terms_of_use" xml:lang="en-US">
</ns10:notice>
<ns10:front-matter xml:lang="en-US">
...
</ns10:front-matter>
<ns10:rear-matter xml:lang="en-US">
</ns10:rear-matter>
<ns10:platform idref="cpe:/o:redhat:enterprise_linux:8"/>
<ns10:version update="https://github.com/OpenSCAP/scap-security-guide/releases/latest">
</ns10:version>
<ns10:metadata>
...
</ns10:metadata>
<ns10:model system="urn:xccdf:scoring:default"/>
... [other children omitted for brevity]
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>

SRC-5

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:status> element SHALL indicate the current status of the benchmark document. The associated text value SHALL be "draft" for documents released in public draft state and "accepted" for documents that have been officially released by an organization. The @date attribute SHALL be populated with the date of the status change. Additional <xccdf:status> elements MAY be included to indicate historic status transitions.

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-5-1

The <xccdf:status> element SHALL have value 'draft' or 'accepted'

Pass

Derived Requirement

The <xccdf:status> element SHALL have value 'draft' or 'accepted'

SRC-5-2

The "date" attribute of the <xccdf:status> element SHALL be populated with the date of the last status change.

Pass

Derived Requirement

The "date" attribute of the <xccdf:status> element SHALL be populated with the date of the last status change.

SRC-52

Not Tested

Requirement

The version of any particular OVAL document instance SHALL be specified using the <oval:schema_version> content element of the <oval:generator> element, as in this example: ~ <oval:generator>~ <oval:product_name>The OVAL Repository</oval:product_name>~ <oval:schema_version>5.11</oval:schema_version>~ </oval:generator>

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-52-1 OVAL content SHALL include the <oval:generator> and <oval:schema_version> elements. Not Tested

Derived Requirement Details

SRC-52-1

OVAL content SHALL include the <oval:generator> and <oval:schema_version> elements.

Not Tested

Derived Requirement

OVAL content SHALL include the <oval:generator> and <oval:schema_version> elements.

SRC-54

Not Tested

Requirement

If an <oval-var:oval_variables> element is used to carry variable values between an XCCDF processor and an OVAL processor, the <oval:schema_version> of the <oval-var:oval_variables> element SHALL be the same as that of the <oval-def:oval_definitions> element whose external variables are bound by the <oval-var:oval_variables> element.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-54-1

All SCAP OVAL variables content that does not match the <oval-var:schema_version> of it corresponding OVAL definitions source it shall be considered in error.

Not Tested

Derived Requirement

All SCAP OVAL variables content that does not match the <oval-var:schema_version> of it corresponding OVAL definitions source it shall be considered in error.

SRC-71

Not Tested

Requirement

The referenced OVAL inventory class definition SHALL specify the technical procedure for determining whether or not a specific target asset is an instance of the CPE name specified by the <cpe2_dict:cpe-item> element. This usage is encouraged for CPE components.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-71-1

The referenced OVAL inventory class definition SHALL specify the technical procedure for determining whether or not a specific target asset is an instance of the CPE name specified by the <cpe2_dict:cpe-item> element. This usage is encouraged for CPE components.

Not Tested

Derived Requirement

The referenced OVAL inventory class definition SHALL specify the technical procedure for determining whether or not a specific target asset is an instance of the CPE name specified by the <cpe2_dict:cpe-item> element. This usage is encouraged for CPE components.

SRC-72

Pass

Requirement

If a <cpe2_dict:cpe-item> element contained in a CPE component references an OVAL inventory class definition, then that definition SHALL be resolved by an @href attribute referencing an OVAL source data stream component in the same data stream.

Section 3.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-72-1

For all SCAP <cpe-dict:cpe-item>'s specified the CPE dictionary component of an SCAP datastream that contain a cpe-dict:check element, that cpe-dict:check element SHALL refer to an OVAL inventory definition in the same SCAP data stream

Pass

Derived Requirement

For all SCAP <cpe-dict:cpe-item>'s specified the CPE dictionary component of an SCAP datastream that contain a cpe-dict:check element, that cpe-dict:check element SHALL refer to an OVAL inventory definition in the same SCAP data stream

SRC-74

Pass

Requirement

SCAP content referencing a configuration setting SHALL use the official CCE identifier if a CCE entry for a particular configuration setting exists in the official CCE list.

Section 3.7 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
SRC-74-1 All CCE references SHOULD be in the official CCE dictionary. Pass

Derived Requirement Details

SRC-74-1

All CCE references SHOULD be in the official CCE dictionary.

Pass

Derived Requirement

All CCE references SHOULD be in the official CCE dictionary.

SRC-8

Pass

Requirement

The following requirements and recommendations apply to the <xccdf:Benchmark> element:~The <xccdf:metadata> element SHALL be provided and SHALL, at minimum, contain the Dublin Core [DCES] terms from Table 16. If provided, additional Dublin Core terms SHALL follow the required terms within the element sequence.~Table 16: Use of Dublin Core Terms in <xccdf:metadata>~Dublin Core Term~Description of Use~~<dc:creator>~The person, organization, and/or service that created the benchmark~~<dc:publisher>~The person, organization, and/or service that published the benchmark~~<dc:contributor>~The person, organization, and/or service that contributed to the creation of the benchmark~~<dc:source>~An identifier that indicates the organizational context of the benchmark's @id attribute. An organizationally specific URI SHOULD be used.~~

Section 3.2.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-8-1

xccdf:Benchmark/xccdf:metadata SHALL contain, at minimum, one of each of the Dublin Core terms <dc:creator>, <dc:publisher>, <dc:contributor>, <dc:source>

Pass

Derived Requirement

xccdf:Benchmark/xccdf:metadata SHALL contain, at minimum, one of each of the Dublin Core terms <dc:creator>, <dc:publisher>, <dc:contributor>, <dc:source>

SRC-8-2

The <xccdf:metadata> element SHALL be provided in the <xccdf:Benchmark> element.

Pass

Derived Requirement

The <xccdf:metadata> element SHALL be provided in the <xccdf:Benchmark> element.

SRC-9

Pass

Requirement

The following requirements and conventions apply to the <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule> elements:~One or more instances of the <xccdf:title> element SHALL be provided. Each instance SHALL contain a text value that briefly indicates the purpose of the containing element.

Section 3.2.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-9-1

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

Pass

Derived Requirement

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

SRC-9-2

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

Pass

Derived Requirement

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

SRC-9-3

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

Pass

Derived Requirement

For all <xccdf:Benchmark>, <xccdf:Profile>, <xccdf:Value>, <xccdf:Group>, and <xccdf:Rule>, check for the existence of <xccdf:title>; if not found, the content shall be considered to be in error.

TOOL-110

Not Tested

Requirement

Content consumers supporting SCAP 1.3 SHALL be capable of processing SCAP 1.3 content and the legacy SCAP 1.2 and 1.1 content versions. Content consumers SHALL process SCAP content as defined under the corresponding version of NIST SP 800-126 (for SCAP 1.3, this revision; for SCAP 1.2, revision 2; for SCAP 1.1, revision 1).

Section 4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-110-1

Content consumers supporting SCAP 1.3 SHALL be capable of processing SCAP 1.3 content and the legacy SCAP 1.2 and 1.1 content versions. Content consumers SHALL process SCAP content as defined under the corresponding version of NIST SP 800-126 (for SCAP 1.3, this revision; for SCAP 1.2, revision 2; for SCAP 1.1, revision 1).

Not Tested

Derived Requirement

Content consumers supporting SCAP 1.3 SHALL be capable of processing SCAP 1.3 content and the legacy SCAP 1.2 and 1.1 content versions. Content consumers SHALL process SCAP content as defined under the corresponding version of NIST SP 800-126 (for SCAP 1.3, this revision; for SCAP 1.2, revision 2; for SCAP 1.1, revision 1).

TOOL-141

Not Tested

Requirement

In order to be SCAP conformant, an SCAP content consumer SHALL be able to produce all the types of OVAL Results output described below. The specific result output SHALL be configurable within the SCAP content consumer.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-141-1

In order to be SCAP conformant, an SCAP content consumer SHALL be able to produce all the types of OVAL Results output described below. The specific result output SHALL be configurable within the SCAP content consumer.

Not Tested

Derived Requirement

In order to be SCAP conformant, an SCAP content consumer SHALL be able to produce all the types of OVAL Results output described below. The specific result output SHALL be configurable within the SCAP content consumer.

TOOL-202

Not Tested

Requirement

Each OVAL result data stream component SHALL validate against at least one version of the OVAL Results schema that corresponds to an OVAL component specification version specified in Section 2 of the annex, regardless of the version of the OVAL Definitions document that was evaluated.

Section 4.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-202-1

The following requirements and recommendations pertain to content consumers generating OVAL result data stream components.~Each OVAL result data stream component SHALL validate against version 5.11.2 of the OVAL Results schema regardless of the version of the OVAL Definitions document that was evaluated. SCAPVal implements this.

Not Tested

Derived Requirement

The following requirements and recommendations pertain to content consumers generating OVAL result data stream components.~Each OVAL result data stream component SHALL validate against version 5.11.2 of the OVAL Results schema regardless of the version of the OVAL Definitions document that was evaluated. SCAPVal implements this.

TOOL-218

Not Tested

Requirement

Content consumers SHALL be capable of validating SCAP content against the appropriate schemas and Schematron stylesheets, detecting and reporting errors, and failing gracefully if there are errors.

Section 4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-218-1

Content consumers SHALL be capable of validating SCAP content against the appropriate schemas and Schematron stylesheets, detecting and reporting errors, and failing gracefully if there are errors.

Not Tested

Derived Requirement

Content consumers SHALL be capable of validating SCAP content against the appropriate schemas and Schematron stylesheets, detecting and reporting errors, and failing gracefully if there are errors.

TOOL-232

Not Tested

Requirement

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~For each <xccdf:check-content-ref> element, a content consumer either SHALL attempt to retrieve the document referenced by the <ds:component-ref> element that is referenced directly by the <xccdf:check-content-ref> element's @href attribute, or it SHALL resolve the @href attribute within the context of the XML Catalog specified as part of the <ds:component-ref> element used to reference this benchmark. If not resolvable, the next available <xccdf:check-content-ref> element SHALL be evaluated. If none of the <xccdf:check-content-ref> elements are resolvable, then the result of the rule evaluation SHALL be the XCCDF "notchecked" status and processing of the check SHALL end

Section 4.3.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-232-1

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~For each <xccdf:check-content-ref> element, a content consumer either SHALL attempt to retrieve the document referenced by the <ds:component-ref> element that is referenced directly by the <xccdf:check-content-ref> element's @href attribute, or it SHALL resolve the @href attribute within the context of the XML Catalog specified as part of the <ds:component-ref> element used to reference this benchmark. If not resolvable, the next available <xccdf:check-content-ref> element SHALL be evaluated. If none of the <xccdf:check-content-ref> elements are resolvable, then the result of the rule evaluation SHALL be the XCCDF "notchecked" status and processing of the check SHALL end

Not Tested

Derived Requirement

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~For each <xccdf:check-content-ref> element, a content consumer either SHALL attempt to retrieve the document referenced by the <ds:component-ref> element that is referenced directly by the <xccdf:check-content-ref> element's @href attribute, or it SHALL resolve the @href attribute within the context of the XML Catalog specified as part of the <ds:component-ref> element used to reference this benchmark. If not resolvable, the next available <xccdf:check-content-ref> element SHALL be evaluated. If none of the <xccdf:check-content-ref> elements are resolvable, then the result of the rule evaluation SHALL be the XCCDF "notchecked" status and processing of the check SHALL end

TOOL-233

Not Tested

Requirement

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~Once a resolvable <xccdf:check-content-ref> element is found, then checking system processing SHALL proceed. When evaluating a rule, an <xccdf:rule-result/xccdf:message> with the @severity attribute value of "info" SHALL be generated, indicating the <xccdf:check-content-ref> @href attribute and @name attribute, if provided.

Section 4.3.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-233-1

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~Once a resolvable <xccdf:check-content-ref> element is found, then checking system processing SHALL proceed. When evaluating a rule, an <xccdf:rule-result/xccdf:message> with the @severity attribute value of "info" SHALL be generated, indicating the <xccdf:check-content-ref> @href attribute and @name attribute, if provided.

Not Tested

Derived Requirement

If an XCCDF component has multiple <xccdf:check-content-ref> elements, then check processing SHALL be performed according to [XCCDF:7.2.3.5.1] with the following changes:~Once a resolvable <xccdf:check-content-ref> element is found, then checking system processing SHALL proceed. When evaluating a rule, an <xccdf:rule-result/xccdf:message> with the @severity attribute value of "info" SHALL be generated, indicating the <xccdf:check-content-ref> @href attribute and @name attribute, if provided.

TOOL-254

Not Tested

Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~Each XCCDF result data stream component SHALL comply with the XCCDF Results schema.

Section 4.5 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-254-1

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~Each XCCDF result data stream component SHALL comply with the XCCDF Results schema. SCAPVal validates XCCDF content with the XCCDF schema

Not Tested

Derived Requirement

The following requirements and recommendations pertain to content consumers generating XCCDF result data stream components.~Each XCCDF result data stream component SHALL comply with the XCCDF Results schema. SCAPVal validates XCCDF content with the XCCDF schema

TOOL-269

Not Tested

Requirement

If no CCE entry exists for the configuration setting of interest, the content author SHOULD seek to have a CCE identifier issued for the configuration setting.

Section 3.7 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-269-1

If no CCE entry exists for the configuration setting of interest, the content author SHOULD seek to have a CCE identifier issued for the configuration setting.

Not Tested

Derived Requirement

If no CCE entry exists for the configuration setting of interest, the content author SHOULD seek to have a CCE identifier issued for the configuration setting.

TOOL-270

Not Tested

Requirement

When processing a patches up-to-date rule, only OVAL patch class definitions SHALL be evaluated; all other classes of definitions (e.g., inventory class definitions) SHALL NOT be evaluated except when they serve, directly or indirectly, as criteria (extended definitions) of patch definitions.

Section 4.3.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-270-1

When processing a patches up-to-date rule, only OVAL patch class definitions SHALL be evaluated; all other classes of definitions (e.g., inventory class definitions) SHALL NOT be evaluated except when they serve, directly or indirectly, as criteria (extended definitions) of patch definitions.

Not Tested

Derived Requirement

When processing a patches up-to-date rule, only OVAL patch class definitions SHALL be evaluated; all other classes of definitions (e.g., inventory class definitions) SHALL NOT be evaluated except when they serve, directly or indirectly, as criteria (extended definitions) of patch definitions.

TOOL-283

Not Tested

Requirement

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD]

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-283-1

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD] SCAPVal runs the tmsad.1.0.sch schematron against SCAP content along with XML schema validation.

Not Tested

Derived Requirement

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD] SCAPVal runs the tmsad.1.0.sch schematron against SCAP content along with XML schema validation.

TOOL-291

Not Tested

Requirement

Content consumers SHOULD validate XML digital signatures if they exist in the content. Validating a signature includes confirming that the signature value is valid, all of the reference hashes in the signature and manifest are correct, and the public key used to verify the signature is from a trusted source. A data stream with a signature that does not validate SHOULD NOT be evaluated by a content consumer.

Section 4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-291-1

Content consumers SHOULD validate XML digital signatures if they exist in the content. Validating a signature includes confirming that the signature value is valid, all of the reference hashes in the signature and manifest are correct, and the public key used to verify the signature is from a trusted source. A data stream with a signature that does not validate SHOULD NOT be evaluated by a content consumer.

Not Tested

Derived Requirement

Content consumers SHOULD validate XML digital signatures if they exist in the content. Validating a signature includes confirming that the signature value is valid, all of the reference hashes in the signature and manifest are correct, and the public key used to verify the signature is from a trusted source. A data stream with a signature that does not validate SHOULD NOT be evaluated by a content consumer.

TOOL-293

Not Tested

Requirement

If more than one <ds:data-stream> element is specified on the <ds:data-stream-collection>, the ID of the <ds:data-stream> to execute SHALL be indicated to the content consumer, and the content consumer SHALL use the specified <ds:data-stream>

Section 4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-293-1

If more than one <ds:data-stream> element is specified on the <ds:data-stream-collection>, the ID of the <ds:data-stream> to execute SHALL be indicated to the content consumer, and the content consumer SHALL use the specified <ds:data-stream>

Not Tested

Derived Requirement

If more than one <ds:data-stream> element is specified on the <ds:data-stream-collection>, the ID of the <ds:data-stream> to execute SHALL be indicated to the content consumer, and the content consumer SHALL use the specified <ds:data-stream>

TOOL-294

Not Tested

Requirement

If more than one <xccdf:Benchmark> is referenced by a <ds:data-stream>, the ID of the <xccdf:Benchmark> to execute SHALL be indicated to the content consumer, and the content consumer SHALL process the indicated <xccdf:Benchmark>

Section 4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-294-1

If more than one <xccdf:Benchmark> is referenced by a <ds:data-stream>, the ID of the <xccdf:Benchmark> to execute SHALL be indicated to the content consumer, and the content consumer SHALL process the indicated <xccdf:Benchmark>

Not Tested

Derived Requirement

If more than one <xccdf:Benchmark> is referenced by a <ds:data-stream>, the ID of the <xccdf:Benchmark> to execute SHALL be indicated to the content consumer, and the content consumer SHALL process the indicated <xccdf:Benchmark>

TOOL-295

Not Tested

Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The CPE SHALL be matched against all CPEs in all of the dictionaries referenced by the <ds:data-stream> element. All CPEs that return an EQUAL or SUPERSET result as defined in CPE Name Matching [CPE-M] SHALL be used in evaluating the <xccdf:platform> or <cpe2:fact-ref>.

Section 4.3.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-295-1

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The CPE SHALL be matched against all CPEs in all of the dictionaries referenced by the <ds:data-stream> element. All CPEs that return an EQUAL or SUPERSET result as defined in CPE Name Matching [CPE-M] SHALL be used in evaluating the <xccdf:platform> or <cpe2:fact-ref>.

Not Tested

Derived Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The CPE SHALL be matched against all CPEs in all of the dictionaries referenced by the <ds:data-stream> element. All CPEs that return an EQUAL or SUPERSET result as defined in CPE Name Matching [CPE-M] SHALL be used in evaluating the <xccdf:platform> or <cpe2:fact-ref>.

TOOL-296

Not Tested

Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~Either a list of CPEs found on the target asset MUST be known before the scan, or a list SHALL be generated. If a previously known list is used, it MUST be equivalent to a newly generated list. To generate the list, the <cpe2_dict:check> element data associated with the found <cpe2_dict:cpe-item> elements SHALL be evaluated against the target using the referenced OVAL inventory class definition. If a <cpe2_dict:check> returns "pass", then the corresponding CPE SHALL be added to the list of CPEs found on the target.

Section 4.3.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-296-1

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~Either a list of CPEs found on the target asset SHALL be known before the scan, or a list SHALL be generated. If a previously known list is used, it SHALL be equivalent to a newly generated list. To generate the list, the <cpe2_dict:check> element data associated with the found <cpe2_dict:cpe-item> elements SHALL be evaluated against the target using the referenced OVAL inventory class definition. If a <cpe2_dict:check> returns "pass", then the corresponding CPE SHALL be added to the list of CPEs found on the target.

Not Tested

Derived Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~Either a list of CPEs found on the target asset SHALL be known before the scan, or a list SHALL be generated. If a previously known list is used, it SHALL be equivalent to a newly generated list. To generate the list, the <cpe2_dict:check> element data associated with the found <cpe2_dict:cpe-item> elements SHALL be evaluated against the target using the referenced OVAL inventory class definition. If a <cpe2_dict:check> returns "pass", then the corresponding CPE SHALL be added to the list of CPEs found on the target.

TOOL-297

Not Tested

Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The list of CPEs found on the target asset, along with the <xccdf:platform> or <cpe2:platform-specification> SHALL be used as input to the CPE Applicability Language [CPE-L] algorithm to determine the XCCDF Benchmark applicability to the target asset.

Section 4.3.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-297-1

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The list of CPEs found on the target asset, along with the <xccdf:platform> or <cpe2:platform-specification> SHALL be used as input to the CPE Applicability Language [CPE-L] algorithm to determine the XCCDF Benchmark applicability to the target asset.

Not Tested

Derived Requirement

CPEs referenced in an <xccdf:platform> element directly or by a <cpe2:fact-ref> contained within a referenced <cpe2:platform-specification> element SHALL be evaluated as follows to determine their presence on a machine:~The list of CPEs found on the target asset, along with the <xccdf:platform> or <cpe2:platform-specification> SHALL be used as input to the CPE Applicability Language [CPE-L] algorithm to determine the XCCDF Benchmark applicability to the target asset.

TOOL-298

Not Tested

Requirement

The ARF report SHALL contain a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target

Section 4.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-298-1

The ARF report SHALL contain a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target

Not Tested

Derived Requirement

The ARF report SHALL contain a report object for each XCCDF, OVAL, and OCIL component executed when a source data stream is evaluated against a target

TOOL-308

Not Tested

Requirement

The signature MUST be represented as a <dsig:Signature> element and MUST follow the W3C recommendation [DSIG].

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-308-1

The signature MUST be represented as a <dsig:Signature> element and MUST follow the W3C recommendation [DSIG]. SCAPVal runs the tmsad.1.0.sch schematron against SCAP content along with XML schema validation.

Not Tested

Derived Requirement

The signature MUST be represented as a <dsig:Signature> element and MUST follow the W3C recommendation [DSIG]. SCAPVal runs the tmsad.1.0.sch schematron against SCAP content along with XML schema validation.

TOOL-310

Not Tested

Requirement

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD]

Section 4.8 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-310-1

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD] SCAPVal runs the tmsad-1.0.sch schematron against SCAP content along with XML schema validation.

Not Tested

Derived Requirement

The <dsig:Signature> element SHALL follow the recommendations in [TMSAD] SCAPVal runs the tmsad-1.0.sch schematron against SCAP content along with XML schema validation.

TOOL-335

Not Tested

Requirement

Schematron rules to check well-formed SCAP content. The Schematron schemas for the SCAP specification and its applicable component specifications are located at https://scap.nist.gov/revision/1.3/#schematron. Source content SHOULD pass all Schematron assertions in the Schematron rule files. When creating source content, failed assertions with a "WARNING" or "INFO" flag MAY be disregarded if the assertion discovers an issue in the content that is justifiable and expected based on the needs of the content author. When executing source content, all failed assertions with a "WARNING" or "INFO" flag SHALL be disregarded.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-335-1

Schematron rules to check well-formed SCAP content. The Schematron schemas for the SCAP specification and its applicable component specifications are located at https://scap.nist.gov/revision/1.3/#schematron. Source content SHOULD pass all Schematron assertions in the Schematron rule files. When creating source content, failed assertions with a "WARNING" or "INFO" flag MAY be disregarded if the assertion discovers an issue in the content that is justifiable and expected based on the needs of the content author. When executing source content, all failed assertions with a "WARNING" or "INFO" flag SHALL be disregarded.

Not Tested

Derived Requirement

Schematron rules to check well-formed SCAP content. The Schematron schemas for the SCAP specification and its applicable component specifications are located at https://scap.nist.gov/revision/1.3/#schematron. Source content SHOULD pass all Schematron assertions in the Schematron rule files. When creating source content, failed assertions with a "WARNING" or "INFO" flag MAY be disregarded if the assertion discovers an issue in the content that is justifiable and expected based on the needs of the content author. When executing source content, all failed assertions with a "WARNING" or "INFO" flag SHALL be disregarded.

TOOL-336

Not Tested

Requirement

The latest Schematron schema SHOULD be used in place of any earlier versions. If the latest file is unavailable, the version specified on the <ds:data-stream-collection> element's @schematron-version attribute SHALL be used instead.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-336-1

The latest Schematron schema SHOULD be used in place of any earlier versions. If the latest file is unavailable, the version specified on the <ds:data-stream-collection> element's @schematron-version attribute SHALL be used instead.

Not Tested

Derived Requirement

The latest Schematron schema SHOULD be used in place of any earlier versions. If the latest file is unavailable, the version specified on the <ds:data-stream-collection> element's @schematron-version attribute SHALL be used instead.

TOOL-337

Not Tested

Requirement

Also, for the component specifications, the Schematron schema on the SCAP website SHALL be used in place of any corresponding Schematron schema available elsewhere.

Section 3.1.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-337-1

Also, for the component specifications, the Schematron schema on the SCAP website SHALL be used in place of any corresponding Schematron schema available elsewhere.

Not Tested

Derived Requirement

Also, for the component specifications, the Schematron schema on the SCAP website SHALL be used in place of any corresponding Schematron schema available elsewhere.

TOOL-340

Not Tested

Requirement

All remaining OPTIONAL elements in the XCCDF schema MAY be included at the author's discretion unless otherwise noted in this document.

Section 3.2.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-340-1

All remaining OPTIONAL elements in the XCCDF schema MAY be included at the author's discretion unless otherwise noted in this document.

Not Tested

Derived Requirement

All remaining OPTIONAL elements in the XCCDF schema MAY be included at the author's discretion unless otherwise noted in this document.

TOOL-342

Not Tested

Requirement

As stated in the XCCDF specification, the use of an <xccdf:Profile> element is not required.

Section 3.2.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-342-1

As stated in the XCCDF specification, the use of an <xccdf:Profile> element is not required.

Not Tested

Derived Requirement

As stated in the XCCDF specification, the use of an <xccdf:Profile> element is not required.

TOOL-344

Not Tested

Requirement

See Section 4.5.1 for information on the meaning of a "pass/fail" rule result relating to each of the identifier types in Table 17. All rules that contain CCE, CPE, or CVE entries in their <xccdf:ident> elements SHALL obey these meanings. As a result, such <xccdf:ident> elements SHALL only be included either if the recommendation is identical to these associated meanings or if they have a @con:negate attribute (as described in Section 4.5.1) set to comply with the intended meaning (by default, @con:negate is set to false). In SCAP, an <xccdf:ident> element is not simply a reference to related material – it is a declaration of exact alignment with the described meanings.

Section 3.2.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-344-1

See Section 4.5.1 for information on the meaning of a "pass/fail" rule result relating to each of the identifier types in Table 17. All rules that contain CCE, CPE, or CVE entries in their <xccdf:ident> elements SHALL obey these meanings. As a result, such <xccdf:ident> elements SHALL only be included either if the recommendation is identical to these associated meanings or if they have a @con:negate attribute (as described in Section 4.5.1) set to comply with the intended meaning (by default, @con:negate is set to false). In SCAP, an <xccdf:ident> element is not simply a reference to related material – it is a declaration of exact alignment with the described meanings.

Not Tested

Derived Requirement

See Section 4.5.1 for information on the meaning of a "pass/fail" rule result relating to each of the identifier types in Table 17. All rules that contain CCE, CPE, or CVE entries in their <xccdf:ident> elements SHALL obey these meanings. As a result, such <xccdf:ident> elements SHALL only be included either if the recommendation is identical to these associated meanings or if they have a @con:negate attribute (as described in Section 4.5.1) set to comply with the intended meaning (by default, @con:negate is set to false). In SCAP, an <xccdf:ident> element is not simply a reference to related material – it is a declaration of exact alignment with the described meanings.

TOOL-347

Not Tested

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system ~OCIL questionnaires SHOULD NOT be used if OVAL can perform the same check correctly.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-347-1

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system ~OCIL questionnaires SHOULD NOT be used if OVAL can perform the same check correctly.

Not Tested

Derived Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system ~OCIL questionnaires SHOULD NOT be used if OVAL can perform the same check correctly.

TOOL-350

Not Tested

Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~All requirements in Appendix B of NIST IR 7692, Specifications for the Open Checklist Interactive Language (OCIL) [OCIL] SHALL be followed.

Section 3.2.4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-350-1

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~All requirements in Appendix B of NIST IR 7692, Specifications for the Open Checklist Interactive Language (OCIL) [OCIL] SHALL be followed. SCAPVal performs the Schematron rules and Schema validation for OCIL.

Not Tested

Derived Requirement

The following requirements and recommendations apply to the <xccdf:check> element:~~Content containing the use of checking systems other than the OVAL and OCIL checking systems SHALL NOT be considered well-formed with regards to SCAP.~~OCIL checking system~All requirements in Appendix B of NIST IR 7692, Specifications for the Open Checklist Interactive Language (OCIL) [OCIL] SHALL be followed. SCAPVal performs the Schematron rules and Schema validation for OCIL.

TOOL-352

Not Tested

Requirement

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-352-1

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer.

Not Tested

Derived Requirement

An OVAL source data stream component MAY be used to represent a series of checks to verify that patches have been installed. Historically, an XCCDF convention has been used to identify such a reference. An XCCDF benchmark MAY include a patches up-to-date rule that SHALL reference an OVAL source data stream component. ~When implementing a patches up-to-date XCCDF rule that checks for patches via numerous OVAL patch class definitions, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer.

TOOL-353

Not Tested

Requirement

CCSS scores are more stable than CVSS scores, but they still may change over time. Accordingly, during scoring, current CCSS scores acquired dynamically, such as from a data feed, MAY be used in place of the @weight attribute within XCCDF configuration setting-related rules.

Section 3.2.4.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-353-1

CCSS scores are more stable than CVSS scores, but they still may change over time. Accordingly, during scoring, current CCSS scores acquired dynamically, such as from a data feed, MAY be used in place of the @weight attribute within XCCDF configuration setting-related rules.

Not Tested

Derived Requirement

CCSS scores are more stable than CVSS scores, but they still may change over time. Accordingly, during scoring, current CCSS scores acquired dynamically, such as from a data feed, MAY be used in place of the @weight attribute within XCCDF configuration setting-related rules.

TOOL-354

Not Tested

Requirement

XCCDF group extension SHALL NOT be allowed.

Section 3.2.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
TOOL-354-1 XCCDF group extension SHALL NOT be allowed. SCAPVal does not implement this. Not Tested

Derived Requirement Details

TOOL-354-1

XCCDF group extension SHALL NOT be allowed. SCAPVal does not implement this.

Not Tested

Derived Requirement

XCCDF group extension SHALL NOT be allowed. SCAPVal does not implement this.

TOOL-356

Not Tested

Requirement

OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL.

Section 3.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement # Summary Result
TOOL-356-1 OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL. Not Tested

Derived Requirement Details

TOOL-356-1

OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL.

Not Tested

Derived Requirement

OCIL content SHOULD be used for checking rules that cannot be fully automated with OVAL.

TOOL-357

Not Tested

Requirement

If an <ocil:questionnaire> element maps to one or more CCE, CVE, and/or CPE identifiers, it SHOULD include <ocil:reference> elements that reference those identifiers using the corresponding following format:~<ocil:reference href="http://cce.mitre.org">CCE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cve.mitre.org">CVE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cpe.mitre.org">CPE_identifier</ocil:reference>

Section 3.4 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-357-1

If an <ocil:questionnaire> element maps to one or more CCE, CVE, and/or CPE identifiers, it SHOULD include <ocil:reference> elements that reference those identifiers using the corresponding following format:~<ocil:reference href="http://cce.mitre.org">CCE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cve.mitre.org">CVE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cpe.mitre.org">CPE_identifier</ocil:reference>

Not Tested

Derived Requirement

If an <ocil:questionnaire> element maps to one or more CCE, CVE, and/or CPE identifiers, it SHOULD include <ocil:reference> elements that reference those identifiers using the corresponding following format:~<ocil:reference href="http://cce.mitre.org">CCE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cve.mitre.org">CVE_identifier</ocil:reference>_x000B__x000B_<ocil:reference href="http://cpe.mitre.org">CPE_identifier</ocil:reference>

TOOL-359

Not Tested

Requirement

As such, content authors MAY digitally sign source content following the guidelines in [TMSAD], along with the following requirements.

Section 3.11 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-359-1

As such, content authors MAY digitally sign source content following the guidelines in [TMSAD], along with the following requirements.

Not Tested

Derived Requirement

As such, content authors MAY digitally sign source content following the guidelines in [TMSAD], along with the following requirements.

TOOL-361

Not Tested

Requirement

Content consumers that process legacy SCAP content SHALL be capable of outputting results in the current SCAP revision. Additionally, content consumers MAY output results in the same SCAP version as the source content. For producers of results in legacy formats, legacy results MAY also be converted into results based on the current SCAP revision.

Section 4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-361-1

Content consumers that process legacy SCAP content SHALL be capable of outputting results in the current SCAP revision. Additionally, content consumers MAY output results in the same SCAP version as the source content. For producers of results in legacy formats, legacy results MAY also be converted into results based on the current SCAP revision.

Not Tested

Derived Requirement

Content consumers that process legacy SCAP content SHALL be capable of outputting results in the current SCAP revision. Additionally, content consumers MAY output results in the same SCAP version as the source content. For producers of results in legacy formats, legacy results MAY also be converted into results based on the current SCAP revision.

TOOL-362

Not Tested

Requirement

Whenever a <ds:extended-component> that is not recognized by the tool is referenced from a <ds:data-stream>, <ds:component>, or <ds:extended-component> element, the tool SHALL issue a warning.

Section 4.2 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-362-1

Whenever a <ds:extended-component> that is not recognized by the tool is referenced from a <ds:data-stream>, <ds:component>, or <ds:extended-component> element, the tool SHALL issue a warning.

Not Tested

Derived Requirement

Whenever a <ds:extended-component> that is not recognized by the tool is referenced from a <ds:data-stream>, <ds:component>, or <ds:extended-component> element, the tool SHALL issue a warning.

TOOL-368

Not Tested

Requirement

Validation of each component SHALL be done in accordance with the portions of this document that define requirements for the component.

Section 4.4.1 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-368-1

Validation of each component SHALL be done in accordance with the portions of this document that define requirements for the component.

Not Tested

Derived Requirement

Validation of each component SHALL be done in accordance with the portions of this document that define requirements for the component.

TOOL-378

Not Tested

Requirement

When implementing a patches up-to-date XCCDF rule that checks for patches via a single OVAL definition, the following approach SHALL be used:~The <xccdf:Rule> element that references an OVAL source data stream component SHALL have the @id attribute value of "xccdf_NAMESPACE_rule_security_patches_up_to_date", where NAMESPACE is the reverse DNS format namespace associated with the content maintainer.

Section 3.2.4.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-378-1

Various other schematron rules check for this @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" when evaluating a Patches Up-To-Date Rule. If the id is present, the content is treated as a Patches Up-To-Date Rule or its not. There is nothing to test for this requirement.

Not Tested

Derived Requirement

Various other schematron rules check for this @id "xccdf_NAMESPACE_rule_security_patches_up_to_date" when evaluating a Patches Up-To-Date Rule. If the id is present, the content is treated as a Patches Up-To-Date Rule or its not. There is nothing to test for this requirement.

TOOL-382

Not Tested

Requirement

The version(s) that is specified using the <oval:schema_version> content element SHALL correspond to the version(s) specified by the @xsi:schemaLocation attribute value for the OVAL schema, if an @xsi:schemaLocation attribute is specified.

Section 3.3 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

SRC-382-1

The version(s) that is specified using the <oval:schema_version> content element SHALL correspond to the version(s) specified by the @xsi:schemaLocation attribute value for the OVAL schema, if an @xsi:schemaLocation attribute is specified. This is a SCAP tool requirement. SCAPVal properly implements this when validating OVAL content.

Not Tested

Derived Requirement

The version(s) that is specified using the <oval:schema_version> content element SHALL correspond to the version(s) specified by the @xsi:schemaLocation attribute value for the OVAL schema, if an @xsi:schemaLocation attribute is specified. This is a SCAP tool requirement. SCAPVal properly implements this when validating OVAL content.

TOOL-383

Not Tested

Requirement

A SWID tag installed on a target asset SHALL be identified by an OVAL inventory class definition.

Section 3.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-383-1

A SWID tag installed on a target asset SHALL be identified by an OVAL inventory class definition. SCAPVAL does not check for SWID tags.

Not Tested

Derived Requirement

A SWID tag installed on a target asset SHALL be identified by an OVAL inventory class definition. SCAPVAL does not check for SWID tags.

TOOL-384

Not Tested

Requirement

The definition SHOULD use the <independent-def:xmlfilecontent_object> to search the file system for one or more SWID tags expressed in XML that match a desired XPath expression.

Section 3.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-384-1

The definition SHOULD use the <independent-def:xmlfilecontent_object> to search the file system for one or more SWID tags expressed in XML that match a desired XPath expression. SCAPVAL does not check for SWID tags.

Not Tested

Derived Requirement

The definition SHOULD use the <independent-def:xmlfilecontent_object> to search the file system for one or more SWID tags expressed in XML that match a desired XPath expression. SCAPVAL does not check for SWID tags.

TOOL-385

Not Tested

Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~One or more <cpe2-dict:check> elements that reference an OVAL inventory class definition that searches for the presence of a matching SWID tag.

Section 3.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-385-1

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~One or more <cpe2-dict:check> elements that reference an OVAL inventory class definition that searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

Not Tested

Derived Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~One or more <cpe2-dict:check> elements that reference an OVAL inventory class definition that searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

TOOL-386

Not Tested

Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~A <cpe:check-fact-ref> element that references an OVAL inventory class definition that searches for the presence of a matching SWID tag.

Section 3.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-386-1

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~A <cpe:check-fact-ref> element that references an OVAL inventory class definition that searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

Not Tested

Derived Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~A <cpe:check-fact-ref> element that references an OVAL inventory class definition that searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

TOOL-387

Not Tested

Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~An OVAL definition that references another OVAL inventory class definition using the <oval-def:extend_definition> element where the extended definition searches for the presence of a matching SWID tag.

Section 3.6 of The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3

Derived Requirement Results

Derived Requirement Details

TOOL-387-1

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~An OVAL definition that references another OVAL inventory class definition using the <oval-def:extend_definition> element where the extended definition searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

Not Tested

Derived Requirement

If a SWID tag has been installed on the target endpoint for a software product or patch, then one of the following methods SHALL be used to detect the SWID tag on the target asset:~An OVAL definition that references another OVAL inventory class definition using the <oval-def:extend_definition> element where the extended definition searches for the presence of a matching SWID tag. SCAPVAL does not check for SWID tags.

A-10

Not Tested

Requirement

The SCAP content must conform to all associated XML schemas. This requirement covers SCAP Component schema validation. SCAP Source Data Stream schema validation is covered under requirement SRC-329-1 SCAP Result Data Stream schema validation is covered under requirement RES-363-1

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement # Summary Result
A-10-1 XML content failed schema validation. Not Tested

Derived Requirement Details

A-10-1

XML content failed schema validation.

Not Tested

Derived Requirement

XML content failed schema validation.

A-15

Pass

Requirement

Check for unused OVAL definitions.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement # Summary Result
A-15-1 Unused OVAL definitions exis.t Pass

Derived Requirement Details

A-15-1

Unused OVAL definitions exis.t

Pass

Derived Requirement

Unused OVAL definitions exis.t

A-16

Pass

Requirement

CCE number is expected, but missing as a reference.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement # Summary Result
A-16-1 CCE number is expected, but missing as a reference Pass

Derived Requirement Details

A-16-1

CCE number is expected, but missing as a reference

Pass

Derived Requirement

CCE number is expected, but missing as a reference

A-17

Pass

Requirement

CCE number is in an invalid format or the check-digit does not match. It should be of format CCE-XXXX-X or CCE-XXXXX-X where each X is a digit, and the final X is a check-digit.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement Details

A-17-1

CCE number is in an invalid format or the check-digit does not match. It should be of format CCE-XXXX-X or CCE-XXXXX-X where each X is a digit, and the final X is a check-digit.

Pass

Derived Requirement

CCE number is in an invalid format or the check-digit does not match. It should be of format CCE-XXXX-X or CCE-XXXXX-X where each X is a digit, and the final X is a check-digit.

A-18

Not Applicable

Requirement

The attribute @content-type on <scap:check-system-content> must match the content as such: OVAL_COMPLIANCE, OVAL_PATCH, CPE_INVENTORY, OVAL_VULNERABILITY must contain an <oval-def:oval_definitions> element; OCIL_QUESTIONS must contain an <ocil:ocil> element.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement Details

A-18-1

The attribute @content-type on <scap:check-system-content> must match the content as such: OVAL_COMPLIANCE, OVAL_PATCH, CPE_INVENTORY, OVAL_VULNERABILITY must contain an <oval-def:oval_definitions> element; OCIL_QUESTIONS must contain an <ocil:ocil> element.

Not Applicable

Derived Requirement

The attribute @content-type on <scap:check-system-content> must match the content as such: OVAL_COMPLIANCE, OVAL_PATCH, CPE_INVENTORY, OVAL_VULNERABILITY must contain an <oval-def:oval_definitions> element; OCIL_QUESTIONS must contain an <ocil:ocil> element.

A-21

Informational

Requirement

The OVAL test type is not checked in the NIST SCAP Validation Program.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement # Summary Result
A-21-1 The OVAL test type is not checked in the NIST SCAP Validation Program. Informational

Derived Requirement Details

A-21-1

The OVAL test type is not checked in the NIST SCAP Validation Program.

Informational

Derived Requirement

The OVAL test type is not checked in the NIST SCAP Validation Program.

Test Details

# Test Result Message Context (Line/Column)
1 Fail 'OVAL test oval:ssg-test_disable_ctrlaltdel_exists:tst:1' 11512 : 190  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="Disable Ctrl-Alt-Del key sequence override exists" id="oval:ssg-test_disable_ctrlaltdel_exists:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_disable_ctrlaltdel_exists:obj:1"/>
<ns7:state state_ref="oval:ssg-state_disable_ctrlaltdel_exists:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
2 Fail 'OVAL test oval:ssg-test_verify_all_rpms_user_ownership:tst:1' 11840 : 207  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="user ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_user_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_user_ownership:obj:1"/>
</ns8:rpmverifyfile_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
3 Fail 'OVAL test oval:ssg-test_verify_all_rpms_group_ownership:tst:1' 11843 : 209  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="group ownership of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_group_ownership:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_group_ownership:obj:1"/>
</ns8:rpmverifyfile_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
4 Fail 'OVAL test oval:ssg-test_files_fail_md5_hash:tst:1' 11846 : 164  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="verify file md5 hashes" id="oval:ssg-test_files_fail_md5_hash:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_md5_hash:obj:1"/>
</ns8:rpmverifyfile_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
5 Fail 'OVAL test oval:ssg-test_verify_all_rpms_mode:tst:1' 11849 : 187  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns8:rpmverifyfile_test check="all" check_existence="none_exist" comment="mode of all files matches local rpm database" id="oval:ssg-test_verify_all_rpms_mode:tst:1" version="1">
<ns8:object object_ref="oval:ssg-object_files_fail_mode:obj:1"/>
</ns8:rpmverifyfile_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
6 Fail 'OVAL test oval:ssg-test_crypto_policy_bind_symlink:tst:1' 11946 : 236  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="check if /etc/crypto-policies/back-ends/bind.config is linked to correct target library config" id="oval:ssg-test_crypto_policy_bind_symlink:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_crypto_policy_bind_symlink:obj:1"/>
<ns7:state state_ref="oval:ssg-state_crypto_policy_bind_symlink:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
7 Fail 'OVAL test oval:ssg-test_crypto_policy_gnutls_symlink:tst:1' 11950 : 240  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="check if /etc/crypto-policies/back-ends/gnutls.config is linked to correct target library config" id="oval:ssg-test_crypto_policy_gnutls_symlink:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_crypto_policy_gnutls_symlink:obj:1"/>
<ns7:state state_ref="oval:ssg-state_crypto_policy_gnutls_symlink:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
8 Fail 'OVAL test oval:ssg-test_crypto_policy_java_symlink:tst:1' 11954 : 236  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="check if /etc/crypto-policies/back-ends/java.config is linked to correct target library config" id="oval:ssg-test_crypto_policy_java_symlink:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_crypto_policy_java_symlink:obj:1"/>
<ns7:state state_ref="oval:ssg-state_crypto_policy_java_symlink:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
9 Fail 'OVAL test oval:ssg-test_crypto_policy_krb5_symlink:tst:1' 11958 : 236  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="check if /etc/crypto-policies/back-ends/krb5.config is linked to correct target library config" id="oval:ssg-test_crypto_policy_krb5_symlink:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_crypto_policy_krb5_symlink:obj:1"/>
<ns7:state state_ref="oval:ssg-state_crypto_policy_krb5_symlink:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
10 Fail 'OVAL test oval:ssg-test_crypto_policy_libreswan_symlink:tst:1' 11962 : 246  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-oval.xml" timestamp="2019-04-29T17:21:59">
...
<ns3:oval_definitions xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#independent independent-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
...
<ns3:tests>
...
<ns7:symlink_test check="all" check_existence="all_exist" comment="check if /etc/crypto-policies/back-ends/libreswan.config is linked to correct target library config" id="oval:ssg-test_crypto_policy_libreswan_symlink:tst:1" version="1">
<ns7:object object_ref="oval:ssg-object_crypto_policy_libreswan_symlink:obj:1"/>
<ns7:state state_ref="oval:ssg-state_crypto_policy_libreswan_symlink:ste:1"/>
</ns7:symlink_test>
...
</ns3:tests>
</ns3:oval_definitions>
</ns0:component>
</ns0:data-stream-collection>
Omitting 42 additional results.

A-22

Informational

Requirement

A custom XPath function is not available.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement # Summary Result
A-22-1 A custom XPath function is not available. Informational

Derived Requirement Details

A-22-1

A custom XPath function is not available.

Informational

Derived Requirement

A custom XPath function is not available.

A-23

Not Tested

Requirement

The content contains an XML element in a namespace that is not governed by one of the officially supported SCAP specifications.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement Details

A-23-1

The content contains an XML element in a namespace that is not governed by one of the officially supported SCAP specifications. This tool will not load external XML schemas, so XML schema validation errors may be produced. The namespace is {0}

Not Tested

Derived Requirement

The content contains an XML element in a namespace that is not governed by one of the officially supported SCAP specifications. This tool will not load external XML schemas, so XML schema validation errors may be produced. The namespace is {0}

A-25

Pass

Requirement

This requirement for unique xccdf:Profile @id cannot be handled by the XCCDF schema in SCAP source data streams. There is no direct reference to the req in 800-126r2 but this still needs to be checked.

Section N/A of SCAP Content Validation Tool

Derived Requirement Results

Derived Requirement Details

A-25-1

The @id attribute of all <xccdf:Profile> elements in a SCAP source data stream must be unique.

Pass

Derived Requirement

The @id attribute of all <xccdf:Profile> elements in a SCAP source data stream must be unique.

A-26

Explicitly specify all default attributes when creating content that will be signed.

Warning

Requirement

Some parsers automatically fill in the values of default attributes before signing content, so if default attributes are not provided, signature verification will fail for other parsers that do not automatically fill in the values. If all default attributes are not explicitly defined when digitally signing SCAP content, certain parsers may fail to process the data stream signing correctly. This could lead to processing errors or a failure to recognize the legitimacy of signed content.

Section 4.8 of Security Content Automation Protocol (SCAP) Version 1.2 Content Style Guide (Draft): Best Practices for Creating and Maintaining SCAP 1.2 Content

Derived Requirement Results

Derived Requirement Details

A-26-1

Explicitly provide values for all default attributes instead of assuming the default value.

Warning

Derived Requirement

Explicitly provide values for all default attributes instead of assuming the default value.

Test Details

# Test Result Message Context (Line/Column)
1 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 50724 : 121  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_sending_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_remote_loghost" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
2 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 50862 : 115  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_nolisten" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
3 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 50990 : 125  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_package_syslogng_installed" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
4 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51038 : 123  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_service_syslogng_enabled" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="http://www.ssi.gouv.fr/administration/bonnes-pratiques/">
</ns10:reference>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
5 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51121 : 134  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_tcp" selected="false" severity="unknown">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
6 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51164 : 134  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_rsyslog_accepting_remote_messages">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_accept_remote_messages_udp" selected="false" severity="unknown">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
7 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51247 : 127  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_groupownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
8 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51316 : 122  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_ownership" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
9 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51385 : 124  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_files_permissions" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="">
</ns10:reference>
<ns10:reference href="http://iase.disa.mil/stigs/cci/Pages/index.aspx">
</ns10:reference>
<ns10:reference href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf">
</ns10:reference>
<ns10:reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">
</ns10:reference>
<ns10:reference href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf">
</ns10:reference>
<ns10:rationale xml:lang="en-US">
</ns10:rationale>
<ns10:platform idref="cpe:/a:machine"/>
<ns10:ident system="https://nvd.nist.gov/cce/index.cfm">
</ns10:ident>
... [other children omitted for brevity]
</ns10:Rule>
...
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
10 Fail ' - TEST: exists(@selected) and exists(@weight) and exists(@role) and exists(@severity)' 51467 : 119  
<ns0:data-stream-collection id="scap_org.open-scap_collection_from_xccdf_ssg-rhel8-xccdf-1.2.xml" schematron-version="1.3">
...
<ns0:component id="scap_org.open-scap_comp_ssg-rhel8-xccdf-1.2.xml" timestamp="2019-04-29T17:21:52">
...
<ns10:Benchmark id="xccdf_org.ssgproject.content_benchmark_RHEL-8" resolved="1" style="SCAP_1.2" xml:lang="en-US">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_system">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_logging">
...
<ns10:Group id="xccdf_org.ssgproject.content_group_ensure_rsyslog_log_file_configuration">
...
<ns10:Rule id="xccdf_org.ssgproject.content_rule_rsyslog_cron_logging" selected="false" severity="medium">
<ns10:title xml:lang="en-US">
</ns10:title>
<ns10:description xml:lang="en-US">
...
</ns10:description>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="https://www.cisecurity.org/wp-content/uploads/2017/03/Poster_Winter2016_CSCs.pdf">
</ns10:reference>
<ns10:reference href="http://www.isaca.org/COBIT/Pages/default.aspx">
</ns10:reference>
... [other children omitted for brevity]
</ns10:Rule>
</ns10:Group>
</ns10:Group>
</ns10:Group>
</ns10:Benchmark>
</ns0:component>
</ns0:data-stream-collection>
Omitting 1042 additional results.

A-27

Check for @href and @id-ref value of <cpe:check-fact-ref> element

Not Applicable

Requirement

According to section 5.4 "The <cpe:check-fact-ref> Element" of the NIST IR 7698 (CPE Applicability Language), the @href attribute indicates "The location of the check content, such as the OVAL or OCIL document holding the desired check." Within a source data stream, the @href SHALL be resolved in the context of the XML Catalog specified as part of the <ds:component-ref>.

Section 5.4 of Common Platform Enumeration: Applicability Language Specification Version 2.3

Derived Requirement Results

Derived Requirement # Summary Result
A-27-1 cpe:check-fact-ref Not Applicable

Derived Requirement Details

A-27-1

cpe:check-fact-ref

Not Applicable

Derived Requirement

cpe:check-fact-ref