The purpose of this project is to create SCAP content for various platforms -- Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Fedora, and others. "SCAP content" refers to documents in the XCCDF, OVAL and Source DataStream formats. These documents can be presented in different forms and by different organizations to meet their security automation and technical implementation needs.
This project is an attempt to allow multiple organizations to efficiently develop such content by avoiding redundancy, which is possible by taking advantage of features of the SCAP standards. First, SCAP content is easily transformed programmatically. XCCDF also supports selection of subsets of content through a "profile" and granular adjustment of settings through a "refine-value."
The goal of this project to enable the creation of multiple security baselines from a single set of high-quality SCAP content.
The SSG homepage is https://www.open-scap.org/security-policies/scap-security-guide/
- User Manual: SSG User Manual
- Developer Guide: SSG Developer Guide
The preferred method of installation is via the package manager of your
distribution. On RHEL and Fedora you can use:
yum install scap-security-guide
.
On Debian (sid), you can use:
apt install ssg-debian
for Debian guides.
apt install ssg-debderived
for Debian-based distributions (e.g. Ubuntu) guides.
apt install ssg-nondebian
for other distributions guides (RHEL, Fedora, etc.).
apt install ssg-applications
for application-oriented guides (Firefox,JBoss, etc.).
If SCAP Security Guide is not packaged in your distribution or if the
version that is packaged is too old, you need to build the content yourself
and install it via make install
. Please see the BUILD.md
document for more info.
Or you can download pre-built SSG zip archive from latest release.
Please see the BUILD.md document for build instructions.
We assume you have installed SCAP Security Guide system-wide into a standard location as instructed in the previous section.
There are several ways to consume SCAP Security Guide content, we will only go through a few of them here.
The oscap
tool is a low-level command line interface that comes from
the OpenSCAP project. It can be used to scan the local machine.
# oscap xccdf eval --profile xccdf_org.ssgproject.content_profile_usgcb-rhel6-server --results-arf arf.xml --report report.html /usr/share/xml/scap/ssg/content/ssg-rhel6-ds.xml
After evaluation, the arf.xml
file will contain all results in a reusable
Result DataStream format, report.html
will contain a human readable
report that can be opened in a browser.
Replace the profile with other profile of your choice, you can display all possible choices using:
# oscap info /usr/share/xml/scap/ssg/content/ssg-rhel6-ds.xml
Please see the User Manual for more info.
The SCAP Workbench is a graphical user interface for SCAP evaluation and customization. It is suitable for scanning a single machine, either local or remote (via SSH). New versions of SCAP Workbench have SSG integration and will automatically offer it when the application is started.
Please see the User Manual for more info.
oscap-ssh
comes bundled with OpenSCAP 1.2.3 and later. It allows scanning
a remote machine via SSH with an interface resembling the oscap
tool.
The following command evaluates machine with IP 192.168.1.123
with content
stored on local machine. Keep in mind that oscap
has to be installed on the
remote machine but the SSG content doesn't need to be.
# oscap-ssh [email protected] 22 xccdf eval --profile xccdf_org.ssgproject.content_profile_usgcb-rhel6-server --results-arf arf.xml --report report.html /usr/share/xml/scap/ssg/content/ssg-rhel6-ds.xml
For a list of deprecated content, review the Deprecated Content Table in the User Guide.
The SSG mailing list can be found at https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide.
If you encounter issues with OpenSCAP or SCAP Workbench, use https://www.redhat.com/mailman/listinfo/open-scap-list
You can also join the #openscap
IRC channel on chat.freenode.net
.
We have created a new COPR repository that provides unofficial builds of latest versions of openscap, scap-security-guide, scap-workbench and openscap-daemon packages. The packages are suitable for use on Red Hat Enterprise Linux 6 and 7 and CentOS 6 and 7.
The COPR repository is located on: https://copr.fedorainfracloud.org/coprs/openscapmaint/openscap-latest/
The repo enables you to test the latest greatest OpenSCAP bits on RHEL and CentOS.
The former repository isimluk/OpenSCAP will not be maintained anymore. Sorry for inconvenience.