Friends,
A rebase of the scap-security-guide RPM was *long* overdue! Please see the "Consume" section of the project wiki for download information: https://fedorahosted.org/scap-security-guide/
Highlights of SSG v0.1-10 include: - JBossEAP5 content! Utilizing content from the SCAP Security Guide project, on 29-JAN-2013 Red Hat corporately submitted paperwork to DISA FSO to begin the JBossEAP5 STIG process. SSG v0.1-10 reflects the OCIL, OVAL, and XCCDF content of this submission. Please refer to /usr/share/xml/scap/ssg/guide/JBossEAP5_Guide.html for details. We look forward to your feedback via the SSG mailing list! [1]
- `man scap-security-guide` now provides sample usage of the content.
- Several bugfixes relating to OVAL content. Many thanks to Brian Millet, Kenneth Stailey, Logan Rodrian, and all other members of the SSG community for the reports and patches!
- The RHEL6 STIG profile was renamed "stig-rhel6-server"
- A RHEL6 checklist has been included (/usr/share/xml/scap/ssg/guidestig-rhel6-server-guide.html). This outlines what specific rules are currently part of the profile.
- A number of updates against NIST 800-53 mappings has been completed. Please see files under /usr/share/xml/scap/ssg/policytables/.
[1] https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
Friends,
The first SSG commit was in June 2011, and since that time the SSG community has grown to 24 contributors, 1,815 commits, and represents 170,537 lines of source. Content has expanded from strictly RHEL6 to include JBoss EAP5. There's an active community of users, ranging from the US Military, Intelligence Community, and commercial financial services companies. Amazing!
v0.1-11 has been released to the EPEL repository [1]. This release represents 264 tickets/bug fixes/commits since v0.1-10, largely reflecting: * Dramatic focus on OVAL improvement Lowering the amount of false positives, and adding net-new OVAL rules for comprehensive scanning
* DISA FSO's Draft RHEL6 STIG Feedback v0.1-11 reflects inclusion of feedback received during DISA FSO's Draft RHEL6 public comment period
Feedback should be sent to the SSG users & developers mailing list [2].
-The SSG Community
[1] https://fedorahosted.org/scap-security-guide/wiki/downloads [2] https://fedorahosted.org/mailman/listinfo/scap-security-guide
scap-security-guide@lists.fedorahosted.org