SCC 5.9 UserManual
SCC 5.9 UserManual
SCC 5.9 UserManual
Developed by:
NIWC Atlantic (formerly SPAWAR Atlantic)
P.O. Box 190022
North Charleston, SC 29419-9022
scc.fct@navy.mil
https://www.niwcatlantic.navy.mil/scap/
Distribution A: Approved for Public Release (16 Feb 2021) NIWCLANT SPR# 2021-57
Table of Contents
1. Introduction ................................................................................................................................. 1
1.1 Background........................................................................................................................... 1
1.2 Platforms Supported ............................................................................................................. 2
1.3 SCAP Content Included ........................................................................................................ 2
1.4 Changelog............................................................................................................................. 4
2. Requirements ............................................................................................................................. 7
2.1 Minimum Hardware/OS Requirements ................................................................................. 7
2.2 Scanning Requirements........................................................................................................ 7
3. Install/uninstall ............................................................................................................................ 9
3.1 Windows Software Installation .............................................................................................. 9
3.2 Windows Software Uninstall ............................................................................................... 11
3.3 Install/Remove software via zip file..................................................................................... 11
3.4 Install Details........................................................................................................................ 12
4. GUI Based Usage...................................................................................................................... 14
4.1 Launching the Graphical User Interface ............................................................................. 14
4.2 Installing & Configuring Content ......................................................................................... 15
4.3 Performing a Scan .............................................................................................................. 20
4.4 Editing Options..................................................................................................................... 25
4.5 Viewing Results .................................................................................................................. 39
4.6 SCAP Scanning with Manual and/or Hybrid Questions...................................................... 40
4.7 XCCDF Tailoring................................................................................................................. 44
4.8 Cisco IOS / IOS XE Offline (Show Tech) File Scanning..................................................... 46
4.9 Standalone OVAL Usage.................................................................................................... 48
4.10 Standalone OCIL Usage ................................................................................................... 49
4.11 Post Scanning Report Generation .................................................................................... 51
4.12 File and Help Menus ......................................................................................................... 54
4.13 Configuration Profiles........................................................................................................ 55
5. Command Line Usage.............................................................................................................. 57
5.1 Basic Command Line Usage .............................................................................................. 57
5.2 Command Line Configuration Parameters ......................................................................... 58
5.3 Command Line Scanning Parameters................................................................................ 64
5.4 Option Descriptions and Datatypes .................................................................................... 68
5.5 Generating Post Scan Reports from the Command Line ................................................... 78
5.6 Multiple Computer Deployment .......................................................................................... 82
5.7 Manual and Hybrid Question Answer Files......................................................................... 83
7. Hybrid Tests.............................................................................................................................. 86
7.1 Hybrid Scope ...................................................................................................................... 87
7.2 Hybrid Target ...................................................................................................................... 88
7.3 Hybrid Value(s) ................................................................................................................... 88
7.4 XML Example using target 'ALL' ......................................................................................... 89
7.5 More Complex XML Examples ........................................................................................... 89
7.6 What happens if I do not enter any data into Hybrid tests?............................................... 94
6. Understanding Scan Results .................................................................................................... 95
6.1 Understanding Scan Reports.............................................................................................. 95
7.2 Navigating the Results Directory ........................................................................................ 98
7.3 Viewing Screen, Error or Debug Logs .............................................................................. 100
9. Running SCC as a Service..................................................................................................... 102
9.1 Installing the SCC Service ................................................................................................ 102
9.2 Configuring the SCC Service ............................................................................................ 102
9.3 Update Service Configuration ........................................................................................... 103
8. Running SCC as a non-Administrator ..................................................................................... 104
8.1 Installing SCC ................................................................................................................... 104
8.2 Install directory non-writable by non-Administrators......................................................... 104
ii
Table of Contents
iii
SCC User Manual for Windows
iv
1. INTRODUCTION
The Security Content Automation Protocol (SCAP) Compliance Checker (SCC) is a SCAP 1.3
Validated Authenticated Configuration Scanner, with support for SCAP versions 1.0, 1.1, 1.2
and 1.3, and an Open Vulnerability Assessment Language (OVAL) adopter, capable of
performing compliance verification using SCAP content, and authenticated vulnerability
scanning using OVAL content.
1.1 Background
This User Manual is intended to explain all of the features and functionality of the SCC
application, along with some basic information regarding the SCAP standards. As SCC is used
by thousands of people across hundreds of government agencies, a single Standard Operating
Procedure (SOP) is not feasible. Each agency may need to create their own SOP based on
their intended usage of SCC.
For DOD Usage, and integration with the Security Technical Implementation Guides (STIG)
Viewer, please refer to DISA's (Defense Information Systems Agency) documentation, which is
located at: https://cyber.mil/stigs/srg-stig-tools/
SCC is an XML interpreter of SCAP content, meaning SCC performs automated security
configuration checks based on the content that is installed and enabled. The end user can
install SCAP content into SCC, and enable one or more SCAP content streams to perform
compliance checking.
Starting with SCC version 5.4, the application can be freely distributed and used by anyone.
Refer to Appendix F for our legal disclaimer in our End User License Agreement.
Starting with FY23 SCC has been funded by groups of end users. See Appendix H for details
about historical funding, current FY23 funding, and future funding efforts.
At a very high level, SCAP is a set of XML standards, primarily XCCDF and OVAL, which
include policy settings and technical instructions to perform automated checking.
SCAP Content is a collection of XML files, usually bundled in a zip file, which defines the
checks to be evaluated on a target system or targeted systems. This bundle, or ‘stream’,
instructs what checks to perform, provides all text fields such as titles, references, descriptions,
and to some extent, how to perform them. SCAP validated scanners such as SCC ingest the
stream and perform the checks listed therein.
1
1.2 Platforms Supported
• Platforms supported by remote SSH based scanning (with the UNIX Remote Scanning
Plugin installed)
• Red Hat Distributions
• Red Hat Enterprise Linux 7 (x64)
• Red Hat Enterprise Linux 8 (x64 & aarch64)
• Red Hat Enterprise Linux 8 (x64 & aarch64)
• Red Hat Enterprise Linux 9 (x64)
• SUSE Linux
• Enterprise SUSE Linux 12 (x64)
• Enterprise SUSE Linux 15 (x64 & aarch64)
• Oracle Linux
• Oracle Linux 7 (x64)
• Oracle Linux 8 (x64 & aarch64)
• Debian Distributions
•
• Ubuntu 18.04 LTS (amd64)
• Ubuntu 20.04 LTS (amd64& arm64)
• Ubuntu 22.04 LTS (amd64)
• Raspberry Pi 3 (ARM7)
• Raspberry Pi 4 (ARM7)
• Raspberry Pi OS (arm64)
• Solaris 11 (x86 & SPARC)
2
Supported Platforms
• NIWC Manual Question "Enhanced" DISA STIG SCAP content obtained from:
https://www.niwcatlantic.navy.mil/scap/scap-content-repository/
• Adobe Acrobat Reader DC Continuous
• Google Chrome
• Microsoft Edge
• Internet Explorer 11
• Mozilla Firefox
• Microsoft .NET Framework
• Windows Defender AV
• Windows Firewall
• Windows 2012 and 2012 R2 Domain Controller
• Windows 2012 and 2012 R2 Member Server
• Windows Server 2016
• Windows Server 2019
• Windows Server 2022
• Windows 10
• Windows 11
• Cisco IOS XE Router RTR
• Cisco IOS XE Router NTM
• NIWC Developed DISA STIG SCAP content obtained from:
https://www.niwcatlantic.navy.mil/scap/scap-content-repository/
• Microsoft Internet Information Server (IIS) 8.5
• Microsoft Internet Information Server (IIS) 10.0
• Microsoft Office 365 ProPlus
• Microsoft OneDrive
• Microsoft SQL Server 2016 (also supports 2017, 2019, 2022)
3
1.4 Changelog
Below is an abbreviated list of the primary changes from version 5.8 to 5.9. Please refer to the
release notes for a complete list of updates.
Below is an abbreviated list of the primary changes from version 5.7.2 to 5.8 Please refer to the
release notes for a complete list of updates.
4
Changelog
• Linux
• Added support for Ubuntu 22.04 (AMD64)
• Fixed reporting ipv6 network addresses
• MacOS
• N/A
• Solaris
• N/A
Below is an abbreviated list of the primary changes from version 5.7.1 to 5.7.2 Please refer to
the release notes for a complete list of updates.
Below is an abbreviated list of the primary changes from version 5.7 to 5.7.1. Please refer to the
release notes for a complete list of updates.
5
SCC User Manual for Windows
Below is an abbreviated list of the primary changes from version 5.6 to 5.7. Please refer to the
5.7 release notes for a complete list of updates.
6
2. REQUIREMENTS
SCC can run on virtually any Windows based computer, however, below are some minimum
specifications.
HARDWARE MINIMUM/RECOMMENDED
CPU Intel/AMD x86 or x64 based processor. Recommend at least a 1.5 Ghz dual core
or newer.
RAM 1.0 GB Minimum, 2.0 GB or more is recommended.
SCC uses about 250 MB to startup, and may use up to 1 GB or more during certain
scans, especially WMI based remote scans from 64 bit Windows.
Disk space The base install of SCC requires approximately 150 MB of disk space. Reviews
installation may generate 100+ MB of results depending on content and logging options
enabled.
Operating Windows 2012 or later
System
SCC has three scanning modes for Windows. Local, Classic Remote and WMI Remote. Each
have slightly different requirements.
CLASSIC WMI
SCANNING REQUIREMENT LOCAL
REMOTE REMOTE
Local Administrative Rights * See
X X Note
Below
Manage Auditing and Security Logon User Right X X X
Windows Management Instrumentation (WMI) Service X X X
Domain Admin Rights X X
File and Printer Sharing for Microsoft Networks X X
Server Service X X
Remote Procedure Call (RPC) Service
• System dependency for Remote Registry and WMI X X
Firewall Exceptions
o If the client firewall is blocking WAN/LAN connectivity to the
file shares, RPC or WMI, SCC will not be able to perform a X X
remote review. Classic reviews also require firewall rules to
allow Remote Registry access, and DCOM.
"Access this computer from the network" User Right for
the account running SCC (and not denied via "Deny access X X
to this computer from the network")
Remote Registry Service X
DCOM (if content which uses WuaUpdateSearcher) X
7
SCC User Manual for Windows
* WMI Note: Windows WMI mode can be run with SCC running as an administrator but can
also be run as a non-administrator, and perform scans with alternate credentials, stored in
SCC. Refer to section 4.4.1.7 WMI Remote Scanning Options for more information.
** WMI Note 2: When attempting to scan computers not in a Windows Active Directory
domain, you will need to disable UAC remote restrictions. Refer to B.10 for more information.
8
3. INSTALL/UNINSTALL
To obtain a copy of the SCAP Compliance Checker software please refer to the Technical
Support section of this manual.
It is recommended to verify the SHA256 checksums of the downloaded zip files with the SCC
checksum file from https://www.niwcatlantic.navy.mil/scap/ before proceeding to install.
The Setup program accepts optional command line parameters. These can be useful to system
administrators, and to other programs calling the Setup program.
/HELP, /?
Shows a summary of this information. Ignored if the UseSetupLdr [Setup] section
directive was set to no.
/SP-
Disables the 'This will install... Do you wish to continue?' prompt at the beginning
of Setup.
/SILENT, /VERYSILENT
Instructs Setup to be silent or very silent. When Setup is silent the wizard and the
background window are not displayed but the installation progress window is.
When a setup is very silent this installation progress window is not displayed.
Everything else is normal so for example error messages during installation are
displayed and the startup prompt is (if you haven't disabled it with
DisableStartupPrompt or the '/SP-' command line option explained above).
/SUPPRESSMSGBOXES
9
SCC User Manual for Windows
Instructs Setup to suppress message boxes. Only has an effect when combined
with '/SILENT' or '/VERYSILENT'.
The default response in situations where there's a choice is:
Yes in a 'Keep newer file?' situation.
No in a 'File exists, confirm overwrite.' situation.
Abort in Abort/Retry situations.
Cancel in Retry/Cancel situations.
Yes (=continue) in a
DiskSpaceWarning/DirExists/DirDoesntExist/NoUninstallWarning/ExitSetup
Message/ConfirmUninstall situation.
Yes (=restart) in a FinishedRestartMessage/UninstalledAndNeedsRestart
situation.
5 message boxes are not suppressible:
The About Setup message box.
The Exit Setup? message box.
The FileNotInDir2 message box displayed when Setup requires a new disk
to be inserted and the disk was not found.
Any (error) message box displayed before Setup (or Uninstall) could read
the command line parameters.
Any message box displayed by [Code] support function MsgBox.
/DIR="x:\dirname"
Overrides the default directory name displayed on the Select Destination Location
wizard page. A fully qualified pathname must be specified. May include an
"expand:" prefix which instructs Setup to expand any constants in the name. For
example: '/DIR=expand:{pf}\My Program'.
/TYPE=type name
Overrides the default setup type. Options are Standard and Custom, selecting
Custom is required to select components as listed below
This parameter does not change the state of components that include the fixed
flag.
Example:
Deselect all components, then select the "SCC Service" component:
/COMPONENTS="Other\SCC_Service"
Examples
10
Install_Uninstall
SCC_5.9_Windows_Setup.exe /VERYSILENT
Install SCC to a given directory with default options silently with no GUI shown
Install SCC with the Service and default content silently with no GUI shown
Note: The uninstaller will not delete any files added after the installation, such as end user installed
content, so the installation directory may exist and need to be manually removed.
1. Click Start -> Control Panel -> Programs -> Uninstall a program
2. Double click on SCAP Compliance Checker 5.9
3. Follow the prompts
To perform an automated, silent uninstallation, run the uninstaller via command line with a
/SILENT or /VERYSILENT flag
To remove software 'installed' from the generic zip file, simply remove the installation directory
and all sub-directories and files.
11
3.4 Install Details
FILE DESCRIPTION
bin SCC dependencies shared for 32 and 64 bit.
cscc.exe Launcher program for the command line
version of SCC
cscc‐remote.exe Launcher program for the command line
version of SCC, used for remote WMI reviews.
scc.exe Launcher program for the graphical version of
SCC
scc.sig32 Use for verifying the integrity of 32 bit
installations
scc.sig64 Use for verifying the integrity of 64 bit
installations
lib32 32 bit version of SCC dependencies
lib64 64 bit version of SCC dependencies
options.xml Default options file used by SCC
hosts.txt Sample host file
unins000.exe Uninstaller for this application
Documentation\ReleaseNotes.txt Summary of changes for this version of the
software.
Documentation\SCC_Help.chm Compiled, searchable help file
Documentation\SCC_UserManual.pdf PDF version of the User Manual
Documentation\TermsOfUse.txt Text file containing the Usage, which is
displayed during the installation.
Documentation\ThirdPartyLicenses.txt Contains list of third party libraries used in SCC
and their respective licenses.
Documentation\ThirdPartyLicenses Directory containing text formatted 3rd party
licenses, referenced in ThirdPartyLicenses.txt
Local Location in which SCC writes temporary files
during execution.
RemotePlugin Location in which remote UNIX and Windows
scanning plugins may reside, empty by default.
Resources\Compiled\* Folder containing compiled library files for SCC
use
Resources\Content\* Parent content folder for SCAP, SCAP 1.2, OVAL,
OVAL External Variables, and OCIL content
folders
Resources\Content\External_Variables Contains any External Variables files associated
with an OVAL content stream
Resources\Content\OVAL_Content Contains any OVAL vulnerability content
included with the installer or installed by the
end user with the Install OVAL Content feature.
Resources\Content\OCIL_Content Contains any stand alone OCIL content included
with the installer or installed by the end user
with the Install OCIL Content feature.
12
A5_List of Files and Registry Keys
FILE DESCRIPTION
<User Defined Directory>\Sessions XML, HTML and Text based results created
during a review. Also contains Screen, Debug
Refer to Data Directory option in "Editing and Error logs that are specific to a scan session.
Options" for details.
<User Defined Directory>\ApplicationLogs SCC Application Logs (not related to any SCAP
scan session) including Screen, Error and Debug
Refer to Data Directory option in "Editing logs that could be created during a review
Options" for details. depending on user preferences.
<User Defined Directory>\Config Contains scan session database and host
credential database.
Refer to Data Directory option in "Editing
Options" for details.
<User Defined Directory>\options.xml Configuration settings from the SCC.exe
<SCC Install>\Local Temporary files created during SCC execution
13
4. GUI BASED USAGE
Section 4 of this document explains the basic Graphical User Interface (GUI) usage of SCC to
perform SCAP based compliance scanning, standalone OVAL and OCIL scanning, and editing
options.
Start -> All Programs -> SCAP Compliance Checker 5.9 -> SCAP Compliance Checker
(SCC) 5.9
14
4.2 Installing & Configuring Content
SCC's installer contains the latest publicly available SCAP content from DISA, NIWC and NIST,
which was available at that time. However, new and updated content may need to be installed
by end users, especially if the current SCC release is several months old.
If the computer and the user running SCC have Internet access, SCC has the ability to
update the DISA and NIWC developed STIG SCAP content.
• Right click
• View Content Details
To install content:
* See Editing Options -> Update Options for more information on content updates and
repositories.
Refer to SCC's FAQs if you are interested in making your own offline copy of DISA's content
repository, or to learn why SCC's default content repository XML file is located on github
instead of cyber.mil.
The steps below will guide you through installing content within SCC. Note that the steps are
the same SCAP 1.0, 1.1,1.2 and 1.3 data streams.
To obtain NIWC Enhanced DISA STIG SCAP content which contain automation and
Manual Questions: https://www.niwcatlantic.navy.mil/scap/scap-content-repository/
OR
To obtain DISA STIG SCAP content which does not contain any Manual Questions,
please download "benchmarks" from https://cyber.mil/stigs/scap/
15
SCC User Manual for Windows
Note: DISA STIG "Manual" files are not SCAP content. They contain
an XCCDF XML file, but do not contain any OVAL XML. They are
intended for performing a manual review of the system.
A profile is a collection of rules and is designed to allow the same set of SCAP content (XML)
to perform different sets of checks based on end user need. SCAP content can contain one or
more different profiles. By default, SCC enables the first profile found.
16
Configuring SCAP Content
For USGCB, there is only one profile in the content, but for other content such as DISA, the
end user will need to select the appropriate profile, according to the sensitivity of the computer
being scanned. For DISA STIGS, below is the normal list of available profiles in each SCAP
content stream.
o MAC 1 Public
o MAC 1 Sensitive
o MAC 1 Classified
o MAC 2 Public
o MAC 2 Sensitive
o MAC 2 Classified
o MAC 3 Public
o MAC 3 Sensitive
o MAC 3 Classified
o Disable Slow Rules
o CAT I Only
How many checks and results are impacted by changing the profile is completely dependent on
the intent of the SCAP Content Author (not SCC). The checks in all profiles could be all the
same, or they could differ greatly.
To select a profile:
1. Left click on the Stream name to populate the "Stream Details" window on the right
2. Select the desired profile from the Profile dropdown.
17
SCC User Manual for Windows
ITEM DESCRIPTION
Title The XCCDF "title" field, directly from the content.
Datastream The SCAP 1.2/1.3 Datastream " data‐stream id" field. This can be
useful if there are multiple datastreams with the same benchmark ID.
Profile A drop‐down containing 1 or more profiles from the XCCDF content.
Release Info The XCCDF "release‐info" field, directly from the content.
Status The XCCDF "status" field, directly from the content.
Validation The end result of SCC's attempt to validate the content, either at
install or scan time.
Signature The end result of SCC's attempt to validate the digital certificate of
SCAP 1.2/1.3 datatstream (if found)
Platform The CPE‐Dictionary CPE Item Title, directly from the XML content
Publisher The XCCDF "publisher" field, directly from the XML content.
Description The XCCDF "description" field, directly from the XML content.
Notice The XCCDF "notice" field, directly from the XML content.
Once you have populated the Stream Details pane, a human readable 'prose' version of the
XCCDF and OVAL files to either HTML or Text format may be produced. To use, a profile
must be selected on the SCAP Content form. If no profile is selected, the buttons will be
disabled.
The Prose report is a human readable representation of the SCAP content, very similar to the
All Setting reports, but does not contain any scan data. It is meant to show the XCCDF rules
and OVAL definitions in a logical tree structure format.
This is a feature for advanced users wanting to modify how SCAP 1.2 and SCAP 1.3
benchmarks perform checks. Refer to the XCCDF Tailoring section 4.8 for details.
Starting with SCC 5.7, if SCAP content that contains OCIL manual questions is installed,
SCC provides the ability to answer manual questions from the DISA STIG To use, select the
desired SCAP content, click on "Manual Questions" in the content details pane, and answer
the non-automated items from the STIG Manual, and those results, along with the automated
checks will be included in SCC results. See section 4.6 "SCAP Scanning with Manual
Questions" for more information.
4.2.7.4 Applicability
18
Configuring SCAP Content
By default, SCC only performs scan using SCAP content if the content is applicable to a
given target. This option forces SCC to perform a scan of a specific content stream against
all targets.
19
4.3 Performing a Scan
After installing and enabling the desired content and profile, the application is ready to perform
compliance scanning.
The SCC can review the local computer or remote computers over LAN/WAN connections.
Select one of the following options:
This option instructs SCC to scan the computer in which the SCC software in installed.
This option instructs SCC to scan a single remote Windows computer over the LAN/WAN.
• A single NetBIOS computername or IP Address should be entered into the text field
provided.
This option instructs SCC to scan a list of remote Windows computer over the LAN/WAN.
20
Performing SCAP Scanning
• Host File
o Create a new host file
o Create a host list by querying Active Directory for the current domain
o Options exist for validating this file
o Validate host list using NSLookup to ensure
computername is in DNS
o Validate host list using NSLookup and Ping to ensure
computername is in DNS and computer is online
o Choose an existing hosts file
o This list should be in the form of a text file with a single computer
listed per line.
• Entire Domain
o Scan all computers in the domain, list of hosts created each time a scan is
performed.
This option instructs SCC to scan a list of remote CiscoIOS Routers/Switches over the
LAN/WAN. Refer to Edit/Select SSH Hosts, for instructions on selecting hosts and
credentials.
Note: If the host credential manager has not been used before, a
popup window will appear prompting for a new master password and
confirming the new password.
21
SCC User Manual for Windows
o Import an existing host file, formatted as text with a single DNS name or IP Address
per line
o Each host in this file will have it's SSH connection tested after import
This option instructs SCC to scan a list of remote UNIX/Linux/Mac systems over the
LAN/WAN. Refer to Edit/Select SSH Hosts, for instructions on selecting hosts and
credentials.
Note: If the UNIX SSH Scanning Plugin has not been installed, an
information message will appear in the left window, with a browse
dialog to select the plugin, which can usually be obtained from the
same location you obtained the SCC installers.
22
Performing SCAP Scanning
o Import an existing host file, formatted as text with a single DNS name or IP Address
per line
o Each host in this file will have it's SSH connection tested after import
23
SCC User Manual for Windows
This is a Windows only feature that combines WMI scanning and UNIX SSH Remote
scanning into a single scan. Refer to each individual method for instructions on
selecting/enabling hosts.
Note: If the UNIX SSH Scanning Plugin has not been installed, an
information message will appear in the left window, with a browse
dialog to select the plugin, which can usually be obtained from the
same location you obtained the SCC installers.
24
4.4 Editing Options
The SCC application has many end user customizable options, although the installation defaults
are those most frequently used. After using SCC a few times, the end user may want to adjust
some of these options, depending on their personal preferences.
OPTION DESCRIPTION
Run all content This option will ignore the content's CPE‐OVAL results and continue
regardless of processing the content against the system. This option can be used to
applicability run content that is not normally applicable to the target system (e.g.
Red Hat SCAP content on a Debian system).
Note that this option alters the standard SCAP rules for gathering certain
objects which can result in incomplete results and/or false positives.
Process Manual This option will ignore any manual questions in the content and cause
Questions if found in any XCCDF rule that is a manual question to be excluded from XCCDF
SCAP content results.
This will disable the creation of DISA CKL reports, as all rules are
required for CKL reports.
This will remove any warnings that SCC would normally print if manual
question results were not found for a given content stream.
Attempt to download This option allows the user to disable the SCAP 1.2 requirement of
external OVAL and attempting to download OVAL and/or XCCDF Tailoring files from the
XCCDF Tailoring files internet, if specified in the content.
If this option is enabled (default) and the SCAP 1.2 datastream lists a
http reference for the OVAL or XCCDF Tailoring component, SCC will
attempt to download it, and store it locally. Once it has been
downloaded, it does not attempt again.
This feature is not currently used by any production NIST or DISA SCAP
content, but the feature is required for SCC to obtain SCAP 1.2
validation.
Force OVAL results SCC by default saves results in OVAL 5.12.1. However, this option could
to 5.10.1 for SCAP be enabled by the user for certain usage (primarily SCAP 1.2 validation)
1.2 interoperability or tools that import OVAL results (but only support OVAL 5.10.1).
Save results when This option is designed to force SCC to create XML results even when
content is not content is not applicable to the target. It could be used for
applicable for troubleshooting debugging purposes, but is primarily intended to only
SCAP 1.3 be used as part of NIST SCAP 1.3 validation, which has a test case which
interoperability mandates SCAP validated tools create results when content is not
25
SCC User Manual for Windows
applicable.
This set of options allows SCC to process currently available content in an efficient and
accurate manner, however it does not comply with the letter of the law when it comes to the
OVAL standard.
OPTION DESCRIPTION
Ignore remote file This option will ignore remote file systems, such as Windows shares, and
systems during OVAL UNIX NFS mount points. This option could be specified in the SCAP
file scans content as well, but in all of the publicly available SCAP content to date,
the content authors have not specified to skip scanning of remote file
systems.
If this option is disabled, and the SCAP content does not specify to
exclude remote file systems, SCC will scan all drives/mount points on
the system, and will likely cause the application to slow down,
dramatically in certain cases, and the results will potentially include
issues from the server hosting the remote files.
This option caps the number of OVAL items created, on a per OVAL test
basis, to the number specified in the form. This option can be updated
by the user depending on their preference. If SCC runs out of memory
and crashes even with this option enabled, it is recommended to lower
the threshold by a sizable amount and re‐run.
If SCC reaches the threshold for a single test, the end result of the test
will be 'error' as SCC will skip processing any additional items, and will
not be able to make a final determination of compliance with regards to
26
Editing Options
pass/fail, and the end user will likely need to perform the check
manually to determine true compliance.
This should not be a common occurrence, and the content author may
need to be contacted, to determine if the test can be written in a
method which does not create such a large volume of results.
This option is enabled by default.
This field is guarded by input validation and will only allow a user to
enter an integer between 0 and 999999. Any input outside of those
values will result in an error and the option will not be allowed to be
saved.
OPTION DESCRIPTION
Sort Questionnaires This option sorts Manual Questions, both in the SCC GUI and in the
by DISA CAT (CAT I, Manual Question text based autoanswer templates to be sorted by
CAT II etc..) severity, displaying CAT I items first, followed by CAT II etc... If this
option is disabled, questions will be displayed in the order they were
found in the DISA STIG Manual.
Regenerate This option allows the end user to regenerate all Manual Autoanswer
Templates Templates. This does not update any existing completed autoanswer
file(s).
Backup Manual This option only applies to SCC GUI when saving manual question results
Question Results from SCC's Manual Question editing form. When enabled, this option
with causes SCC to create a backup of the Manual Question results to a
datetime/username subfolder of Completed_Files each time "Save Document and Close" is
to a Backups sub‐ pressed. This creates a backup file with the date/timestamp and the
directory username of the person logged into the computer. These files can be
used to manually restore a backup, or show changes with diff utilities.
Refer to Section 4.6.2.2 for more information.
OPTION DESCRIPTION
Obtain Manual This option sets SCC to obtain Manual Auestion autoanswer files from
Question <SCC Install>Resources/Content/Manual_Questions/Completed_Files/
AutoAnswer Files
from the default
directory
Obtain Manual This option sets SCC to obtain Manual Questions autoanswer files from
Question any end user specified directory. This also instructs the SCC GUI to save
Autoanswer files Manual Questions to this custom directory.
from a Custom
Directory
27
SCC User Manual for Windows
OPTION DESCRIPTION
Maximum local This option allows the end user to determine the number of local
threads for threads for parallel scanning with WMI and SSH based scanning. Each
performing remote thread takes about 30 MB of RAM. More threads will speed up large
WMI or SSH scan remote scans, but could cause slowdowns or issues on the local
computer.
Maximum minutes to This option allows the end user to specify a maximum amount of time to
allow SCC to start on wait for SCC to be launched on the remote computer. This may fix
remote system issues on certain slow remote systems, especially with certain anti‐virus
products and features enabled that slow down extraction of zips and
cabs.
OPTION DESCRIPTION
SSH: Remote Base Directory to copy a temporary copy of SCC for remote SSH based scans.
Directory, SCC will This directory must exist, and should exist on it's own partition if
make a sub‐dir of possible. Default is /opt. SCC will create a subdirectory called 'scc‐
'scc‐remote' remote' in the specified directory, which it will install a temporary copy
of SCC, and a results subdirectory for scanning logs and results.
1. From the scanning computer, after the temporary files are copied
to the target computer in the user specified directory (default is
/opt/scc-remote), the scanning computer runs the following
command to whitelist cscc-remote via SSH:
fapolicy-cli -f add /opt/scc-remote/cscc-
remote
fapolicyd-cli --update
2. Then cscc-remote is called and it whitelists all of it's known
binaries with the same method as #1
3. cscc-remote scans the computer
4. When csc-remote completes, the scanning computer then removes
the directory and all files/subdirectories with the following via SSH:
28
Editing Options
OPTION DESCRIPTION
WMI: Use Alternate This optional feature allows SCC to connect to target computers
Credentials specifying alternate credentials. Please note that with this mode
enabled, the command line interface of ‐‐wmi will prompt the user for
the master password, in the same method as ‐‐ssh scanning, so any
scripted usage of ‐‐wmi should have this option disabled.
OPTION DESCRIPTION
Do Nothing, leave This option leaves any older version of content as installed, and if it's
older content as‐is enabled, it remains enabled.
when installing
newer versions
Disable older This options leaves the older version of content as installed, but disables
versions of matching it.
content
Archive older This option moves the older version of content to
versions of matching <install>\Resources\Content\Archived_Content
content
Delete older versions This option will delete any older version of matching content.
of matching content
29
SCC User Manual for Windows
OPTION DESCRIPTION
Perform XML Schema This option validates that the XML content is syntax error free before
Validation on Input installing new content into SCC.
Files during
Installation
Perform XML Schema This options validates that the XML content is syntax free before SCC
Validation on Input uses it for each scan.
Files before scanning
Perform XML Schema This options validates that the XML result files are syntax and error free
Validation on Output after creation.
Files
OPTION DESCRIPTION
Perform XML Digital This option will validate signed XML content files prior to execution.
Signature Validation
before scanning
Cancel Scan(s) on This option will automatically cancel a scan if the signed XML file(s) fail
XML Digital Signature XML digital signature validation.
Validation Failure
OPTION DESCRIPTION
Allow non schema This option is reserved for content developers. As of 5.1, SCC strictly
validated content via validates all content against the appropriate content schema prior to
manual installation any scan (not just on installation). Since this security feature can be
disruptive during content development testing with SCC, this option
allows for a relaxation of that feature.
REPORT DESCRIPTION
All Settings This report contains detailed pass and fail results from each check
performed. It is a large report and is not intended for printing
All Settings Summary This report contains a summary of pass and fail results from each check
performed.
Non‐Compliance Non‐compliance reports contain detailed results from each failed check.
It is a large report and is not intended for printing
Non‐Compliance This report contains a summary of failed checks
Summary
FORMAT DESCRIPTION
HTML HTML formatted reports for viewing with a web browser
30
Editing Options
Text Plain Text reports for viewing with a text editor such as Notepad or
Wordpad.
FORMAT DESCRIPTION
Sort HTML/Text With this option enabled, SCC's reports will be sorted by severity and
reports by XCCDF then groups by Automated/Manual. If this option is disabled, SCC's
rule Severity, and reports will be sorted in the same order as the STIG manual, with no
group by groupings.
automated/manual
REPORT DESCRIPTION
Only display a user This option prevents the All‐Settings and Non‐Compliance HTML and/or
defined number of Text reports from getting extremely large if SCAP content contains
collected items file/user test that collect items for thousands or millions of
files/directories and users. This does not impact the accuracy of the
check, it just limits the number of detailed finding to include in reports.
'pass' threshold This is the number of collected items that pass to include for each test.
Default is 100
'fail' threshold This is the number of collected items that do not pass to include for
each test. Default is 1000
OPTION DESCRIPTION
Save XCCDF XML files This option allows the user to disable saving the XCCDF XML files after
the review. It should always be enabled unless drive space is limited. If
this option is not enabled, multiple computer summary reports cannot
be created.
Save OVAL XML files ‐ This option allows the user to enable saving the OVAL XML files, which
Full with System contain the detailed results from each review, and can be very helpful in
Characteristics debugging problems, or recreating reports after scans occur.
Save OVAL XML files ‐ This option allows the user to save a slightly less verbose version of
Full without System OVAL results, which exclude the System Characteristics, and is required
Characteristics by SCAP 1.2.
Save OVAL XML files ‐ This option allows the user to save even less data to OVAL results, which
Thin exclude the System Characteristics and Test results, and is required by
SCAP 1.2.
Do Not Save OVAL This option allows the user to not save OVAL XML results after each scan
Results is complete.
Save OCIL Results This option allows the user to disable saving OCIL XML files (if content
includes OCIL content).
Save NIST ARF XML This option creates the NIST SCAP 1.2/1.3 Asset Reporting Format (ARF),
files which may be useful if an AFT results consumer is being used, or for
testing official SCAP capabilities.
Save DISA Checklist When running NIWC Enhanced SCAP content, which contains Manual
'CKL' file when using Questions, create the DISA Checklist 'CKL' report, which can be used by
31
SCC User Manual for Windows
content enhanced systems such as eMASS, and eliminates the need to use the STIG Viewer
with Manual to import SCC results, answer manual questions and export CKL results.
Questions
Creating CKL results from 'standard' DISA SCAP content is not supported,
as DISA SCAP benchmarks do not contain all of the rules from the STIG
Manual, only those that are automated.
Save Failed CPE XML This option enables saving of Common Platform Enumeration (CPE)
result files results for SCAP streams that are not applicable to the target system.
This option should only be enabled for debugging why a SCAP stream is
not performed against a target system. Enabling it will create numerous
small XML files, which are not required for any other reporting purpose.
OPTION DESCRIPTION
Save Summary This option saves an HTML report that is created at the end of each
Viewer scan, and provides an easy way to see all of the HTML/Text/XML results
created by SCC during that scan session.
Summary Viewer The summary viewer HTML report can be sorted by three fields. This
Sorting report is primarily useful if more than one computer or content stream
is used.
Below is the default sort order and a description of each:
OPTION DESCRIPTION
Save Scan Session This option enables creating a scan session database which resides in
Information the root of the SCC results directory, and allows for easy viewing and
(directory, scores, searching and deleting of existing SCC scan sessions.
filenames)
Double Clicking any This option instructs SCC to open SCC created files with a fie viewer
log, report or XML internal to SCC. If this option is disabled, SCC will attempt to open the
file in the session file with the Operating System default file viewer based on the file type,
viewer in SCC opens although on many linux distributions, this may not work well, as SCC is
run as root, and HTML and PDF viewers may not be allowed to run as
root.
32
Editing Options
OPTION DESCRIPTION
Save Screen Log This option saves the analysis log printed to the "Status" screen to a text
file for viewing after the review.
Save Debug Log This option saves a large amount of additional information related to
what occurred during a review. This option is disabled by default and
should only be used when attempting to resolve errors in the
application, as it will slow down the application and potentially use large
amounts of disk space.
OPTION DESCRIPTION
Save Configuration to This option dynamically sets the base directory in which SCC saves it's
the User's Home configuration (5.9_options.xml) on a per‐user basis.
Directory
Ex: C:\users\TestUser\
SCC\Config\5.9_options.xml
Save Configuration to This option sets the based directory in which SCC saves it's configuration
the Running (options.xml) to the location SCC is running/installed.
Application Directory
Ex: C:\Program Files\SCAP Compliance Checker
5.9\options.xml
This is a new option for SCC 5.3, and currently contains the SSH Host Credential Database,
SSH trusted keys, and other security related items related to SSH. In the future it could
contain other security related configuration.
If SSH based scanning is not used, this directory may not exist, and the SSH Host Credential
Database is not created until it is used.
OPTION DESCRIPTION
Save SCC's Security This option dynamically sets the base directory in which SCC saves it's
Configuration to the security configuration to each user's home directory. This option is
User Home Directory recommended, both for increased security, and to prevent it's
33
SCC User Manual for Windows
Ex: C:\users\TestUser\SCC\Config
Save SCC's Security This option sets the based directory in which SCC saves it's security
Configuration to the configuration to the location SCC is running/installed.
Running Application
Directory Note: This setting is not recommended, due to potential security issues,
and loss of credential data if SCC is uninstalled/reinstalled into the same
directory.
This field is guarded by input validation and will only allow a user to
enter an absolute directory path that exists. Any input outside of those
values will result in an error and the option will not be allowed to be
saved.
OPTION DESCRIPTION
Save Results to the This option dynamically sets the base directory in which SCC saves all
User Home Directory Logs and Results on a per‐user basis.
Ex: C:\users\TestUser\SCC
Save Results to the This option sets the based directory in which SCC saves all Logs and
Running Application Results to the location SCC is running/installed.
Directory
Ex: C:\Program Files\SCAP Compliance Checker 5.9
Save Results to a This option allows the end user to specify any custom directory to save
Custom Directory all SCC Results and Log.
This field is guarded by input validation and will only allow a user to
enter an absolute directory path that exists. Any input outside of those
34
Editing Options
values will result in an error and the option will not be allowed to be
saved.
OPTION DESCRIPTION
Create This option creates a directory to store SCC application logs (those not
'ApplicationLogs' related to performing a SCAP content scan session)
subdirectory
Create 'Sessions' This creates a base directory to store all scan sessions.
subdirectory
>| Create This option automatically creates a subfolder with the 'Date/Timestamp'
'Date/Timestamp' within the results directory.
subdirectories (This option is highly recommended, as it's required for new scan
session viewing feature.)
>>| Create 'Results' This option automatically creates a subfolder of 'Results' within the
subdirectory Sessions directory
>>| Create 'Logs' This option automatically creates a subfolder of 'Logs' within the
subdirectory Sessions directory, as s sibling of the 'Results' directory. These 'scan'
logs will be directly related to the HTML/Txt/XML files in the 'Results'
directory.
>>>|Create 'SCAP', This option automatically creates a subfolder based on the content
'OVAL', 'OCIL' and 'SCAP', 'OVAL', 'OCIL' within the results directory, and ApplicationLogs
'ApplicationLog" within the Logs directory
directories
>>>|Create 'Content This option automatically creates a subfolder with the 'Content Name'
Name' Subdirectories within the results directory.
(This option is disabled by default.)
>>>>>|Create 'Target This option automatically creates a subfolder with the 'Target Name'
Name' Subdirectories within the results directory.
(This option is disabled by default.)
>>>>>>|Create 'XML This option automatically creates a subfolder called XML
Subdirectory
OPTION DESCRIPTION
Target Name This option adds the target host name to resulting report filename.
Ex: Computer1_All-Settings_Mozilla_Firefox.html
SCC Version This option adds the SCC version to the report filename:
Ex: Computer1_SCC-5.9_All-
Settings_Mozilla_Firefox.html
Content Version This option adds the content version to the report filename:
Ex: Computer1_SCC-5.9_All-
Settings_Mozilla_Firefox-001.015.html
Date/Timestamp This option adds a date/timestamp to the report filename:
Ex: Computer1_SCC-5.9_2021-02-17_125008_All-
Settings_Mozilla_Firefox-001.015.html
35
SCC User Manual for Windows
OPTION DESCRIPTION
Allow SCC to set This option allows SCC to set restricted permissions on the Logs and
restricted Results (XML, Text, HTML) created by SCC. This can be useful especially
permissions on SCC if results are set to write back to the application install, or some other
created Logs and location were non‐privileged users have read access.
Results
On Windows: SCC sets the permissions to be the user running SCC,
Administrators, and System
SCC has the ability to copy results after each scan via SFTP to a centralized server for easier
data collection. This option is not related to SSH based scanning, refer to section 4.3 for SSH
based scanning of UNIX systems.
OPTION DESCRIPTION
Enable File Transfers Transfer any report/log that is enabled
Delete Local Results This option will delete the local results off of the machine after SCC has
After Transfer successfully transferred the files to the SSH server
OPTION DESCRIPTION
Hostname/IP Enter the DNS hostname or IP Address of the SFTP server to copy result
to.
This field is guarded by input validation and will only allow a user to
enter a hostname or ip address. Any input outside of those values will
result in an error and the option will not be allowed to be saved.
Port Enter the port which the SFTP server is listening (normally 22)
This field is guarded by input validation and will only allow a user to
enter a port number between 0 and 65536. Any input outside of those
values will result in an error and the option will not be allowed to be
saved.
Diretory By default, this is set as the user's home directory (e.g.
/home/<username>) but can be changed here to reflect the desired
directory you would like the reports to be transferred to.
This field is guarded by input validation and will only allow a user to
enter an absolute directory path that exists. Any input outside of those
values will result in an error and the option will not be allowed to be
saved.
36
Editing Options
OPTION DESCRIPTION
Connection with Select this option if you plan to authenticate with username/password
Username/Password combination
Connection with Select this option if you plan to authenticate with a private key.
Private
Key/Passphrase Note: SCC only supports private keys that are
secured with a private key passphrase
Username Required for either Username/Password or Private key authentication
This field is guarded by input validation and will only allow a user to
enter a proper username (eg, nothing that starts with “;”). Any input
outside of those values will result in an error and the option will not be
allowed to be saved
Password Only required if Username/Password authentication has been selected
Private Key Only required if Private Key/Passphrase authentication has been
selected
Private Key Only required if Private Key/Passphrase authentication has been
Passphrase selected
OPTION DESCRIPTION
Use System Proxy SCC should use the system configured proxy (or not) that has been
configured as part of the OS and is used Internet Browsers
Use Environment Primarily a UNIX/Linux method, but SCC looks for http_proxy or
Variable Defined https_proxy environment variables
Proxy
No Proxy SCC connects without any proxy
Custom Proxy Enter the proxy to be used by SCC, in the format of http://<proxy
server>:<port> or https://<proxy server>:<port>
OPTION DESCRIPTION
Periodically Check for Allow SCC to check for application updates when SCC launches. This
SCC Application feature does not download or install/upgrade SCC, it only notifies the
Updates user that an updated version is available.
Frequency (Days) Number of days between SCC Application Checks.
SCC Update URL Internet (or could be updated to an Intranet location) to query for SCC
release information.
OPTION DESCRIPTION
37
SCC User Manual for Windows
Periodically Check for Allow SCC to check for application updates when SCC launches. This
SCAP Content feature allows the user to download and install updated content into
Updates SCC.
Frequency (Days) Number of days between SCC Application Checks.
Include pre‐release Internet (or could be updated to an Intranet location) to query for SCAP
(Draft/Test) versions Content information.
of SCAP Content
OPTION DESCRIPTION
Add Repository URL Press the Add Repository URL button to add a URL to the repository list.
Edit Edit an existing URL by right clicking on it, and clicking Edit.
Delete Delete repository URL by right clicking on it, and clicking Delete.
Delete All Delete all repository URL's by right clicking and selecting Delete All.
38
4.5 Viewing Results
After the SCC software completes the review, reports, XML files and any scan related logs can
be viewed within SCC by clicking:
Scan Sessions:
This section displays scan Sessions, which corresponds to each click of 'Start Scan' or
each review performed by command line. Each session may contain many
computers, with many different SCAP content streams. When opening this form, the
most recent scan session is automatically selected. Left click to select any scan
session, or right click for more options. After selecting a session, see Results and
Reports below.
Results:
This section displays the high level results of a SCAP scan; it contains the hostname,
scap content name, score, error count and warning count. Left click any row to select
different Host/content combinations.
Reports/XML/Logs:
This section displays the reports, XML and Logs (if created) based on the
Host/Content combination selected in the Results pane. Double click to open the
report in SCC, or right click for more options.
If something unexpected occurs within the SCC GUI, which is not part of a SCAP scan,
application logs can be useful in determining the cause.
Application Logs:
This form displays any application logs (if any exist, such as screen, debug or error).
Double click to open the log in SCC, or right click for more options.
39
4.6 SCAP Scanning with Manual and/or Hybrid Questions
Starting with SCC 5.7, SCC includes NWIC 'Enhanced' STIG SCAP content by default, which
converts non-automated requirements from the STIG Manual into manual questions in SCC,
which are included as OCIL.
Starting with SCC 5.9, SCC includes the ability to take end user entered values in a very
specific format refer to Section 6 of the User Manual which explain Hybrid questions in detail
and provide several usage examples.
• Review system documentation and determine what is authorized for the STIG rule in
question
• Determine which targets the authorized value(s) is/are applicable to
40
SCAP 1.1 Content with an OCIL Questionaire
Note: Each row will be processed in order priority, and only the first value
found that is applicable is applied to a target, so a target of 'ALL' (if needed)
should only be used last in a list.
2. Enter as many hybrid_variable XML blocks as needed for your target(s) and
values, note that each hybrid_variable will be processed in order priority, and
only the first value found that is applicable is applied to a target, so a target of
'ALL' (if needed) should only be used last in a list.
A very simple example of this would be, if the value of 'dbo' was the
required setting for all database scanned, then the following should be
entered:
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
<authorization>My SSP, My
ISSM</authorization>
<authorized_values>
<authorized_value>dbo</authorized_valu
e>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
41
SCC User Manual for Windows
When you have completed all of the questions, or all that you want to change for now, click
'Save Document and Close'. This will save your answers and they will be applied to all future
scans.
If you have the option enabled to automatically backup Manual Question results, a new
backup of the text based results will be stored to a subdirectory called Backups, each time you
press Save Document and Close Form. If your Manual Question autoanswer results file in the
Completed_Results directory somehow gets corrupt or lost, you can manually restore a
backup version.
Example:
MOZ_Firefox_Windows_6.3.2_Autoanswer.txt_2023-02-16_084507_testUser1
MOZ_Firefox_Windows_6.3.2_Autoanswer.txt_2023-02-16_084507_testUser1
to MOZ_Firefox_Windows_6.3.2_Autoanswer.txt
Then copy the renamed file from the Backups directory to the Completed_Files directory.
Starting with SCC 5.7, SCC supports a text based method for answering manual questions,
via autoanswer text files. SCC's OCIL interface reads from and updates these files, so an end
user can update an autoanswer file, or answer questions via SCC GUI and the results should
be the same. Refer to section 5.7 for more information on SCC's new text based manual
question autoanswer support.
Starting with SCC 5.7 (on Windows) SCC will prompt to upgrade configuration and manual
question results on first launch. If the manual question results are configured to be stored in
the application installation directory (default), SCC will copy the files from 5.7 to 5.7.1 etc. If
the manual question results directory has been configured to a custom directory, SCC 5.7.1
will use that custom directory, as a side effect of the configuration upgrade.
For Linux: When using package based installation, with the RPM or DEB upgrade method
selected, SCC will install to the same directory as previous versions, upgrade the
configuration to the current version, and have all of the manual questions results available.
42
SCAP 1.1 Content with an OCIL Questionaire
Starting with SCC 5.7.1, SCC now automatically converts manual question results to the
latest SCAP content. Only questions that match the same XCCDF rule and version are
updated, so if any change is made to an XCCDF rule in the updated STIG manual, answers
will not be converted and those questions will need to be re-answered.
43
4.7 XCCDF Tailoring
SCAP 1.2 and SCAP 1.3 specifications allow for a separate 'tailoring' XML file which allows
users to customize certain portions of the XCCDF stream, without modifying the source XML file.
Customizations include:
o Creation of a new profile
o All modifications will be reported under a new profile, with the original profile
name followed by "_tailored'
o Selecting and deselecting rules and groups
o This allows users to disable rules that may cause incorrect results, or take too
long to complete.
o Results will be marked as 'not selected'
o Modifying refine-rules, values and refine-values
o This allows users to modify certain rules to meet their organizational
requirements. Note that not all rules will have modifiable values, and OVAL
XML content may need to be edited.
SCC supports this feature, and provides a graphical interface for creating and editing the
XCCDF tailoring file.
This section displays the internal rule ID, Title, Description and FixText, along with a Rule
Remarks text entry field that can be used to document why a rule as enabled or disabled.
Field Description
Selector A dropdown that shows any selector that may be present. For
NIWC Enhanced content it contains "Automated" or "Manual",
and allows users to change any automated rule to a manual
question, which could be useful if the automated rule does not
meet the end users organization needs. Instead of disabling the
rule, the rule can then be performed with a manual question.
For DISA created content, this dropdown will be empty.
Weight End user customizable field to change the weight of the rule,
which is used in calculating the overall score.
Severity Dropdown for end user customization of the severity. SCAP
allows for "high", "medium", "low", "info" and "unknown"
Role Rules can be set to 'full', which is the default (and recommended
option), but can also be set to 'unscored', where the test is
performed, but failing does not impact any compliance score, or
unchecked, which is essentially the same as disabling a rule.
Refine Enter any text that you would like to see in SCC reports, which
44
XCCDF Tailoring
To modify a value:
1. Click on any row in tree listed with a Type of "Value"
A. Enter the desired value in the 'Set Value To' field, and click "Apply Value"
OR
B. Select the Refined Value Selector
Note that the Refine Value Selector may only have a single row, unless the SCAP
content contains multiple options to choose from.
Click Save and Close. The selected profile on the main SCC form should be updated to reflect
the new <Profile>_tailored profile.
After clicking Save, a form will appear with the following fields. These will all be saved to the
resulting XML results and HTML/Text reports if enabled.
Field Description
Agency/Organization Enter your Agency/Organization Name
Full Name Enter your full name
Notes Enter any notes that help explain why this XCCDF Tailoring
file was created.
Version Enter a version for this XCCDF Tailoring file
Status Select the status of this XCCDF Tailoring file (Draft,
Accepted, Deprecated, Incomplete, Interim)
45
4.8 Cisco IOS / IOS XE Offline (Show Tech) File Scanning
This option instructs SCC to scan an existing Cisco IOS/IOS-XE "show tech" file. The file format
required for this type of assessment is very specific. To create a configuration file suitable for
using in SCC:
1. Logon to the device with full (level 15) privileges (enable mode)
2. Type “show tech" saved to a single text file
3. Save the file as “<devicename>_<date>.txt”
NOTE: Save this file as Text Only with Line Breaks using a
plain text editor such as Notepad. Do not use Microsoft Word
or other document editor. Only one device per file
4. Disable any Windows or UNIX SCAP/OVAL content, otherwise many content errors will be
reported
5. Enable just Cisco IOS specific SCAP/OVAL content
This option allows the end user to select a single file, either a text file (.txt) containing single
Cisco IOS/IOS-XE "show tech" file, or a zip file containing a collection of Cisco IOS/IOS-XE
"show tech" configuration file.
4.8.2 Browse for a directory containing Cisco IOS / IOS XE show tech files
This option allows the user to select a directory which contains a collection of text (.txt) based
Cisco IOS/IOS-XE show tech files.
In the event that one or more IOS line tests error due to unsupported "show" commands, take
note of the list of unsupported commands that are listed at the end of the analysis. Most Cisco
IOS content is likely to attempt collection of "show" command output that is not provided by the
"show tech" or "show tech-support" commands by default. The best recourse is to manually
execute any unsupported commands and append their output to the "show tech" command
output, or to perform the scan via SCC's SSH based scanning mode and let SCC collect all of
the required show commands automatically.
1. Logon to the device with full (level 15) privileges (enable mode)
2. Execute the listed commands
3. Copy the output of each command and append it to the original "show tech" output file with a
leading header on its own line that specifies the command that generated the output
4. Ensure each header consists of a sequence of 18 hyphens, a space, full show command (no
shorthand notation), another space, and 18 more hyphens for consistency with the default
"show tech" command output
Example:
<existing output of show tech> then
46
Cisco IOS Config Usage
47
4.9 Standalone OVAL Usage
Standalone OVAL content usage is designed primarily for advanced SCC users, such as
content authors who wish to run OVAL content without creating an entire SCAP benchmark. It
can also be used to perform vulnerability scanning using existing OVAL vulnerability content.
No standalone OVAL content is currently bundled with SCC.
If standalone OVAL content uses an external variables file, the file will need to match the name
of the base oval document, but ending with "external-variables.xml". When installing
standalone OVAL with external variables, just include the file in the zip file to be installed.
Example:
o MyContent.zip
o myOVALContent.xml
o myOVALContent_external-variables.xml
48
4.10 Standalone OCIL Usage
Standalone OCIL (Open Checklist Interactive Language) content usage is designed primarily for
advanced SCC users, such as content authors who wish to run OCIL content without creating
an entire SCAP benchmark. No OCIL content is currently bundled with SCC.
SCC will also search the <SCC Install>\Resources\OCIL_Content directory and subdirectories
for OCIL XML files.
OCIL schema validation occurs during installation of the OCIL content. If the OCIL content is
deemed invalid, SCC will inform the user via a dialog box but will continue the installation
process. The user will be notified of the result of the installation process in a separate dialog
box.
Unlike the automated portions of SCC, which the target is always a computer, whose
hostname is automatically populated by programmatic means during the scan, with OCIL, the
target could be a computer/system or a user/person, and each will need to be manually
entered.
To create a new system target, click on the 'add target system' in the in upper left corner of
the form. Then enter in as much information as you have.
FIELD DESCRIPTION
System Name The name of the system, generally a computer, which is the target for the
checklist. This field is mandatory.
IP Address Optional field to report on the IP Address associated with this system.
Organization Optional field to document the organization that the system is a part of.
Description Optional field to enter any other information about this system that might be
relevant.
To create a new user target, click on the 'add target user' in the in upper left corner of the
form. Then enter in as much information as you have.
49
SCC User Manual for Windows
FIELD DESCRIPTION
Full Name The name of full name of the person being interviewed. This field is
mandatory.
Email Optional field to report on the email address of the person being interviewed.
Organization Optional field to document the organization that the person is a part of.
Description Optional field to enter any other information about this person that might be
relevant.
This form allows you to answer any questions in the OCIL questionnaire. All of the question
titles will be listed in the tree on the left hand side. To answer a question, click at the leaf
node, which has a grey circle. This will populate the associated question on the right hand
side.
For each question, the user can manually enter an artifact which may help explain the results.
To enter an artifact, click on the Add Artifact button.
The OCIL content can also ask specifically for artifacts, which will cause a new form to
appear, which contains:
FIELD DESCRIPTION
Title Content provided title
Description Content provided description, likely explaining what data the end user should
provide
Artifact Location for the end user to enter data as specified in the Description field.
Save After entering Data, click Save to close this form.
When you have completed all of the questions, click "Save Questionnaire Session and Close".
This will take you back to the OCIL Questionnaire Form, or to the next Questionnaire if more
than one has been enabled.
If you have answered all of the OCIL Questionnaire, click "Create Reports" to proceed to
creating reports with the results.
50
4.11 Post Scanning Report Generation
SCC, by default, creates most of the commonly used reports during each scan. However,
additional reports can be from previous scan results. These are completely optional depending
on your desired usage.
OPTION DESCRIPTION
Source Directory Location for the application to scan for XCCDF and/or OVAL XML results
from previous reviews. This option is recursive (all subfolders will be
scanned for files to use).
Open Destination This opens Windows Explorer to the directory containing the new
Directory when summary reports, when the processing is complete.
processing is
complete
4.11.2 Reports
SCC can generate multi-computer summary reports from the XCCDF XML (SCAP) results
created by the SCC or other SCAP Validated applications.
To generate summary reports from existing XCCDF XML files:
/Entire Organization
/ Sub Organization 1
/ Sub-Sub Organization
/ Sub Organization 2
/ etc.
If the SCC is pointed at the entire organization, or any subset, the summary reports will only
contain the desired subset of computers.
OPTION DESCRIPTION
Site Summary This report provides a consolidated list of checks, with a single CCE
reference and the Pass, Fail, Error, Unknown, Not Applicable, Not
Checked, and Not Selected occurrences for each check.
Site Summary Non‐ This report provides a consolidated list of checks, with a single CCE
Compliance reference and the Fail, Error and Unknown occurrences for each check
that had a fail or an error status.
51
SCC User Manual for Windows
Computer List This report lists the latest results for all computers reviewed and the
Review Time, Pass, Fail, Error, Unknown, Not Applicable, Not Checked,
Not Selected, Total along with the Original and Adjusted Scores.
Computer List This report lists all results for all computers reviewed, and the Review
Historical Time, Pass, Fail, Error, Unknown, Not Applicable, Not Checked, Not
Selected, Total along with the Original and Adjusted Scores.
SCC can regenerate single computer detailed reports from the XCCDF XML and OVAL XML
(SCAP) results created by the SCC or other SCAP Validated applications.
REPORT DESCRIPTION
All Settings This report contains detailed pass and fail results from each check
performed. It is a large report and is not intended for printing.
All Settings Summary This report contains a summary of pass and fail results from each check.
Non‐Compliance Non‐compliance reports contain detailed results from each failed check.
It is a large report and is not intended for printing.
SCC can regenerate single computer detailed reports from the standalone OVAL XML results
created by the SCC or other SCAP Validated applications.
REPORT DESCRIPTION
All Settings This report contains detailed pass and fail results from each check
performed. It is a large report and is not intended for printing.
All Settings Summary This report contains a summary of pass and fail results from each check.
Non‐Compliance Non‐compliance reports contain detailed results from each failed check.
It is a large report and is not intended for printing.
FORMAT DESCRIPTION
52
Generating SCAP Summary Reports
Excel Excel Spreadsheet versions with separate tabs per SCAP stream
To create the summary reports, click Generate. The status window will display the progress.
After Multi-Computer Summary Reports are created a Windows Explorer window may open
(based on user preferences), and the reports specified to be created will be available in HTML
and/or Excel spreadsheets. To view, double click on any of the files.
53
4.12 File and Help Menus
54
File and Help Menus
Check for SCC App Downloads a small XML file from the URL(s) specified in the Options ‐>
Updates Update Options ‐> SCC Update URL option, and then compares current
content to that in the XML file and informs the user if there is an
updated version of SCC available for download.
End User License Displays SCC's End User License Agreement.
Third Party Licenses Displays a listing of all Third Partly Licenses in use by SCC.
Rate SCC via Online Our survey is now online 24/7 and we get reports on a monthly basis, so
Survey you can rate what you think of the SCC application and our tech support
anytime. The website is:
https://usnavy.gov1.qualtrics.com/jfe/form/SV_4ZpXv8JkUlDs4lw
About Lists SCC's version, build number and supported SCAP features, and
contact information.
SCC's configuration profiles save all configuration settings of SCC and make it easily
available for switching between. Every configuration setting, and hosts enabled are kept as
part of the configuration profile, so you can select a collection of targets, content, and have
custom tailoring or custom manual questions for a group of hosts, and then switch to another
profile that has different hosts, content etc...
4.13.1 Profiles
To create a new profile, click "New Profile", this will display a text entry box in which you can
enter the name of the profile you wish to create. Only letter and numbers are supported, as
this will be used the filename of the new options file to be created.
Ex: TestProfile1
By default, SCC only has one profile called 'default', and it cannot be renamed. To create
your own profile, click the New profile button. After you have created one or more new
profiles you can select it from the dropdown list.
This deletes the options file related to your custom profile and removes it from the dropdown
list.
Profile Metadata
This text box displays some of the key options that may help you decide which profile to use.
This is not a complete list, as every option available in SCC is stored as part of your new
profile.
Example:
55
SCC User Manual for Windows
56
5. COMMAND LINE USAGE
SCC has a separate executable for command line usage which is included in the installation
package as 'cscc.exe'. The Command-line SCAP Compliance Checker (CSCC) allows for
scripted or automated reviews by other applications or scheduled tasks.
Any changes made via the SCC GUI such as content installation, or application preferences
impact the command line interface and vice versa, as the options for both interfaces are saved
to the same 'options.xml' file located in the SCC installation directory.
Open an command prompt (admin for any local scanning) and change directory to the SCC
installation directory.
Example:
57
5.2 Command Line Configuration Parameters
##################################################################
CONFIGURATION PARAMETERS:
Below are the parameters available for installing content and
configuring application options. All of the following options must
be used individually, and are not compatible with any other
parameter.
-lc, --listConfigProfiles
Prints a list of all available SCC configuration profiles
-nc, --newConfigProfile
Creates and enables a new configuration profile for all future
usage
based on the current configuration. This only supports letters
and numbers
all other characters will be removed
Example: cscc.exe --newConfigProfile myProfile2
See --listConfigProfiles for a list of config profiles
-sc, --selectConfigProfile
Selects a configuration profile for all future usage
Example: cscc.exe --selectConfigProfile myProfile
See --listConfigProfiles for a list of config profiles
--config
Open a command line menu which displays several configuration
options
58
Command Line Configuration Parameters
-ea, --enableAll
Enable all SCAP and OVAL content.
-da, --disableAll
Disable all SCAP and OVAL content.
59
SCC User Manual for Windows
-ua, --uninstallAll
Uninstall all SCAP and OVAL content.
--setProfileAll PROFILE
Set a profile to be applied to all content installed in SCC, if
applicable. If a profile cannot be applied to a content stream it is
not applicable. See --listAllProfiles to obtain a list of profiles.
Example: cscc.exe --setProfileAll MAC-3_Sensitive
--generateOptionsFile
Delete the options file, restore default settings, and reinstall all
content. Note that this may take a few minutes.
--generateAutoAnswerTemplates
Delete and regenerarate all of the Manual Question auto-answer
template files found in
Resources/Content/Manual_Questions/Templates
--restoreDefault
60
Command Line Configuration Parameters
--installTailoringProfile FILE
Install an existing XCCDF Tailoring Profile file from another
installation of SCC, created by the SCC GUI Tailoring interface.
Installing a tailoring profile will set the selected profile for
the matching content to be the tailored profile in the selected
tailoring file
61
SCC User Manual for Windows
--installUnixPlugin FILE
Install the UNIX Plugin file, to allow SSH based scanning of remote
UNIX hosts. The file below can be obtained from the same location
you downloaded SCC: SCC_5.5_UNIX_Remote_Scanning_Plugin.scc
Example: cscc --installUnixPlugin
<path>SCC_5.5_UNIX_Remote_Scanning_Plugin.scc
Refer to --installCredentialDB if this computer does not have the
ability to open the SCC GUI to update/maintain the hosts/credentials
--installCredentialDB FILE
If this computer is not able to open the SCC GUI to create/maintain
the SCC Host Credential Database, which is used to enter hosts and
credentials for SSH based remote scanning of UNIX and Cisco devices,
this feature allows you to install a previously created Host
Credential Database and use it for scanning.
*** NOTE 1: You will not be able to create new hosts, or edit
credentials, just perform scans using the Master Password for the
existing set of hosts/credentials. When host passwords expire, or
the Master Password expires, you'll need to obtain an updated Host
Credential DB and reinstall it via this command.
*** NOTE 2: This feature will always overwrite the existing host
credential db (if found). You will need to manually copy the
hostCredentials.db from another installation, by default it's found
in <your home directory>\SCC\Config
--upgrade FILE
62
Command Line Configuration Parameters
63
5.3 Command Line Scanning Parameters
Below are the parameters available for performing scans. Many of the options can be used
in combination, unless indicated below. Any configuration change from a Scanning
Parameter is temporary, and does not get saved for future use.
#########################################################
SCANNING PARAMETERS:
Below are the parameters available for performing scans. Many of the
options can be used in combination, unless indicated below. Any
configuration change from a Scanning Parameter is temporary, and
does not get saved for future use.
no parameters
Review the local computer based on the configuration settings found
in options.xml. If options.xml does not exist in the installation
directory, it will be created based on application defaults
-d, --debug
Create a verbose debug log file in the Logs directory for
troubleshooting purposes.
-ds, --debugToScreen
Debug to the Screen. This option will print a very large amount of
data to the terminal, which can be captured and shared with our
team, and should only be used to help diagnose crash type issues.
-dn, --doNotSaveChanges
Do not save changes back to SCC's options file.
This option prevent SCC from updating the option XML file being used
and is primarily for usage with automation such as cron.
-ear, --enableAllRun
Enable all SCAP and OVAL content and run content.
64
Command Line Scanning Parameters
--force32
Open the 32 bit version of SCC on 64 bit Windows
--ssh [cisco|unix]
65
SCC User Manual for Windows
--cisco FILE
Conduct an offline review against a Cisco IOS/IOS XE configuration
file or ZIP archive of multiple configuration files located at the
given file path.
**** Configuration files should be created with the 'show tech'
command
Example: cscc --cisco C:\Users\User1\sampleConfigFile.txt
-q, --quiet
Review in quiet mode. No output will be displayed on the screen.
66
Command Line Scanning Parameters
1. Review the local computer with customized report settings and do not display any data to
the screen.
cscc.exe -o myoptions.xml -q
2. Review several computers from a text file of hostnames with customized report settings.
cscc.exe -h computer1 -d
67
5.4 Option Descriptions and Datatypes
Below are all of the options that can be configured via the --setOpt command line parameter,
which is primarily designed for advanced users to automate command line reviews. This
information (with the exception of the description) can be obtained by running the --listOpt
command.
68
SCC Option Descriptions and Datatypes
69
SCC User Manual for Windows
70
SCC Option Descriptions and Datatypes
71
SCC User Manual for Windows
error log
Do not print date/time stamps
on every line of debug, which
allows for easier comparison
debugExcludeDateTime between debug logs Boolean (0/1)
Print Trace level debug, which
is more than default, enable
debugTraceEnabled with caution Boolean (0/1)
Maximum size for logs
(primarily debug) before
maxLogFileSize creating a new file Integer (MB)
OUTPUT OPTIONS
Integer
(1 = install to
shared/install
directory,
Save options to SCC install 0 = install to users
sharedOptions directory? home directory)
String that is an
Path to which SCC will save absolute directory
userResultsDirectory results path
Integer (0 = User's
home directory,
1 = Running
Application
Directory,
How 'userDataDirectory' is 2 = Custom
userResultsDirectoryValue determined Directory)
String that is an
Path to which SCC will save absolute directory
userConfigDirectory configuration information path
Integer (0 = User's
home directory,
1 = Running
Application
Directory,
How 'userConfigDirectory' is 2 = Custom
userConfigDirectoryValue determined Directory)
Path to which SCC will save
temporary files. Default
location will be <scc
install>/Local directory. This String (Absolute
setting can only be configured Directory Path,
via command line with ‐‐ Empty String =
customPathLocal setOpt default location"
OUTPUT SUBDIRECTORY OPTIONS
Create a subdirectory called
'ApplicationLogs' for
dirApplicationLogsEnabled application logs Boolean (0/1)
dirAllSessionsEnabled Create a subdirectory called Boolean (0/1)
72
SCC Option Descriptions and Datatypes
73
SCC User Manual for Windows
74
SCC Option Descriptions and Datatypes
75
SCC User Manual for Windows
76
SCC Option Descriptions and Datatypes
77
5.5 Generating Post Scan Reports from the Command Line
If a large number of files are collected on a share that is accessed via a LAN or WAN, it may be
most time effective to generate the reports via command line on the server that contains the
collection of files. This allows for a scheduled task to be created that can be run on a user
specified time frame.
For example, if 100,000 computers are reviewed, it will likely take many hours to generate the
summary reports. Ideally, this could be run during an evening a day after all of the results are
created.
This functionality requires configuring a custom options.xml file with the GUI, and calling the
application via command line with specific parameters.
Below are the parameters available for creating reports after XML results have been created.
All of the following options must be used individually, and are not compatible with any other
parameter.
############################################################
POST SCAN REPORT GENERATION PARAMETERS:
Below are the parameters available for creating reports after XML
results have been created. All of the following options must be used
individually, and are not compatible with any other parameter.
To set the source path for finding XML files to create summary
reports from use the following
To set the source path for finding XML files to create reports from
use the following
78
Post Scanning Report and Other Options
Generate detailed reports for SCAP using the specified options file.
Example: cscc.exe -ts options.xml
Example: cscc.exe --detailedSCAP myOptions.xml
To set the source path for finding XML files to create detailed SCAP
reports from use the following
To set the source path for finding XML files to create reports from
use the following
To set the source path for finding XML files to create detailed OVAL
reports from use the following
To set the source path for finding XML files to create reports from
use the following
Below are the parameters available for information purposes only. No configuration changes
or scanning occur. All of the following options must be used individually, and are not
compatible with any other parameter.
#######################################################
INFORMATIONAL PARAMETERS:
79
SCC User Manual for Windows
--checkForSCCUpdates
Check to see if newer SCC releases exist via online query.
Additional settings may need to be pre-configured before usage.
refer to: cscc.exe --config -> Options -> Update Options This does
not download or update/install SCC, it just verifies it's current.
--getOpt OPTION
Advanced user setting to retrieve the value of any SCC option.
Available options can be found with --listOpt, and need to be
specified exactly.
Example: cscc.exe --getOpt debugEnabled debugEnabled = 0
--listOpt
Advanced user setting to retrieve the configurable values for use
with --getOpt and --setOpt
--listAllProfiles
List all profiles according to the installed content. Note that not
all profiles are available to all content streams.
--listAllBenchmarks
List all benchmarks according to the content installed on the
system. Useful when setting a profile for specific content.
-v, --version
Display one liner version information.
-V, --verboseVersion
Display version information.
The process for scheduling cscc.exe via the Windows Task Scheduler is the same as any other
application, except the parameters listed above will need to be included. Below is an example:
1. Click Start -> Programs -> Accessories -> System Tools -> Scheduled Tasks.
80
Post Scanning Report and Other Options
2. Click "New".
3. Click "Browse".
4. Select the command line version of the file (Example "C:\Program Files\SCAP Compliance
Checker 5.9\cscc.exe"
5. Choose the selected time frame (Daily, Weekly, Monthly, etc.).
6. Enter the credential for the software to run.
7. Click "Open Advanced Properties for this task when I click Finish".
8. Click "Finish".
9. In the Run line add the desired parameters after the double quotes.
81
5.6 Multiple Computer Deployment
If the end user is automating the process of running the SCC software locally on multiple remote
computers, below is the list of files that must be present for the application to run via command
line.
• cscc.exe
• bin directory
• lib32 directory
• lib64 directory
• scc.sig32
• scc.sig64
• options.xml (or any custom named options file)
• "Resources" directory, subdirectories and all files
If the end user is pushing the command line version of the software out to the target computers,
and would like to collect the results in a consolidated directory for generating multi-computer
summary reports, below is documentation explaining which files to copy.
A directory structure will be created in the format (depending on user preferences), such as:
o SCC
o Sessions
o <Date Time Stamp>
o Results
o XML
The XML Directory will contain the resulting ARF, OVAL and XCCDF XML files based on user
preferences.
The only file required for generating the multi-computer reports is the XCCDF file, which will be
in the XML directory, in the format:
<Computer>_SCC_5.9_<DateTime>_XCCDF-Results_<Stream>.xml
After all of the XCCDF XML files have been collected and copied to a centralized share, multi-
computer summary reports can be created. Please refer to "Generating Multi-Computer
Summary Reports" section of the documentation for additional information.
82
5.7 Manual and Hybrid Question Answer Files
SCC supports answering of non-automated questions via Manual Question Auto-Answer Files.
These are text based templates based on OCIL (Open Checklist Interactive Language) XML
files. SCC includes 'enhanced' STIG SCAP content, which is programmatically created from
STIG Manuals and SCAP Benchmarks, to provide 100% coverage of the STIG Manual.
Files in this directory are programatically created by SCC when content is installed, or when an
end user changes the sort order of manual questions. Files in this directory should not be
manually updated, as they will be overwritten, and ignored. Files from this directory should be
copied to the Completed Files directory
This directory contains all of the completed autoanswer files, either create by SCC's Manual
Questions GUI interface, or edited manually by any text editor.
5.7.3 Usage
1. Ensure that SCC's option to process manual questions is enabled SCC Options ->
Scanning Options -> Process Manual Questions if found in SCAP content
2. Copy desired template(s) from the Templates directory to your Completed Files
directory
o Important: Do not rename the file(s), or SCC will not find it.
3. Open template using a text editor
a. Mark answers with an X
b. Remove X from "Not Reviewed" line
c. Add any comments
d. Do not add/remove any other sections to this file. The only editable portions
are selecting an answer with [X] and adding text based comments.
e. Save the file when complete
4. Run cscc to perform a scan, answers to manual questions should be applied to all
future scans.
Example:
============================================================
Select One of the following by entering an X in the brackets
[ ] Finding
[ ] Not a Finding
[X] Not Applicable
[ ] Not Reviewed
Enter any comments : This is a sample comment that will be
included in XCCDF XML, HTML, Text and CKL reports.
83
SCC User Manual for Windows
For a background and examples of Hybrid Questions in use, refer to Section 6 of this User
Manual.
If SCC reports a failure for a Hybrid test, and if the results match your approved system
documentation for that settings, you can document that approved value and SCC will use that
data, if properly formatted, and use it to perform tests in future scans. Below is an example,
and the user entered data is in bold.
All future scans will you the value of 'dbo' and if that is what is what the system returns, the
check will now pass.
SCC will also provide your Authorization information, entered after "ENTER
AUTHORIZATION" as part of all SCC results, to justify your values to auditors.
If SCC finds enhanced content that contains Manual Questions, and no Manual Question
autoanswer file is found, SCC will print a warning during each scan, and all manual question
results will be reported as not reviewed.
84
Manual Question Auto-Answer Files
SCC's graphical Manual Questions feature imports files from the Completed_Files directory
before making updates, so editing either manually via text editor or SCC GUI, or both should
work as expected, unless both methods are used at the same time, and then the last one to
save will win.
Starting with SCC 5.7 (on Windows) SCC will prompt to upgrade configuration and manual
question results on first launch. If the manual question results are configured to be stored in the
application installation directory (default), SCC will copy the files from 5.7 to 5.7.1 etc. If the
manual question results directory has been configured to a custom directory, SCC 5.7.1 will use
that custom directory, as a side effect of the configuration upgrade.
For Linux: When using package based installation, with the RPM or DEB upgrade method
selected, SCC will install to the same directory as previous versions, upgrade the configuration
to the current version, and have all of the manual questions results available.
5.7.8 Converting manual question results from one version of SCAP content to
another
Starting with SCC 5.7.1, SCC now automatically converts manual question results to the latest
SCAP content. Only questions that match the same XCCDF rule and version are updated, so if
any change is made to an XCCDF rule in the updated STIG manual, answers will not be
converted and those questions will need to be re-answered.
85
7. HYBRID TESTS
Hybrid Checks are a new feature of SCC 5.9 and later, and are only used in very specific use
cases, primarily with MS SQL Server Instance and Database STIGs. Many of the requirements
of the SQL STIGs require comparing the system configuration against user/system
documentation. This means that the 'requirement' for automating a test is user defined, and
historically have been manual checks, which require users to manually gather the system
configuration and manually compare those settings against user/system documentation.
If Hybrid tests exists in content, they will be visible in the Manual Questions, both in the GUI
and the command line (text file based) methods.
Hybrid tests take user input in an specific XML format and use it as the requirement to
determine if the system configuration passes or fails. Refer to section 4.6.2 for instructions on
using SCC's graphical variable builder, available on SCC's GUI, which guides the user to
create variables described in the format below. In SCAP terminology, SCC takes this end user
provided data and passes it in as an external variable, and that external variable is then used
as an OVAL state to be compared against the system configuration.
The format of the data entered by the user for these checks is in the format of
<hybrid_variables>
<hybrid_variable>
<scope></scope>
<target></target>
<authorization></authorization>
<authorized_values>
<authorized_value></authorized_value>
</authorized_values>
<notes></notes>
</hybrid_variable>
</hybrid_variables>
Where
• 'scope' can be one of COMPUTER, INSTANCE or DATABASE
• 'target' is what Computer\Instance\Database you want the value applied (see below for
definitions, and examples)
• 'authorization' is documentation explaining where in system documentation the
authorized values are located/approved by.
• authorized_value is usually a user, group, stored procedure, etc..
• 'notes' are completely optional, and are only for end users to explain why/how variables
work, and are not included in any reports or SCAP processing.
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
86
Hybrid Questions
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>TestComputer1\parents-db</target>
<authorization>Simpson Parents SSP, approved by Matt
Groening on 1/1/2024</authorization>
<authorized_values>
<authorized_value>homer</authorized_value>
<authorized_value>marge</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>TestComputer1\kids-db</target>
<authorization>Simpson Kids SSP, approved by Matt Groening
on 1/1/2024</authorization>
<authorized_values>
<authorized_value>bart</authorized_value>
<authorized_value>lisa</authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
Note: Each line will be processed in order priority, and only the first value found that is
applicable is applied to a target, so a target of 'ALL' (if needed) should only be used last
in a list.
The SCOPE portion of the user defined data is pretty straight forward, it's just one of the
following, and it tells SCC how to apply the TARGET.
• COMPUTER
• INSTANCE
• DATABASE
87
SCC User Manual for Windows
The TARGET is where things can get a bit complex, depending on your needs. It can be as
simple as ALL, where the value you are providing is applied as a requirement for all targets, but
based on end user feedback, that is not always the case, and sometimes requirements need to
be for All Instances/Database on a given computer, or all Instances, or all Databases, or a
single Instance, or a single Database.
The value(s) portion of the end user provided data is also pretty simple, it can be one of the
following
• A single string/word
• A comma separated list of strings/words
88
Hybrid Questions
Below is a sample hybrid question, and the example responses are in bold.
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
<authorization>System SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>dbo</authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
The following examples are more real world style usage, based on the same Question Text
from section 7.4.
• All SQL Instances and SQL Databases on the computer 'TestComputer1' will have
variables of 'dba1' and 'dba2'
• All SQL Instances and SQL Databases on the computer
'TestComputer2.testdomain.gov'' will have variables of 'dba3'
• All SQL Instances and SQL Databases on all computers, except TestComputer1' and
'TestComputer2.testdomain.gov' will have a variable of 'dba4'
<hybrid_variables>
<hybrid_variable>
<scope>COMPUTER</scope>
<target>TestComputer1</target>
<authorization>TestComputer1 SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>dba1</authorized_value>
<authorized_value>dba2</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>COMPUTER</scope>
89
SCC User Manual for Windows
<target>TestComputer2.testdomain.gov</target>
<authorization>TestComputer2 SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>dba3</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>COMPUTER</scope>
<target>ALL</target>
<authorization>Network SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>dba4</authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
<hybrid_variables>
<hybrid_variable>
<scope>INSTANCE</scope>
<target>TestComputer1\Instance1</target>
<authorization>TestComputer1 SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>dba4</authorized_value>
<authorized_value>dba5</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>INSTANCE</scope>
<target>TestComputer2.testdomain.gov\SQLInstance1</ta
rget>
<authorization>TestComputer2 SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
90
Hybrid Questions
<authorized_value>dba6</authorized_value>
<authorized_value>dba7</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>INSTANCE</scope>
<target>ALL</target>
<authorization></authorization>
<authorized_values>
<authorized_value></authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
<hybrid_variables>
<hybrid_variable>
<scope>INSTANCE</scope>
<target>SQLInstance2</target>
<authorization>Many System SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>abc</authorized_value>
<authorized_value>123</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>INSTANCE</scope>
<target>SQLInstance3</target>
<authorization>Many System SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>def</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>INSTANCE</scope>
91
SCC User Manual for Windows
<target>ALL</target>
<authorization>Many System SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>xyz</authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
• The database of 'master' in any instance, on any computer, would get the variable of
'abc'
• The database of 'tempdb' in any instance, on any computer, would get the variable of
'def'
• The database of 'mytestDB' in any instance, on any computer, would get the variable of
'jkl'
• All other instances and databases on any computer would get the variable 'xyz'
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>master</target>
<authorization>Default DB SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>abc</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>tempdb</target>
<authorization>>Default DB SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>def</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>mytestDB</target>
<authorization>my test DB SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>jkl</authorized_value>
92
Hybrid Questions
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
<authorization>All DB Systems SSP, approved by ISSM
on 1/1/2024</authorization>
<authorized_values>
<authorized_value>xyz</authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
• The database of 'master' in TestInstance1 on TestComputer1 ' would get the variable
of 'abc'
• The database of 'master' in TestInstance2 on TestComputer2.testdomain.gov' would
get the variable of 'def'
• All other instances and databases on any computer would get the variable 'xyz'
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>TestComputer1\TestInstance1\master</target>
<authorization>Default DB SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>abc</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>TestComputer2.testdomain.gov\TestInstance2\ma
ster</target>
<authorization>>Default DB SSP, approved by ISSM on
1/1/2024</authorization>
<authorized_values>
<authorized_value>def</authorized_value>
</authorized_values>
</hybrid_variable>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
93
SCC User Manual for Windows
7.6 What happens if I do not enter any data into Hybrid tests?
Short answer: Any test that returns any data from the target will fail.
<hybrid_variables>
<hybrid_variable>
<scope>DATABASE</scope>
<target>ALL</target>
<authorization></authorization>
<authorized_values>
<authorized_value></authorized_value>
</authorized_values>
</hybrid_variable>
</hybrid_variables>
Which passes in a empty value which will be used as a comparison against any data returned
from the system, based on the test. Depending on your system configuration, if no data is
returned, the check will pass. If any data is returned, the check will fail and you will want to
review the results, and compare against your system documentation. If the system
documentation matches what was returned by SCC, you will want to update the hybrid test with
the value in your documentation.
94
6. UNDERSTANDING SCAN RESULTS
By default, with each scan session, a summary viewer HTML report is created which provides
hyperlinks for easy browsing of the results created from that scan session. It's saved to the
root of the scan session directory.
Ex: SCC_Summary_Viewer_2017-01-06_112806.html
This report can be sorted by clicking on any column heading, or filtered by typing a hostname,
content stream etc. in the 'search' box.
Depending on the user selected options, the following reports may be available in both HTML
and/or text based formats:
REPORT DESCRIPTION
All Settings The <Computer>_SCC_5.9_All-Settings_<Content Name>.html
Report report contains the XCCDF results in a human readable format. The report is
divided into five sections: Score, System Information, Stream Information,
Results and Detailed Results.
The Scores section contains the calculated scores for the target system.
The System Information section contains information about the target system
(CPE Information), such as the host name, IP addresses, operating system,
processor, memory, manufacturer, model, serial number, BIOS version, and
Ethernet Interfaces.
The Results section contains the individual rule results, comprised of the CCE
reference and the check title. To view the "Detailed Results" for an individual
item, just click on the text.
95
SCC User Manual for Windows
Report Name>.html report contains same results in the same format as the "All
Settings Report", but only includes the Failed, Error, and Unknown checks.
Non‐Compliance Contains the same information as the "Non‐Compliance Report", except
Summary excludes the Detailed results, which allows for easier printing.
Report
All of the reports show the number of checks performed, and the result for each. The result
types are specified by the SCAP standards and are summarized below.
RESULT EXPLANATION
Pass The SCC was able to correctly interpret the check in the XML content, perform the
check on the target system, and all check requirements were met.
The HTML reports have color coding to assist in understanding what failed, and why it failed.
COLOR DESCRIPTION
Blue The overall rule passed all of the required tests. Example: "Account Lockout
Duration ‐ (CCE‐2928‐0) ‐ Pass
Red The overall rule failed one or more of the required tests. Example: "Account
Lockout Duration ‐ (CCE‐2928‐0) ‐ Fail
96
Understanding Scan Reports
6.1.4.2 Color Coding in the 'Detailed Results' Section for Class = Compliance
Per OVAL specifications, for compliance checks, a test result of "True = Compliant", and "False
= Not Compliant".
COLOR DESCRIPTION
Blue The individual test result was True, or the result was False but did not cause the
overall test to fail.
Red The individual test was False and contributed to the overall rule being marked as
Fail.
6.1.4.3 Color Coding in the 'Detailed Results' Section for Class = Patch
COLOR DESCRIPTION
Blue SCC was able to verify that the patch was installed as required in the underlying
tests. Result = Pass
Red SCC was not able to confirm that the patch was installed as required, as one or
more of the underlying tests failed. Result = Fail
6.1.4.4 Color Coding in the 'Detailed Results' Section for Class = Vulnerability
Per OVAL specifications, for Compliance checks, a test result of True = Vulnerable and False =
Not Vulnerable.
COLOR DESCRIPTION
Blue The individual test result was False (meaning not vulnerable), or the result was
Pass (vulnerable) but did not cause the overall test to fail.
Red The individual test was True (Vulnerable) and contributed to the overall rule
being marked as Fail.
97
7.2 Navigating the Results Directory
The User Data Directory, which contains both Application Logs and Scan Sessions, is
configurable, see "Editing Options" for details. By default the data is stored a subdirectory
called "SCC" in the user's home directory, but can be configured to store results to the
installation directory, or any custom directory.
ApplicationLogs
This directory contains SCC logs (screen, debug, error) related primarily to the SCC
application itself, startup, forms, etc. and not specifically related to performing SCAP
content scanning.
Sessions
Logs
This directory contains log files (screen, debug, error) specifically related
to a scan session.
Results
<SCAP/OVAL/OCIL>
<Computer>_SCC_5.9_All-Settings_<Content>.html
<Computer>_SCC_5.9_Non-Compliance_<XCCDF Content>.html
XML
XML files (see table below)
Checklists
DISA Checklist (CKL) reports from any NIWC Enhanced
SCAP Benchmark that contains Manual Questions
The XML folder contains XML output generated by SCC. This output can be XCCDF results,
OVAL results and OVAL variables files. Refer to the "Editing Options" for enabling or disabling
saving the XCCDF and OVAL XML files after each review.
These files are not designed to be human readable, but are intended to be read into another
SCAP, XCCDF or OVAL compatible software product to provide consolidated results.
Note: All filenames included in the table below are SCC's default
result filenames
98
Navigating the Results Directory
This high level summary of the review including the asset information from
each system and the pass/fail status of each check performed. This results file
is required for SCAP 1.2 compliance.
XCCDF Results The <Computer>_SCC_5.9_<DateTime>_XCCDF-Results_<XCCDF
Content Name>.xml file contains the XCCDF results in a machine readable
format.
This is a high level summary of the review including the asset information from
each system and the pass/fail status of each check performed.
OCIL Results The <Computer>_SCC_5.9_<DateTime>_ocil-res-
Results_<XCCDF Content Name>.xml file contains the detailed OCIL
in a machine readable format.
This is a detailed report pass/fail results from each OCIL patch check performed
during a review. This file only exists if SCAP content contains an OCIL
questionnaire.
OVAL CPE The <Computer>_SCC_5.9_<DateTime>_CPE-Results_<XCCDF
Results Content Name>.xml file contains the CPE results in a machine readable
format.
This contains platform information about the target system including the
operating system, network interfaces and processor type.
OVAL Patch The <Computer>_SCC_5.9_<DateTime>_OVAL-Patch-
Results Results_<XCCDF Content Name>.xml file contains the detailed OVAL
patch results in a machine readable format.
This is a detailed report of pass/fail results from each OVAL patch check
performed during a review. This file only exists if the SCAP content contained
an OVAL patch file.
OVAL Results The <Computer>_SCC_5.9_<DateTime>_OVAL-Results_<XCCDF
Content Name>.xml file contains the detailed OVAL results in a machine
readable format.
99
7.3 Viewing Screen, Error or Debug Logs
The directory containing SCC Logs (if any exist) can be opened in the Windows Explorer by
clicking:
Depending on the user selected preferences, the following log files may be present:
Application Logs are logs that are created when the application is started, and during
application execution outside of any scan (when the analyze button is pressed). Application
Logs are created in the Logs\ApplicationLogs directory (unless that directory option is disabled)
and then they are saved in the root of the Logs directory. The ApplicationLogs directory is only
created when logs exist, so may not be created depending on user preferences.
Some of the following logs might be present, depending if screen or debug logs are enabled, or
if any application errors occurred.
REPORT DESCRIPTION
Screen Log SCC_5.9_<DateTime>_Screen_Log.txt
This option saves the analysis log printed to the "Status" screen to a text file for
viewing after the review. This file is not saved by default, but can be enabled in
Options.
Error Log SCC_5.9_<DateTime>_Error_Log.txt
This report contains any errors that may have occurred while SCC is running,
but not during a specific scan. This also contains any errors that may have
occurred during command line usage.
If this file exists, and the error log does not provide enough information to
resolve the issue, please contact NIWC (see appendix G for technical support)
and provide the error log for our analysis.
Debug Log SCC_5.9_<DateTime>_Debug_Log.txt
100
Viewing Screen, Error or Debug Logs
Scan Logs are logs that are created when any SCAP/OVAL/OCIL content is used to scan a
target computer. By default the logs are created in a date/timestamp 'session' directory within
the Logs directory. Each time the Analyze button is pressed, a new scan log subdirectory is
created. This directory name matches the same date/time session directory created in the
Results directory.
REPORT DESCRIPTION
Scan Screen Log SCC_5.9_<DateTime>_Screen_Log.txt
This option saves the analysis log printed to the "Status" screen to a text file for
viewing after the review. This file is not saved by default, but can be enabled in
Options.
Scan Error Log SCC_5.9_<DateTime>_scan<number>_Error_Log.txt
This report contains any errors that may have occurred during a GUI based
scan. The scan<number>, such as scan001 or, scan002 corresponds to each
review that is started by clicking the Analyze button. Normally this file will not
exist.
If this file exists, and the error log does not provide enough information to
resolve the issue, please contact NIWC (see appendix G for technical support)
and provide the error log for our analysis.
Scan Debug Log SCC_5.9_<DateTime>_scan<number>_Debug_Log.txt
This report contains any debug that occurred during a scan. The
scan<number> such as scan001, scan002 corresponds to each review that is
started by clicking the Analyze button.
101
9. RUNNING SCC AS A SERVICE
This section of the manual is only applicable to installations of SCC on Windows. Automated
command line usage of SCC on Linux, Solaris and Mac OS X is possible, but requires end
users to script the command line interface by methods such as cron.
Installing SCC as a service, is completely optional, and only provided to allow easier automated
scanning. It is recommended to configure sending results via SSH with running SCC as a
service, to automate data collection as well. Refer to the SSH section for instructions on its
usage.
During the installation of SCC on Windows, the installer provides an option to install the SCC
Service component. If this was not selected at install, re-install the software and enable this
option.
The SCC application has a SCC Service Configuration component available, but only if the
SCC Service was installed during application install.
Start -> Programs -> SCAP Compliance Checker 5.9 -> SCAP Compliance Checker 5.9 ->
Options -> Show Options -> Service Options
This option displays the current status of the service. However this does not indicate that the
SCC application is actively scanning the computer, just that the service itself is running.
This option allows the frequency at which SCC should perform scans, based on the options
specified on this form.
Last Scan: Displays the date/time of the last scan performed by SCC as a service
Next Scan: Displays the date/time of the next scheduled scan, assuming the SCC service
is Enabled and running.
FREQUENCY DESCRIPTION
Daily SCC will scan once per day
Weekly SCC will scan once per week.
Monthly SCC will scan once per month
Enter a numeric value say N (1‐1000 etc.) for the frequency to at which SCC
Custom should scan. SCC will then scan the computer every N hours.
(Number of
Hours)
102
Running SCC as a Service
All of the remaining options available for configuration are the same as SCC's options and
include Reports, File Types, Logging, SCAP Content, OVAL Content, SSH Options. Refer to
'Using the Software via GUI' for documentation for each option.
Note: The options saved for the SCC service will inherit all
configuration settings from the SCC application, but only at the
time the Save Service Configuration is pressed.
The following process will appear in the process table, and will be running in the background:
SCC_Service32.exe
Depending on the scan frequency, periodically, the command line version of SCC will also be
present in the process table: cscc.exe
This button saves the current configuration of SCC to the SCC service, then starts or restarts
the SCC Service as needed.
This button stops and sets the startup of the SCC Service to 'Manual', effectively disabling
the service. To re-enable the service, click the Save Current Configuration to Service button..
103
8. RUNNING SCC AS A NON-ADMINISTRATOR
This section of the manual is only applicable to installations of SCC on Windows. Starting
with SCC 5.5, SCC allows for a limited operation of SCC without local Administrator rights.
SCC can be installed by an Administrator in the normal location (C:\Program Files). If it is,
then non-Administrators will not have write access to this installation directory and any files
that need to be updated/added, etc. will be located in the home directory of the non-
Administrator. See section 8.2 for more information.
SCC can be 'installed' to any directory by unzipping the zipped version of SCC. If the
directory is writable by non-Administrators, it is not recommended to have this be a shared
installation, because running the application as an Administrator will lock down a few of the
subdirectories that contain sensitive data, and errors may occur when later attempting to run
vis non-administrator. If the directory is not writable by non-Administrators, refer to Section
8.2.
If the non-Administrator who launched SCC cannot write to the installation directory, then a
directory called "SCC" and a subdirectory called "SCC_5.9".will be created in the home
directory of the non-Administrator.
Example: C:\Users\testuser\SCC\SCC_5.9
Launching SCC as a non-Administrator the first time may take a while as all of the SCAP
content is copied from the SCC installation directory to the home directory of the non-
Administrator..
SCC will launch as normal, and appear the same as when run as an Administrator, but will
have limited scanning functionality. SCC will allow:
o SSH based Unix scanning
o SSH based Cisco IOS XE scanning
o Offline Configuration Scanning of Cisco IOS XE
o Post scan report generation
SCC will not allow any scanning of Windows (local or remote) because much of the data
commonly queried in the Windows OS content is not available to standard users and the
results would be inaccurate.
104
Running SCC as a non-Admin
The command line interface of SCC will allow for the same limited scanning modes as the
GUI, and the --help command will only show the command line parameters that are
applicable when running as a non-administrator.
8.5 Uninstalling
If SCC was installed to C:\Program Files, then an Administrator will need to remove the
software. For zip installations, just delete the directory that was extracted from the zip.
Additionally, if a non-Administrator cannot write to the installation directory, then the home
directory of the non-Administrator may need to be manually cleaned up by deleting the
SCC\SCC_5.9 directory.
Example: C:\Users\testuser\SCC\SCC_5.9
105
APPENDIX A - FREQUENTLY ASKED QUESTIONS
A.1 Why can't I install a DISA STIG Manual XCCDF into SCC?
I tried to import a "Manual" STIG as a *.zip into the SCC and it gives me the following
error:
I then tried to import a manual STIG as a *-xccdf.xml into the SCC and gives me the
following error:
Answer:
DISA STIG "Manual"'s are not SCAP content. They contain an XCCDF XML file, with a
xslt transform, meant to be viewed with Internet Explorer in order to perform a manual
assessment of the system. They do not contain any OVAL xml, which is required for
automation.
A.2 How can I scan CENTOS Linux, Rocky Linux, Alma Linux, Debian
Linux etc. with an existing SCAP benchmark?
SCAP content is designed to be applicable to a specific OS or application version, but SCC has
a feature to ignore this.
GUI:
Options -> Show Options -> Scanning Options -> SCAP Options -> Run
all content regardless of applicability
CSCC
SCAP content from DISA does not contain any manual questions. The SCC team is
maintaining a repository of "Enhanced" content, which contains all of the automated rules
from the DISA content, along with manual questions from the DISA STIG Manual. In order to
include manual questions in SCAP content, only install content from NIWC's repository
located at:
106
FAQs
https://www.niwcatlantic.navy.mil/scap/scap-content-repository/
Our "Enhanced" repository should be updated shortly after DISA posts new/updated
benchmarks to their repository at cyber.mil.
Yes. The SSH based scanning allows for UNIX (linux/solaris/mac) scans to be performed from
Windows. Refer to section 4.3.
Yes.
SCC version 4.1.1 was officially SCAP validated on August 26, 2016 against the SCAP 1.2
standards.
SCC version 5.6 was officially SCAP validated on November 4, 2022, against the SCAP 1.3
standards.
SCC currently supports SCAP versions 1.0, 1.1, 1.2 and 1.3.
https://csrc.nist.gov/Projects/scap-validation-program/validated-products-and-modules/147-scc-
scap-1-3-product-validation-record
https://csrc.nist.gov/projects/scap-validation-program/validated-products-and-modules/140-
spawar-scap-1-2-product-validation-record
For content which lists the Publisher as DISA, please contact DISA:: disa.stig_spt@mail.mil
For content which lists the Publisher as NIWC LANT, please contact our team:
scc.fct@navy.mil
A.7 Why does NIWC's 'Enhanced' content have a different version from
DISA SCAP content?
In order to allow end users to be able to install both DISA content and NIWC Enhanced content
at the same time, the benchmark version of our enhanced content needs to be different from
DISA SCAP content. The Enhanced content will be based on the DISA STIG SCAP content
version, but with an additional set of numbers for our Enhanced content release.
<DISA STIG SCAP Benchmark Version> + "." <NIWC Enhanced Content Version>, and the
enhanced content is dropping the leading 00's for brevity.
Example:
DISA SCAP:
U_Adobe_Acrobat_Reader_DC_Continuous_V2R2_STIG_SCAP_1-2_Benchmark.xml
internally it's version 002.002
107
SCC User Manual for Windows
If there were updates to the STIG Manual, but no updates to the DISA SCAP Benchmark after
2.2.1 was released, we would regenerate the content with updated manual questions and then
the Enhanced content would be version 2.2.2.
No. This software only analyzes the system, it does not modify any setting.
A.9 Where can I learn more about creating my own SCAP content?
http://ovalproject.github.io/ - OVAL
A.10 Why is SCC default SCAP content and application updates URL's
hosted on a .com?
The default content repository URL included with SCC is an XML file maintained on github by
DISA. The URL is part of DISA’s https://disa-stigs.github.io/ page, and updates are posted by
an authorized DISA employee. It was decided to use DISA’s github portal for the XML feed for
two reasons.
1. To prevent any denial of service issues with their cyber.mil page, as we have
thousands of end users, running SCC on millions of computers, and github has much
more bandwidth, capability and reliability than cyber.mil.
2. Speed of updates. Any updated files posted to cyber.mil have to go through a lengthy
approval process, and would delay content update availability by days or weeks.
3. Cyber.mil may be replaced with another website at some point, while github likely will
remain a constant, and the XML file on github can then be updated to point to any
cyber.mil replacement website.
Additionally, the XML file is just a pointer to cyber.mil, so if SCAP content or application
updates are needed, they are downloaded directly from cyber.mil, but we assumed this would
be much less frequent than end users checking for updates.
<content-id>U_Adobe_Acrobat_Reader_DC_Continuous_V2R2_STIG_SCAP_1-
2_Benchmark-enhanced.zip</content-id>
<location>https://www.niwcatlantic.navy.mil/wp-
content/uploads/2022/12/U_Adobe_Acrobat_Reader_DC_Continuous_V2R2_ST
IG_SCAP_1-2_Benchmark-enhanced.zip</location>
<checksum
style="SHA512">6a8f8593d41c16807d483f272de24b5c7940348ce7ebf677928f4
dadf887ac5247be8b996bdba74cf4a4b0ab32435e09b0e1aaa0d87820998ae5f15cf
8a41276</checksum>
108
FAQs
<benchmarks>
<benchmark>
<benchmark-
id>xccdf_mil.disa.stig_benchmark_Adobe_Acrobat_Reader_DC_Continuous_
Track_STIG</benchmark-id>
<title>Adobe Acrobat Reader DC Continuous
Track STIG SCAP Benchmark - NIWC Enhanced with Manual
Questions</title>
<version>002.002</version>
<style>SCAP_1.2</style>
<status>accepted</status>
<status-date>2021-06-22</status-date>
<creator>DISA</creator>
<publisher>DISA</publisher>
<contributor>DISA</contributor>
<source>STIG.DOD.MIL</source>
</benchmark>
</benchmarks>
As you can see, the actual content will be downloaded directly from cyber.mil, with SHA512
checksum being performed to ensure it’s what is expected. SCC's application update XML
feed works in the same manner.
A.11 Can I create my own offline SCAP content repository for my isolated
network?
Yes, although you will need to have your own web server that you can write files to that doesn't
require authentication.
1. Copy the following file from DISA's github repository to your computer:
https://raw.githubusercontent.com/DISA-STIGS/DISA-STIGS.github.io/master/niwc-
content-repository.xml
2. Copy all of the SCAP Benchmark zip files from NIWC's content repository website:
https://www.niwcatlantic.navy.mil/scap/scap-content-repository/
3. Copy all of the SCAP Benchmarks to your own web server
4. Edit the content repository XML file URLs to match the URL's to your zip files
(ex: update
<location>https://www.niwcatlantic.navy.mil/wp-
content/uploads/2022/12/U_Adobe_Acrobat_Reader_DC_Continuous_V2
R2_STIG_SCAP_1-2_Benchmark-enhanced.zip</location>
to be
<location>https://your-
webserver/yourDirectory/U_Adobe_Acrobat_Reader_DC_Continuous_V2
R2_STIG_SCAP_1-2_Benchmark-enhanced.zip</location>
5. Copy the updated content repository to your server (ex: https://your-
webserver/content-repository.xml)
6. Update SCC to use your webserver
a. via GUI:
SCC -> Options -> Update Options -> Right click on the existing URL, and click
edit, then edit and save to https://your-webserver/content-repository.xml
a. via CSCC Config
109
SCC User Manual for Windows
Options 2: To make an offline copy of DISA's content repository, that SCC can use for
updating:
1. Copy the following file from DISA's github repository to your computer:
https://raw.githubusercontent.com/DISA-STIGS/DISA-STIGS.github.io/master/content-
repository.xml
2. Copy all of the SCAP Benchmark zip files from DISA's Cyber.mil website:
https://cyber.mil/stigs/scap/
3. Copy all of the SCAP Benchmarks to your own web server
4. Edit the content repository XML file URLs to match the URL's to your zip files
(ex: update
<location>https://dl.dod.cyber.mil/wp-
content/uploads/stigs/zip/U_Adobe_Acrobat_Reader_DC_Classic_V2R
1_STIG_SCAP_1-2_Benchmark.zip</location>
to be
<location>https://your-
webserver/yourDirectory/U_Adobe_Acrobat_Reader_DC_Classic_V2R1_
STIG_SCAP_1-2_Benchmark.zip</location>
5. Copy the updated content repository to your server (ex: https://your-
webserver/content-repository.xml)
6. Update SCC to use your webserver
a. via GUI:
SCC -> Options -> Update Options -> Right click on the existing URL, and click
edit, then edit and save to https://your-webserver/content-repository.xml
a. via CSCC Config
cscc --config -> 6. Configure Options -> 7. Update
Options -> Delete Repository URL, then Add new Repository
URL
a. scripted via CLUI:
cscc --setOption contentRepository https://your-
webserver/content-repository.xml
To create your own custom content repository xml file, not based on the existing DISA
repository, we suggest using the DISA STIG content repository xml feed as a template. The
following checksum 'styles' are supported, SHA3_256 is recommended, but not easily available
via windows/linux command line.
• SHA3_256
• SHA256
• SHA512
• SHA1
• MD5
110
FAQs
Yes
On Windows, SCC offers limited functionality for non-Administator users, including SSH based
UNIX and Cisco scanning and alternate credentials Windows WMI remote scanning. Refer to
section 8 for more information.
1. Click Start -> Programs -> SCAP Compliance Checker 5.9 -> then Right click on SCAP
Compliance Checker.
2. Click on “RunAs”.
3. Type the "Domain\Username" and "Password", and then Click "OK".
1. Open the command prompt as another user and then run the application from the installation
directory from the command prompt.
111
SCC User Manual for Windows
OS Requirements:
• The Secondary Logon Service must be running.
Known Issue:
• The feature in the SCC software which opens the results directory (Results -> Open
Results Directory) will not function as expected when running via RunAs. The
Windows Explorer cannot be called while running from RunAs, this is a limitation of
Microsoft Windows.
A.15 What type of network traffic does a remote Windows SCC scan
generate?
SCC performs a variety of system calls as it attempts to perform compliance checks from the
SCAP XML content. If the target computer is a remote computer, the SCC will generate
network traffic to perform the checks. The volume and variety of network traffic will be
dependent on the XML content, however, below is a list of various types of network traffic you
can expect to see as a result of running SCC with the default USGCB SCAP content included
in the SCC installer.
Protocols:
Ports
A.16 Where can I download the DOD Root Certificates for Windows
(InstallRoot)?
DISA provides the DOD Root Certificates for Windows via an installation package called
InstallRoot. As of the release date of SCC 5.9, the URL is:
https://public.cyber.mil/installroot_5-6/
112
FAQs
A.17 Why does SCC review all cached profiles to confirm that User profile
settings are accurate
User based GPO's are applied on a per-user basis, meaning that each user can have
different configurations, so the only way to know if the system is compliant is to check all
users. Some tools just check the currently logged in user, which may only provide a false
sense of security.
SCC uses the OVAL tested/vetted and approved 'ntuser' test to complete this task. SCC
reviews the currently logged in user, and then finds any cached profile for all 'human' users
and checks their ntuser.dat files. SCAP content can determine which users are in scope
such as local, domain, enabled, disabled, and number of days since last login.
Making domain users compliant is generally very straight forward, and likely already
implemented in your environment. Local users do not obtain security settings from any
domain based GPO, and can be more challenging to configure. Usually the easiest answer
is to disable all local users. If you need local users, please see FAQ 18, and how to make
them compliant.
A.18 How do I make local users compliant with user level GPOs?
The Windows OVAL test called 'ntuser' is designed to review cached user profile ntuser.dat
files to validate that they are compliant with policies. This test will be used for the NIWC
developed Microsoft Office 365 SCAP content, and likely others. For Local users, applying
User based GPO's can be less intuitive than Domain Users.
The LGPO tool included in the Microsoft Security Compliance Toolkit 1.0 can be used to
apply GPOs (user and machine) to systems which are not domain-joined. There are likely
other ways to accomplish this task, proceed at your own discretion.
113
APPENDIX B - KNOWN ISSUES
B.1 Potential out of memory crashes with very large OVAL XML content
files
It is not recommended to install OVAL source content larger than 30 MB in size. When loading
OVAL XML content, it's common for SCC to use 20-30 times the XML file size in RAM. This
means that a 20 MB source OVAL XML file could use 400-600 MB of RAM to load and use.
When memory usage goes above 1-2 GB, SCC stability issues may occur.
Source OVAL XML files larger than 10 MB are not include in any SCAP content currently
available, but it is possible to download raw OVAL files, such as the entire CIS OVAL repository
that could cause stability issues with SCC.
B.2 Unable to scan RHEL8 systems via SSH with OS application white
listing enabled (SCC failed to launch)
Starting with SCC 5.5, we have added a new option, disabled by default, which can allow SCC
to automatically whitelist itself and allow it to run remotely via SSH. See the SSH Remote
Scanning Option to enable it, and for more information on how the temporary configuration
change works.
B.3 Host Key Check Failed when scanning RHEL7/8 and Ubuntu systems
via SSH when changing between SCC 5.4 and 5.4.2 or later
SCC's internal libssh2 module was updated for SCC 5.4.1, and this adds support for more
modern/secure ssh host key exchanges. This causes the host key saved in SCC 5.4 to be
different from SCC 5.4.2 on most modern Linux systems. There is an auto-negotiate that
occurs, and the highest security method by both server and client is used. So for RHEL6 and
Solaris 10, the keys will not change, but for anything more modern host keys will change.
To resolve this issue, using the Host Credential Manager, do a test connection on all hosts using
5.4.2 or later and accept the new host keys.
B.4 Account lockout issues when scanning Ubuntu remotely via SSH with
correct credentials
With the update to cscc.exe to automatically elevate to a privileged user, if you run cscc.exe as
a standard user, and pass in command line arguments that are invalid, Windows Vista/7 etc. will
spawn a new command prompt as administrator, in which cscc.exe runs. When the application
closes, Windows closes this command prompt, and the end user will not be able to see the
usage statement.
Example:
Running as a non-administrator:
cscc.exe -z
114
Known Issues
Windows will prompt the user with a User Account Control prompt, then open a new command
prompt. Since the -z is not a valid parameter, cscc.exe will print the usage statement to the
screen, however Windows will close the elevated command prompt before you are able to read
it.
Workaround:
SCC creates an organizational tree structure of the results from each scan, in order to allow the
data to be easier to find by the end user. However, as the directory and file paths contain the
SCAP Stream Name, this path can be very long, such as the following example:
The path above is 240 characters, which is allowable by the Windows OS, however if a user
tries to copy the results to a network share, with a longer starting path, such as
The new path is 290 characters long, which exceeds the limit of 260 set by Windows
http://msdn.microsoft.com/en-
us/library/windows/desktop/aa365247%28v=vs.85%29.aspx#maxpath
Domain controllers with large numbers of users and computers (several thousand), may not be
able to be reviewed using the current DISA STIG SCAP content. There are several checks that
require .* operations, which take a long time to process and can generate GB's of results, and
likely will cause SCC to crash before completion.
As a partial workaround, we have added an OVAL processing option to prevent Access Token
(User Rights) from causing SCC to crash.
115
SCC User Manual for Windows
Other checks may still exist in the content that perform .* operations for User accounts and
SID's, and the only workaround would be to manually disable these rules in the XCCDF XML
file.
SCC's remote WMI scanning requires the ability to create an execute a batch file. Without it,
the scan will fail. See the Requirements section for more details.
B.9 Issues with remote scanning (Classic and WMI) if scanning PC is not
fully patched
At some point during 2022, Microsoft released a security patch that appears to have broken
some remote API calls from outdated versions of Windows to patched computers. If you
experience issues, and are also unable to connect to the target computer via Remote Desktop
Protocol, the patch level of your scanning computer may be out of date. Updating the scanning
computer to current appears to resolve this issue.
116
APPENDIX C - TROUBLESHOOTING
This setting is disabled by default on SUSE Enterprise Linux 12, and could be configured to
"PasswordAuthentication no" on any system. Some systems may have it commented out "#
PasswordAuthentication yes". We recommend having it explicitly set, as each OS could have
different default value.
SCC will not be able to SSH to the system, and the error returned from the system will
appear the same as a bad username/password. To make debugging more challenging,
manually SSH'ing outside of SCC will likely work as expected. This setting appears to make
the connection mandate an interactive session, breaking any automation.
C.1.1.2 For Private Key Authentication: Verify private key is using RSA
Putty generated keys are not support. The file should look like the following:
or
C.1.1.3 For direct root login: Verify sshd_config is configured with 'PermitRootLogin
yes'
This method is not allowed in DISA STIG's so it's not a recommended method for SCC.
'sudo' is not installed by default, and will need to be installed if sudo scanning methods are
enabled.
117
SCC User Manual for Windows
SCC uses /tmp for pushing files to before moving them to their final directory (usually
/opt/scc-remote), but /opt can be changed by the end user to any directory. SCC will create
the 'scc-remote' subdirectory on each scan, and remove it when it's complete.
C.1.4 Known issues with remote RHEL targets and Application Whitelisting with
fapolicy
Starting with SCC 5.5, we have added a new option, disabled by default, which can allow
SCC to automatically whitelist itself and allow it to run remotely via SSH. See the SSH
Remote Scanning Option to enable it, and for more information on how the temporary
configuration change works.
C.1.5 Known issues with remote Ubuntu targets and pam_tally2 and account
lockout (when using the correct password)
The STIG for Ubuntu 18 has the user add pam_tally2 to the /etc/pam.d/common-auth file,
with the lockout being 3 wrong passwords. This affects SCC because of an oversight in the
pam_tally2 functionality, where, upon a successful SSH login, an unsuccessful login attempt
will be tallied. Remote scanning appears as several SSH scans at once, causing the user to
be locked out immediately and preventing the scan. According to the man page for
pam_tally2, the login attempt counter is incremented, then the password is checked, and
afterwards pam_setcred should be called to reset the counter if successful. On a default
install of Ubuntu 18, this pam_setcred is not installed, nor is it called in the
etc/pam.d/common-auth file, meaning the attempt counter never gets reset. A fix for this
issue is adding the line account required pam_tally2.so to the
/etc/pam.d/common-account file before any other account statements.
The user is also advised to reset the tally counter on their account used to scan.
pam_tally2 --user USERNAME --reset where USERNAME is the account name.
If the scanning computer is not at least as patched as the target computer, it is quite likely that
any WMI based query may fail with an "Access is Denied" error. There appears to be a patch
released in 2022 that breaks WMI (and RDP) unless both the scanning and target computers
are at the same patch level. The easy solution is to ensure that the scanning computer (the
one you are logged into) is fully patched.
C.2.3 Ensure a Client Firewall is not Blocking RPC, Registry, Shares or WMI
118
Troubleshooting
If a client firewall is blocking LAN/WAN access to the Remote Procedure Calls (RPC), Remote
Registry, File Shares or WMI, remote reviews with SCC will not possible. Enabling these port
exceptions will vary for each firewall product. Please refer to your firewall software
documentation regarding opening specific ports.
This issue should only occur for a user wanting to review a computer that is not part of a
domain for which that person is a domain administrator. In order to attain local administrative
rights on a single remote computer, the user may need to map an administrative share or
connect to the remote registry of that system.
C.2.5 Verify "Manage auditing and security log" User Right contains the
Administrators group
On Windows Vista and later, SCC uses the auditpol.exe application to obtain the system's audit
configuration. In order to run this command, the user running the software must have the User
Right, "Manage auditing and security log". By system default, the Administrators group is a
member of this right. However, if the security setting is modified and the Administrators group
is removed, errors will be reported, any check related to the Windows 'Audit Policy' will error
out.
C.2.6 Verify "Access this computer from the network" User Right for target
computer.
If the account you are logged into does not have access to the target computer over the
network, remote scans will not be possible. In order to scan remotely, the Administrators or
Domain Admins group(s) may need to have this user right. If you do not have this user right,
you may receive 'access is denied' type errors.
C.2.7 Verify "Deny access to this computer from the network" User Right for
target computer.
If the account you are logged into is a member of a group being denied access to the target
computer over the network, then remote scans will not be possible. If the Administrators or
Domain Admins group(s) are being denied access, this could be a reason for errors, especially
'access is denied' type errors.
For Classic scans, it is necessary to add to the target system a local admin account with the
same credentials as being used to log into the SCC host.
For WMI scans, SCC's WMI Alternate Credentials feature can be used, or follow the same
method as Classic with matching credentials on both systems.
C.2.8.2 If the target is not in Active Directory, verify UAC remote restriction are
disabled for WMI based scans
To disable UAC remote restrictions, on the target computer, follow these steps:
119
SCC User Manual for Windows
1. Click Start, click Run, type regedit, and then press ENTER.
2. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Pol
icies\System
3. If the LocalAccountTokenFilterPolicy registry entry doesn't
exist, follow these steps:
4. On the Edit menu, point to New, and then select DWORD Value.
Type LocalAccountTokenFilterPolicy, and then press ENTER.
Right-click LocalAccountTokenFilterPolicy, and then select
Modify.
5. In the Value data box, type 1, and then select OK.
6. Exit Registry Editor.
https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/user-
account-control-and-remote-restriction
C.2.8.3 If the target is not in Active Directory, verify Limited User Account
(LUA) settings for classic scans
When performing a non-domain Classic mode remote scan, it is necessary to disable Limited
User Account (LUA) via the Registry at
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System by changing the
EnableLUA value from “1” to “0”.
After the change is made, it is necessary for the computer to be rebooted for the new setting
to take effect.
Note: This configuration is not compliant with the DISA STIG's so proceed only if you have
to use SCC's 'classic' Windows remote scanning mode.
C.2.8.4 Verify "Deny access to this computer from the network" User Right for
target computer.
For non-domain scans, make sure that the local administrator account that you plan to scan
with is not listed.
If SCC is unable to perform a remote review of a system, please perform the following tests
before reporting any issues.
120
Troubleshooting
If the steps in C.6.1 do not allow you connect, but also do not prompt you for alternative
connections, it's possible that the system has been configured to disable administrative
shares.
C:\>net share
Share name Resource Remark
----------------------------------------------------------
C$ C:\ Default share
IPC$ Remote IPC
ADMIN$ C:\Windows Remote Admin
The command completed successfully.
If either the C$ or ADMIN$ shares do not appear, refer to the following MSDN article
regarding the registry values in
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\A
utoShareServer and
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\A
utoShareServer\AutoShareWks
For Classic remote scanning, verify that the Remote Registry is available, To Remotely
Connect to Computer’s Registry:
1. Click on Start – Run. The Run window will open.
2. Type in Regedit and click OK. The Registry Editor will open.
3. Select File – Connect Network Registry…
4. Type in the NetBIOS computer name in the window provided. Select OK.
5. If prompted to enter Username and Password, do so using an account with administrative
rights on that system.
121
SCC User Manual for Windows
WMI scanning requires WMI to operate at all, and even with classic mode WMI queries can
be required to perform certain checks. To verify that WMI functional perform either of the
following methods, where <Computername or IP is replaced with the computer you wish to
test.
Powershell Method
1. Open an Admin Power Shell Prompt
2. Type Get-WmiObject Win32_ComputerSystem –ComputerName <Computername or IP>
3. If WMI is available remotely you should see the following:
Domain : <your domain>
Manufacturer : <Your manufacturer>
Model : <your model>
Name : <Computername>
PrimaryOwnerName : <some user>
TotalPhysicalMemory : <some number
If you see the following, WMI is not going to work remotely, and it could be caused by several
conditions. Refer to the next section, Testing RPC Issues.
122
Troubleshooting
Several common issues can cause the RPC server unavailable error:
• The RPC service is stopped on the remote computer;
• The RPC Endpoint Mapper port TCP/135 is not accessible on the remote computer;
• The Dynamic RPC range is blocked by firewalls installed between your computer and
the remote computer.
1. Make sure RPC Endpoint Mapper port 135 in listening on a remote computer.
• Login to the remote/target computer
• Use the following command: "netstat -ano | find "135"
• The following should be returned:
SERVICE_NAME: rpcss
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE,
NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
• If any errors are reported with the RPC Service , verify that the dependencies for
RPC Service are running (DCOM Server Process Launcher and RPC Endpoint
Mapper)
• On the remote/target computer, run the following 2 command
• sc query DcomLaunch
• sc query RpcEptMapper
• Both should return back
STATE : 4 RUNNING
3. If the RPC Service is running, verify if remote connections report any errors
• From your local scanning computer (not the remote/target computer)
123
SCC User Manual for Windows
The command may take some time to return data, but should eventually return
back
ComputerName : <Computername>
RemoteAddress : <Target IP>
RemotePort : 135
InterfaceAlias : Ethernet
SourceAddress : <Your local IP>
TcpTestSucceeded : True
4. Verify 'Restrictions for Unauthenticated RPC Clients Setting' is not set to 'Enabled:
Authenticated Without Exception'
Review the following setting: Policies\Administrative Templates\System\Remote
Procedure Call "Restrictions for Unauthenticated RPC Clients". This can be set
to either "Not Configured" (default) or "Enabled: Authenticated". If it is set to the
highest setting "Enabled: Authenticated Without Exception" we have seen
instances where this will no longer allow review of a system via WMI.
To test run the following command, which should return back all of the audit configuration of
the local computer:
If this returns any error messages, SCC will not be able to check the audit configuration of the
computer. In order to allow SCC or most applications to view the audit configuration, the
Administrators group will need to be added back to the "Manage auditing and security log"
User Right.
If all of the above tests were successful, please re-scan the target computer with SCC.
124
APPENDIX D – SCC AND SCAP
125
D.3 SCAP Implementation
SCAP (Security Content Automation Protocol) is a suite of standards used to determine the
presence of vulnerabilities, patches and configuration issues on a target system. SCAP content
consists of machine readable XML files that contain configuration data, checklist data and logic
used to scan a system. The standards include CVE (Common Vulnerabilities and Exposures),
CCE (Common Configuration Enumeration), CPE (Common Platform Enumeration), XCCDF
(eXtensible Configuration Checklist Description Format), OVAL (Open Vulnerability and
Assessment Language) and CVSS (Common Vulnerability Scoring System).
SCAP Compliance Checker processes SCAP content on a target system and produces HTML
and text reports, XCCDF results and OVAL results. The HTML and text reports provide
benchmark scores and information that a system administrator can use to make the target
system more secure. The XCCDF results and OVAL results can be used by other tools in a
variety of ways since they are generated using the industry standard XCCDF and OVAL results
formats.
SCAP Compliance Checker reads in a SCAP stream which includes XML files written in the
XCCDF, OVAL and CPE Dictionary schemas. SCAP Configuration Checker then generates
XML results files using the XCCDF and OVAL results schemas. The HTML reports are
generated by transforming the generated XCCDF and OVAL XML results files into human
readable output. This output contains detailed scoring and results information, as well as CVE,
CCE and CPE identifiers.
SCAP Compliance Checker is capable of validating SCAP streams against the industry
standard XCCDF and OVAL schemas. All output generated by SCAP Configuration Checker
can also be validated.
SCAP Compliance Checker 5.9 implements SCAP version 1.0, 1.1, 1.2 and 1.3.
SCC follows the Use Case Requirements in NIST 800-126 which document the following:
Where "xxxx" indicates the SCAP stream name, which must be consistent across all files in the
SCAP Stream.
The SCC order of operations with a SCAP stream is as follows, and the USGCB 2.0.0.0
Windows XP Stream is used as an example. SCAP Stream Name = "USGCB-Windows-XP"
126
A3 SCAP Implementation
1. SCC verifies if the XCCDF Benchmark, OVAL Compliance, CPE Dictionary and the CPE
Inventory exist for the specified SCAP stream.
USGCB-Windows-XP-xccdf.xml
USGCB-Windows-XP-oval.xml
USGCB-Windows-XP-cpe-dictionary.xml
USGCB-Windows-XP-cpe-oval.xml
2. If all required files are present, SCC then loads the XCCDF file to gather platform
information.
USGCB-Windows-XP-xccdf.xml
3. Based on the Profile that was selected in the options form, the SCC then finds the matching
profile, and then checks to ensure the profile is not an abstract profile. (<Profile> element
doesn't have an "abstract" attribute or the attribute is set to "false".)
united_states_government_configuration_baseline_version_2.0.0.0
4. Next the CPE Dictionary is processed. The platform element from the XCCDF is used to
determine what CPE items the target system is part of.
USGCB-Windows-XP-cpe-oval.xml
USGCB-Windows-XP-cpe-dictionary.xml
5. If the content is applicable to the target computer based on the CPE OVAL tests, the
XCCDF content is then traversed and loads the OVAL file and/or the OVAL patches files (from
filename) and definitions are processed. The definitions that get processed come from the
XCCDF rules found during the XCCDF traversal.
USGCB-Windows-XP-oval.xml
USGCB-Windows-XP-patches.xml
6. XML results are created, based on user settings in the options form of the GUI or the --
config from the command line.
<Computer>_SCC_5.9_<Date-Time>_OVAL-CPE-Results_USGCB-Windows-XP.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Patch-Results_USGCB-Windows-XP.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Results_USGCB-Windows-XP.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Variables_USGCB-Windows-XP.xml
<Computer>_SCC_5.9_<Date-Time>_XCCDF-Results_USGCB-Windows-XP.xml
7. HTML and/or text based reports are generated based on end user options
127
SCC User Manual for Windows
Upon installation of a SCAP 1.2 stream, if the file contains multiple data-streams within the
data-stream-collection SCC will create a new record in the SCAP Content options for each
data-stream. The user is then able to select/de-select content based on the data-stream
allowing the user to run one or more data-streams from the same data-stream-collection during
any given analysis run.
The SCC order of operations with a SCAP 1.2 stream is as follows, and the USGCB 1.2.7.1
Internet Explorer 8 Stream is used as an example. SCAP 1.2 Stream Name =
"scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip".
1. SCC verifies if the XCCDF Benchmark, OVAL Compliance, OCIL Questionnaire, CPE
Dictionary and the CPE Inventory components exist for the specified SCAP stream.
scap_gov.nist_comp_USGCB-ie8-xccdf.xml
scap_gov.nist_comp_USGCB-ie8-OCIL.xml
scap_gov.nist_comp_USGCB-ie8-oval.xml
scap_gov.nist_comp_USGCB-ie8-cpe-oval.xml
scap_gov.nist_comp_USGCB-ie8-cpe-dictionary.xml
2. If all required files are present, SCC then loads the XCCDF component to gather platform
information.
scap_gov.nist_comp_USGCB-ie8-xccdf.xml
3. Based on the Profile that was selected in the options form, the SCC then finds the matching
profile, and then checks to ensure the profile is not an abstract profile. (<Profile> element
doesn't have an "abstract" attribute or the attribute is set to "false".)
xccdf_gov.nist_profile_united_states_government_configuration_baseline
_version_1.2.3.1
4. If SCC detects an OCIL Component, the user is prompted to fill out the questionnaire or skip
the questions and continue analysis.
scap_gov.nist_comp_USGCB-ie8-OCIL.xml
5. Next the CPE Dictionary component is processed. The platform element from the XCCDF is
used to determine what CPE items the target system is part of.
scap_gov.nist_comp_USGCB-ie8-cpe-oval.xml
scap_gov.nist_comp_USGCB-ie8-cpe-dictionary.xml
128
A3 SCAP Implementation
6. If the content is applicable to the target computer based on the CPE OVAL tests, the
XCCDF content is then traversed and loads the OVAL file and/or the OVAL patches files (from
filename) and definitions are processed. The definitions that get processed come from the
XCCDF rules found during the XCCDF traversal.
scap_gov.nist_comp_USGCB-ie8-oval.xml
scap_gov.nist_comp_USGCB-ie8-patches.xml
7. XML results are created, based on user settings in the options form of the GUI or the --
config from the command line. SCAP 1.2 specifies the use of the NIST Asset Reporting Format
(ARF) 1.1 for results generation. SCC generates an ARF results file, but we also chose to
include the old reports for our current user population.
<Computer>_SCC_5.9_<Date-Time>_ARF_ scap_gov.nist_datastream_USGCB-
ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_OCIL-Results_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-CPE-Results_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Patch-Results_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Results_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_OVAL-Variables_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
<Computer>_SCC_5.9_<Date-Time>_XCCDF-Results_
scap_gov.nist_datastream_USGCB-ie8-1.2.3.1.zip.xml
8. HTML and/or text based reports are generated based on end user options.
The CVE (Common Vulnerabilities and Exposures) standard links unique identifiers with known
security vulnerabilities and/or exposures. CVE identifiers are typically found in the OVAL patch
definition content of a SCAP data stream. An OVAL patch definition may contain a reference
element that associates the definition with a CVE identifier. Links to various websites containing
more information about the vulnerability and/or exposure may also be provided in the reference
element.
When the SCAP Compliance Checker processes a SCAP data stream against a target system,
any CVE identifiers associated with entities in the stream will be found and provided in the
results HTML and text files. It is important to distinguish that SCC does not contain any static
CVE database and only imports CVE information from the content stream.
In the SCAP Compliance Checker results HTML files, CVE identifiers can typically be found in
the OVAL results HTML file for the patch content. Detailed information on each definition
processed can be found in the Definitions section of the HTML file. For each definition, there is
a "CVE" row that displays any CVE identifiers that are associated with the definition.
129
SCC User Manual for Windows
It is important to note that when SCC finds a CVE identifier, it automatically creates a link in the
CVE row to the NVD (National Vulnerability Database) webpage for that particular CVE
identifier. This allows the user to determine the impact that a particular CVE has based on
CVSS impact metrics. This also allows the user to prioritize different vulnerabilities found by
comparing vulnerability scores with each other.
The CCE (Common Configuration Enumeration) standard links unique identifiers with known
system configuration issues.
When the SCAP Compliance Checker processes a SCAP data stream against a target system,
any CCE identifiers associated with Rules and/or definitions in the stream will be found and
provided in the results HTML files. If no CCE identifiers are found within the SCAP data
stream, SCC will not provide CCE information in the result files.
CCE identifiers are typically found in the OVAL definition content and the XCCDF content of a
SCAP data stream. An OVAL definition may contain a reference element that associates the
definition with a CCE identifier. A link to the CCE website containing more information about the
system configuration issue is also provided in the reference element. An XCCDF Rule may
contain an ident element that associates the Rule with a CCE identifier.
In the SCAP Compliance Checker results HTML files, CCE identifiers can typically be found in
the HTML reports. For OVAL results HTML files, detailed information on each definition
processed can be found in the Definitions section of the HTML file. For each definition, there is
an "Identities" row that displays any CCE identifiers that are associated with the definition, in
addition to the CCE identifier.
It is important to note that CCE identifiers in the Detailed Results section of the reports,
provides a link to the CCE website to allow the user to gather additional information (e.g. attack
vectory, dates, etc.) regarding the configuration issue.
SCAP Compliance Checker 5.9 implements CCE version 5.0, however the Detailed Results
section of the reports displays the CCE version 4.0 as well.
The CPE (Common Platform Enumeration) standard is a structured naming scheme for
hardware, operating systems and applications. It allows different tools to specify names for IT
platforms in a consistent way. The XCCDF file included in a typical SCAP data stream contains
one or more platform elements. The platform element contains a CPE identifier that associates
an XCCDF Benchmark, Rule or Group with a target platform. If the target system is not an
instance of the CPE identifier specified in a platform element, then the XCCDF Benchmark,
Rule, or Group associated with that platform element is not applicable to the target system and
will not be processed.
In order to determine if the target system is an instance of a CPE identifier, SCAP Compliance
Checker processes the CPE dictionary and the CPE OVAL content in the SCAP data stream.
The CPE dictionary contains one or more CPE identifiers, each associated with an OVAL
definition that resides in the CPE OVAL content. If SCAP Compliance Checker processes the
OVAL definition and the definition returns a result of "true", then the target system is said to be
130
A3 SCAP Implementation
an instance of the associated CPE identifier. A list of CPE identifiers that the target system is
an instance of is compiled in this fashion from the CPE dictionary, then used when processing
the XCCDF file. If the CPE identifier specified by a platform element in the XCCDF file is not in
the compiled CPE instance list, then the Benchmark, Rule or Group associated with that CPE
identifier is not applicable to the target system and will not be processed. Rules that are not
applicable to the target system will have a result of "not applicable".
The CVSS (Common Vulnerability Scoring System) standard is a system used to assign
scores to vulnerabilities. By assigning a score to a vulnerability, one can determine its relative
severity when compared to other vulnerabilities.
In the SCAP Compliance Checker the CVE identifiers can typically be found in the security
patches section of the HTML reports. For each security patch check, there is a "References"
row that displays any CVE identifiers that are associated with the definition. Each CVE identifier
will have a link to the NVD database webpage for that CVE. Each link can then be used to
obtain the CVSS information from the National Vulnerability Database (NVD) site, including the
NIST-calculated CVSS score, the full CVSS vector, and the CVSS calculator.
The ARF (Asset Reporting Format) is a data model to express the transport format of
information about assets and the relationships between assets and reports. The standardized
data model facilitates the reporting, correlating, and fusing of asset information. SCC
automatically generates the results of all SCAP 1.2 data streams into the ARF 1.1 format. The
file will be included in the same folder as the other XML result files.
D.3.8 AI Implementation
The Asset Identification (AI) 1.1 specification provides a standardized model for representing
and identifying assets. The specification provides the necessary constructs to uniquely identify
and correlate assets based on known identifiers and/or information about the assets. SCC
identifies all assets utilizing the AI 1.1 specification in the ARF 1.1. result files.
The Trusted Model for Security Automation Data (TMSAD) is a common trusted model that can
be applied to specification within the security automation domain (e..g SCAP). The TMSAD is
composed of recommendations on how to use existing specifications to represent signatures,
hashes, key information, and identify information in the context of an XML document and
permits users to establish integrity, authentication, and traceability for security automation data.
131
SCC User Manual for Windows
SCC implements the TMSAD by verifying digitally signed SCAP 1.2 data streams. The XML
digital signature (XMLDSig) implementation is based on requirements from the TMSAD, which
includes requirements from W3C (http://www.w3.org/TR/xmldsig-core), and the NIST SP800-
126 (http://csrc.nist.gov/publications/nistpubs/800-126-rev2/SP800-126r2.pdf).
XCCDF (Extensible Configuration Checklist Description Format) is a language used for writing
security checklists and benchmarks. SCAP Compliance Checker loads XCCDF content from a
SCAP stream and determines if the Rules specified by the XCCDF content are satisfied by a
target system.
SCAP Compliance Checker validates XCCDF content, imports it and allows the user to select a
profile from the content. Rules are automatically selected and unselected based on the profile
the user selects.
The SCAP stream's CPE dictionary and its associated OVAL definitions are then processed to
determine which XCCDF Rules are applicable to the target system. Rules that are found to be
inapplicable to the target system based on CPE identifiers are automatically unselected.
SCAP Compliance Checker then traverses the XCCDF content, processing all selected XCCDF
Rules against a target system. Scores are calculated using all of the current XCCDF scoring
models including the default, flat, flat unweighted and absolute models. Additionally two
custom scoring methods are calculated, the spawar-original and spawar-adjusted.
A benchmark results XML document is generated using the XCCDF Results schema. This
results file is then transformed into an HTML report, along with more in depth reports generated
from the SCAP stream's OVAL content. The benchmark results XML document can be
imported into other tools since it uses the industry standard XCCDF Results schema.
OVAL (Open Vulnerability and Assessment Language) is a language used to standardize the
transfer of security content among different tools. SCAP Compliance Checker loads OVAL
132
A3 SCAP Implementation
content in conjunction with an XCCDF checklist and processes the OVAL definition content
against a target system.
SCAP Compliance Checker is able to process all four of OVAL's schemas: the Definitions
schema, the System Characteristics schema, the Results schema and the Variables schema.
The Definitions schema is used to define definitions that test a machine's state. This schema is
used in SCAP streams to specify patch, vulnerability and configuration content. SCAP
Compliance Checker imports OVAL Definitions files and processes the OVAL definitions
against a target system.
The System Characteristics schema is used to store data collected from a system. SCAP
Compliance Checker uses Object data from OVAL Definitions content and generates System
Characteristics data that is later used for testing purposes. This data is stored in an XML file
using the OVAL System Characteristics schema.
The Results schema takes State data from OVAL Definitions content along with System
Characteristics data and produces Definition and Test results. These results are stored in an
XML file that follows the OVAL Results schema. SCAP Compliance Checker then transforms
this XML file and produces human readable HTML report documents.
The Variables schema is used to import external variable data into the OVAL engine during
processing of an OVAL definition. SCAP Compliance Checker processes the XCCDF content of
a SCAP stream and extracts any variables that need to be imported into the OVAL engine. It
then creates an XML file using the OVAL Variables schema that contains these variables. The
OVAL engine later uses this file during OVAL processing.
By using the industry standard OVAL schemas, SCAP Compliance Checker can share data
with any tool that understands OVAL.
SCAP Compliance Checker 5.9 implements OVAL version 5.3 -> 5.11.2.
The Open Checklist Interactive Language (OCIL) defines a framework for expressing a set of
questions to be presented to a user and corresponding procedures to interpret responses to
these questions. SCAP Compliance Checker loads OCIL content in conjunction with an
XCCDF checklist and processes the OCIL questionnaires against a target system. SCAP
Compliance Checker can also process OCIL outside of a SCAP 1.1 data stream.
“The vendor SHALL provide instructions on how the product indicates the applicability of the imported
SCAP source data stream to a target platform. Instructions SHOULD also describe how the product
indicates data streams are not applicable for a target platform. This requirement is testing the use of the
OCIL questionnaire associated with a CPE name via the CPE dictionary and the platform id to
determine applicability of the data stream.”
133
SCC User Manual for Windows
SCC allows the OCIL Questionnaire to be answered prior to running the CPE applicability
check so that the end user does not have to answer the same questions multiple times if
multiple systems are being scanned. This allows SCC to create an OCIL Results file into a
temporary directory for each system. After finishing the OCIL Questionnaire and continuing the
analysis, if a CPE applicability check is included in the SCAP stream, only the OCIL
questionnaires deemed applicable will be included in the final ARF results file.
“SCAP.V.2850.1: The vendor SHALL provide instructions on how the product identifies SWID tags using
OVAL inventory class definitions that are part of an SCAP source data stream..”
and
"SCAP.V.2860.1: The vendor SHALL provide instructions on how the product identifies SWID tags using
OVAL inventory class definitions that are part of a standalone OVAL Definition file."
SCC has support for the OVAL independent XMLFileContent test, with which content authors
can create SCAP/OVAL content to find and process SWID tag files and report them as OVAL
inventory.
134
D.4 OVAL Probes Supported by SCC 5.9 for Windows
The following OVAL probes are supported in the Windows version of SCC. For probe support
on other platforms, please refer to the platform specific documentation for each release of SCC.
• Apache
• httpd
• Cisco IOS
• global
• interface
• line
• snmp
• version
• version55
• Independent
• EnvironmentVariable
• EnvironmentVariable58
• Family
• FileHash
• FileHash58
• LDAP
• SQL
• SQL57
• SQLEXT (SCC specific OVAL test, was submitted to the OVAL Board for inclusion in
OVAL 5.12, but hasn't been approved)
• TextFileContent
• TextFileContent54
• Variable
• XMLFileContent
• Windows
• AccessToken
• ActiveDirectory
• ActiveDirectory57
• AppCmd
• AuditEventPolicy
• AuditEventPolicySubCategories
• Cmdlet
• DnsCache
• File
• FileAuditedPermissions
• FileAuditedPermissions53
• FileEffectiveRights
• FileEffectiveRights53
• Group
• Group_SID
• Interface
• License
• LockoutPolicy
• Metabase
• NTUser
• PasswordPolicy
• PeHeader
135
SCC User Manual for Windows
• Port
• PrinterEffectiveRights
• Process
• Process58
• Registry
• RegKeyAuditedPermissions53
• RegKeyEffectiveRights
• RegKeyEffectiveRights53
• Service
• ServiceEffectiveRights
• SharedResource
• SID
• SID_SID
• SystemMetric
• UAC
• User
• User_SID55
• UserSID
• UserRight
• Volume
• WMI
• WMI57
• WuaUpdateSearcher
Local review capability is available for supported Oracle Database installations while local and
remote review capabilities are available for supported Microsoft SQL Server installations.
D.4.2 SCAP Content Author Note on SQL and SQL57 implementation in SCC
SCC can recognize several common representations of the SQL Server and Oracle Database
versions it supports. Such representations include chronological (SQL Server: 2005, 2008,
2008 R2; Oracle DB: 10g, 11g), short numerical (SQL Server: 9.0, 10.0; Oracle DB: 10, 11),
and long numerical (SQL Server: 9.00.x, 10.00.x, 10.05.x; Oracle DB: 10.1, 11.2.0.x). Declaring
multiple versions in a pattern match operation (e.g. "2005|2008", "10g|11g", or ".*") will enable
SCC to concurrently analyze instances from all matching and supported versions of SQL
Server or Oracle Database installed on the target system.
SCC’s handling of the “connection_string” element does not treat it as a literal connection
136
A4_OVAL_Probes_Supported_by_SCC
string. Rather, it is treated as a form for specifying which instances and, if reviewing a SQL
Server installation, databases on the target system should be inspected. Disregarding the
quotation marks, it has one required field, “server=<instance>” where <instance> is a literal
instance name or a regular expression, and one optional field, “database=<database>” where
<database> is a literal database name or a regular expression. When both fields are declared,
they are separated by a semicolon (;). When reviewing a SQL Server installation, declaring the
“server” field as “server=MSSQLServer” will enable SCC to submit database queries against
the default instance. Omitting the “database” field for a SQL Server review will cause all queries
to be submitted against the default database of the specified instance(s). When reviewing an
Oracle Database installation, any database declaration in the “connection_string” entity will be
ignored since it would not be applicable to the Oracle Database review process. Leveraging the
pattern match operation of the “connection_string” element allows SCC to analyze multiple
instances and multiple matching databases, where applicable, on each instance with a single
SQL or SQL57 OVAL probe.
Due to SCC's dependency upon the Oracle SQL*Plus utility for conducting Oracle Database
reviews, any SQL queries specified by Oracle Database specific OVAL probes are limited to a
length of 257 characters.
137
APPENDIX E - REFERENCES & DEFINITIONS
E.1 References
138
E.2 Definitions
ACRONYM DEFINITION
ARF The Asset Reporting Format (ARF) is a data model to express the transport format
of information about assets and the relationships between assets and reports.
CCE Common Configuration Enumeration
CVE® International in scope and free for public use, CVE is a dictionary of publicly
known information security vulnerabilities and exposures.
CVE’s common identifiers enable data exchange between security products and
provide a baseline index point for evaluating coverage of tools and services.[1]
DISA Defense Information Systems Agency
With respect to SCC and SCAP, DISA creates and maintains SCAP content for the
DISA STIGS.
MITRE MITRE is a not‐for‐profit corporation, chartered to work solely in the public
interest. MITRE operates multiple Federally Funded Research and Development
Centers (FFRDCs).[1]
With regards to SCAP, MITRE develops and maintains several standards such as
CPE, CCE and CVE (and formerly OVAL).
NIST National Institute of Standards and Technology
139
SCC User Manual for Windows
The Open Checklist Interactive Language (OCIL) defines a framework for expressing
a set of questions to be presented to a user and corresponding procedures to
interpret responses to these questions. Although the OCIL specification was
developed for use with IT security checklists, the uses of OCIL are by no means
confined to IT security. Other possible use cases include research surveys, academic
[3]
course exams, and instructional walkthroughs.
OVAL Open Vulnerability and Assessment Language
The Security Technical Implementation Guides (STIGs) and the NSA Guides are the
configuration standards for DOD IA and IA‐enabled devices/systems. Since 1998,
DISA Field Security Operations (FSO) has played a critical role enhancing the
security posture of DoD's security systems by providing the Security Technical
Implementation Guides (STIGs). The STIGs contain technical guidance to "lock
down" information systems/software that might otherwise be vulnerable to a
140
Definitions
[1] - http://www.mitre.org
[2] - http://www.wikipedia.org
[3] - http://www.nist.gov
[4] - http://www.public.navy.mil
[5] - https://cyber.mil/stigs/
[6] - http://cisecurity.org
141
APPENDIX F - LICENSES
142
APPENDIX G - TECHNICAL SUPPORT & FEEDBACK
Technical support is available for government users and contractors to the federal government.
o For assistance with the SCC application (installation, usage, errors, crashes) please
email: scc.fct@navy.mil
G.2 Tutorials
There are a series tutorials for SCC which can be viewed at:
https://www.niwcatlantic.navy.mil/scap/videos/
The latest official release information can be obtained from our website:
https://www.niwcatlantic.navy.mil/scap/
To be notified via email with updates on SCC, release notifications, customer support surveys,
please email: scc.fct@navy.mil
DISA maintains the authoritative download of SCC, and starting with SCC 5.4, no longer
requires a CAC to obtain: https://public.cyber.mil/stigs/scap/
We ask for your feedback with an annual survey, but you can submit feedback anytime at the
website below.
https://usnavy.gov1.qualtrics.com/jfe/form/SV_4ZpXv8JkUlDs4lw
143
APPENDIX H - CREDITS AND FUNDING
The development of SCC has been funded by several different agencies over the years:
SCC is no longer funded by DISA (or any other individual agency). During FY23 and most of
FY24 we have been graciously funded by two groups of end users. Ideally, we would like to
have 3 or 4 groups to help increase stability and decrease the financial burden for the
contributing groups.
We are looking to find additional agencies/teams to share the costs of our labor (6 government
GS-13 developers) along with materials and maintenance for the SCC development/test lab.
Becoming a funding sponsor allows your group to influence the future of SCC and ensure it
works correctly in your environment.
144