image
Chapter 7
Building Automated Security Content
 
With the foundation laid thus far with enumerations, languages, and scoring systems, we can now move on to creating and using automated content to implement security automation. As we assemble the checklists and test definitions into meaningful arrangements, we can also use various reference implementations that are freely available to ensure that the files being built use the appropriate schemas and syntax. Examples of these are provided in this chapter, including instructions on how to obtain these from the appropriate sources.
WORKING WITH FILES
Many of the security automation protocols are ...

Get Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.