O'Reilly logo

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by Greg Witte, Shane Shaffer, Matt Kerr, Melanie Cook

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image
Chapter 7
Building Automated Security Content
 
With the foundation laid thus far with enumerations, languages, and scoring systems, we can now move on to creating and using automated content to implement security automation. As we assemble the checklists and test definitions into meaningful arrangements, we can also use various reference implementations that are freely available to ensure that the files being built use the appropriate schemas and syntax. Examples of these are provided in this chapter, including instructions on how to obtain these from the appropriate sources.
WORKING WITH FILES
Many of the security automation protocols are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required