Building Automated Security Content
With the foundation laid thus far with enumerations, languages, and scoring systems, we can now move on to creating and using automated content to implement security automation. As we assemble the checklists and test definitions into meaningful arrangements, we can also use various reference implementations that are freely available to ensure that the files being built use the appropriate schemas and syntax. Examples of these are provided in this chapter, including instructions on how to obtain these from the appropriate sources.
WORKING WITH FILES
Many of the security automation protocols are ...