Security Content Automation Protocol definition

Security Content Automation Protocol. (SCAP) a method using a suite of selected open standards that enumerate software flaws, security related configuration issues, and product names to enable automated vulnerability management, measurement, and policy compliance evaluation;

Examples of Security Content Automation Protocol in a sentence

  • The Contractor shall use Security Content Automation Protocol (SCAP)-validated tools with USGCB Scanner capability to ensure its products operate correctly with USGCB configurations and do not alter USGCB settings – see ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/validation/.

  • Using any available Security Content Automation Protocol (SCAP)-compliant automated tools for active/passive scans, provide an inventory of all information technology (IT) assets for hardware and software, (computers, servers, routers, databases, operating systems, etc.) that are processing HHS-owned information/data.

  • Automate configuration settings and configuration management in accordance with HHS security policies, including but not limited to: ▪ Configuring its systems to allow for periodic HHS vulnerability and security configuration assessment scanning; and ▪ Using Security Content Automation Protocol (SCAP)-validated tools with capabilities to scan its systems at least on a monthly basis and report the results of these scans to the CO and/or COR, Project Officer, and any other applicable designated POC.

  • The National Institute of Standards and Technology (NIST) also established a Security Content Automation Protocol (S-CAP) to help IT providers make self- assessments of their products.

  • The contractor must use Security Content Automation Protocol (SCAP) validated tools with configuration baseline scanner capability to certify their products operate correctly with HHS and NIST defined configurations and do not alter these settings.

  • Talend follows the Security Content Automation Protocol (SCAP) framework.

  • The Contractor may choose to run its own automated scans or audits, provided the scanning tools and configuration settings are compliant with NIST Security Content Automation Protocol (SCAP) standards and have been approved by the agency.

Related to Security Content Automation Protocol

  • Network Interface Device or "NID" is a Network Element (including all of its features, functions and capabilities) that includes any means of Interconnection of End User Customer premises wiring to Qwest's distribution plant, such as a cross connect device used for that purpose. "New Service Provider" means the Party to which an End User Customer switches its local Exchange Service or the Party to which an End User Customer is porting its telephone number(s).

  • Client Application means an application developed by Customer that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Database Management System (DBMS) A system of manual procedures and computer programs used to create, store and update the data required to provide Selective Routing and/or Automatic Location Identification for 911 systems. Day: A calendar day unless otherwise specified. Dedicated Transport: UNE transmission path between one of CenturyLink’s Wire Centers or switches and another of CenturyLink’s Wire Centers or switches within the same LATA and State that are dedicated to a particular customer or carrier. Default: A Party’s violation of any material term or condition of the Agreement, or refusal or failure in any material respect to properly perform its obligations under this Agreement, including the failure to make any undisputed payment when due. A Party shall also be deemed in Default upon such Party’s insolvency or the initiation of bankruptcy or receivership proceedings by or against the Party or the failure to obtain or maintain any certification(s) or authorization(s) from the Commission which are necessary or appropriate for a Party to exchange traffic or order any service, facility or arrangement under this Agreement, or notice from the Party that it has ceased doing business in this State or receipt of publicly available information that signifies the Party is no longer doing business in this State.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Interfaces means, collectively, the CAD Interface and the Channel Access Interface.