[Date Prev][Date Next][Thread Prev][Thread Next][ Date Index ][ Thread Index ]

The Common Configuration Enumeration (CCE)



All,

As discussed at the last 2 OVAL Developer Days and in the most
recent CVE Editorial Board Teleconference, the Common Configuration
Enumeration initiative is attempting to assign identifiers to
configuration issues.

Since the very first days, the CVE Editorial Board has recognized the
need to address both software flaws (aka vulnerabilities) and
mis-configurations (aka exposures).  The CCE project is logical next
step in the evolution of CVE to finally address the 'E' in CVE.

As members of the CVE and OVAL Editorial Boards, you are invited to
join the CCE Working Group.  The purpose of the Working Group is to
help validate the current draft CCE list for Windows.

Attached you will find an Excel spreadsheet containing the current
CCE draft along with a text file that describes the meaning of the
fields.  You will also find a description for a CCE Working Group
meeting, which will be held on Wednesday, September 20.  This meeting
will be held at the NIST Campus in Gaithersberg, MD on the day
following NIST's National Security Automation Conference & Workshop.
(http://csrc.nist.gov/checklists/workshop.html)

If you are interested in joining the CCE Working Group, please
contact me at damann@mitre.org.   Please note, I will be away
from the office till August 28

-Dave
==================================================================
David Mann, Ph.D.  |   CVE Project Lead   |  The MITRE Corporation
------------------------------------------------------------------
     e-mail:damann@mitre.org    |      cell:781.424.6003
==================================================================

Windows-CCE-draft-2-1.xls

COMMON CONFIGURATION ENUMERATION WORKING GROUP MEETING

======================================================



OVERVIEW

--------

The CCE Working Group will be holding a face to face working session

on Wednesday, September 20.  NIST has graciously offered to host

this meeting on the day following their "National Security Content

Automation Initiative Conference", which will be held on September

18 and 19. (http://csrc.nist.gov/checklists/workshop.html)



DATE AND TIME

-------------

Wednesday, September 20, 2006

9:00 am - 1:30 pm (optional afternoon session from 1:30 - 3:00)



LOCATION

--------

NIST Campus in Gaithersburg, Maryland

Rooms are TBA





PURPOSE

-------

The primary objective of this meeting is for the group to come to

agreement on how CCE identifiers and definitions should be constructed.



In particular, we will be considering a small subset of draft CCE

entries with the purpose of coming to agreement on:

+ Is the CCE entry defined at the correct level of abstraction?

+ How should the CCE Definition be worded?

+ How should logical CCE Parameters be defined?

+ How should CCE Technical Mechanisms be defined?

+ Should CCE Technical Mechanisms be referencable in a standardized

  manner and if so, how?

+ What should the relationship be between CCE ids and OVAL definitions?

+ What should the relationship be between CCE ids and XCCDF rules?



If time permits, we will also consider the following questions:

+ What should be the format of the CCE identifiers?

+ What should the process be for creating and vetting new identifiers

  for other platforms?





WHO SHOULD ATTEND

-----------------

Attendees should have a working knowledge of the current draft CCE

list for Windows as well as a familiarity with both OVAL and XCCDF.



It would be helpful if attendees to the workshop also have familiarity

with one of more of the following problem areas:

+ Authoring configuration check list documents

+ Authoring checks for configuration audit tools

+ Integrating data from multiple configuration tools

+ Automated configuration management

+ Lower level configuration data models such as WMI

+ Automated configuration management





Current members of the CCE Working Group are encouraged to attend as

are interested members of the CVE Editorial Board and OVAL Editorial

Board.  It should be noted that this meeting will be a working session

with little to no time devoted to background.  Please note,

registration will be limited to approximately 25 persons and preference

will be given to current CCE Working Group members.







AGENDA

------

09:00a - 09:15a - Greetings and Introductions

09:15a - 10:30a - Working Session 1

10:30a - 10:45a - Break

10:45a - 12:00p - Working Session 2

12:00p - 01:00p - Lunch at the NIST Cafeteria

01:00p - 03:00p - Working Session 3 (If needed)





REGISTRATION

------------

Please send e-mail to Nancy Kennedy (nkennedy@mitre.org) or

Claire Murphy (cmurphy@mitre.org) to register.  Please include

the following information:

+ Name

+ Phone number

+ e-mail address

+ Company or Organization

+ Citizenship



Currently, entries in the CCE list contain the following attributes:



1. CCE IDENTIFIER – Like CVE, CCE assigns identifier tags to each

commonly recognized configuration issue. These identifiers are

intended to be unique tags or keys, not descriptive names. By way of

a loose analogy, CCE ids are like scientific names for animals,

providing a precise identifier for a species that is agreed upon by

the technical community but which may have little or no meaning in

common language usage.



2. DESCRIPTION – CCE entries contain a humanly understandable

description of the configuration issue. This description is intended

to describe the generic issue. In particular, it is not intended to

make an assertion as to what particular configuration should or

should not be made. For example, a valid CCE descriptions might be

"The minimum password length should be set appropriately". CCE makes

no assertion whether the minimum password length should be 8, 10 or

14. It only describes the generic and non-qualified issue of minimum

password length.



3. LOGICAL PARAMETERS – CCE entries contain a list of logical

parameters that would be needed to be specified in order to implement

a CCE on a system. For example, for the CCE associated with

"The start up permissions on telnet should be set appropriately" (for

Windows) the logical parameters would be Automatic, Manual and

Disabled. CCE entries distinguish between such humanly understandable

logical parameters and machine understandable parameters such as the

specific registry key values that might be associated with the

logical notions of "Automatic", "Manual" and "Disabled".



4. TECHNICAL MECHANISMS - For any given configuration issue, there

may be more than one way to implement the desired result. For

example, in Windows the issue of "The Autoplay feature should be set

correctly for all drives" issue can be set either with a direct

registry key edit or by way of a Group Policy Object if the system

participates in an Active Directory domain. And in most forms of Unix

and Linux, the issue of "The start up permissions for FTP should be

set correctly" can be done in multiple ways.



One way to understand the distinction between the CCE Description and

its corresponding set of Technical Mechanisms is that the former

describes a goal and the latter describes a set of ways to achieve

that goal. It should be noted that this distinction has been and

continues to be topic of lively discussion among the CCE participants

and may change significantly as CCE matures.



5. REFERENCES – Each CCE entry has a set of references into published

configuration guidance documents such as the NSA Security Guides, the

Center for Internet Security Benchmark, and DISA Stigs. These

references point to the specific sections of the documents or tools

in which the configuration issue is described in more detail. These

references serve 3 purposes. First, they provide a logical linkage to

more detailed information. Second, the references validate the need

for a CCE id for any given configuration issue. Thirdly, the

reference validates that the CCE id is described at a level of

abstraction that used and accepted within the community.


Page Last Updated or Reviewed: May 22, 2007