XML-based language formats checklists for IT security

To make it easier to measure the security of an information technology product or system, researchers at the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) have developed a common specification language–Extensible Configuration Checklist Description Format (XCCDF)–for writing security checklists and related documents.


Increasingly, computers and other information technology products are vulnerable to multiple threats including viruses, worms and identity or information theft. One basic, yet effective, security tool is the security configuration checklist–a series of instructions for configuring an information technology (IT) product to a baseline or benchmark level of security. Configuring a system into conformance with a benchmark or other security specification is a time-consuming and very technical task. Automated tools are available to help system administrators determine a system’s conformance and recommend corrective measures. However, most of these tools are designed for a particular IT product or system.

XCCDF is an XML-based format that is flexible, vendor-neutral and suited for a wide variety of checklist applications including measuring conformance of an IT system to security benchmarks and generating a record of a benchmark test. (XML is a language–analogous to the HTML codes used to format web pages–that describes information in a standard way to allow computers to exchange information and act on it.)

“XCCDF’s common format will help security professionals, vendors and system auditors to more quickly exchange information and improve automation of security testing and configuration checking,” said John Wack, a researcher in NIST’s Computer Security Division.

The XCCDF specification document, Specification for the Extensible Configuration Checklist Description Format (XCCDF) (NISTIR 7188), is available at http://csrc.nist.gov/checklists/. NIST, in conjunction with the Department of Homeland Security, NSA, and other organizations, is developing computer security checklists for many IT products widely used by government agencies.

Media Contact

Jan Kosko EurekAlert!

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

New model of neuronal circuit provides insight on eye movement

Working with week-old zebrafish larva, researchers at Weill Cornell Medicine and colleagues decoded how the connections formed by a network of neurons in the brainstem guide the fishes’ gaze. The…

Innovative protocol maps NMDA receptors in Alzheimer’s-Affected brains

Researchers from the Institute for Neurosciences (IN), a joint center of the Miguel Hernández University of Elche (UMH) and the Spanish National Research Council (CSIC), who are also part of…

New insights into sleep

…uncover key mechanisms related to cognitive function. Discovery suggests broad implications for giving brain a boost. While it’s well known that sleep enhances cognitive performance, the underlying neural mechanisms, particularly…