[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#852415: marked as done (RFS: scap-security-guide/0.1.31-1 ITP: security guides and conformity checks using SCAP standard)



Your message dated Thu, 23 Mar 2017 10:20:16 +0000
with message-id <E1cqzqq-0000g0-Qz@quantz.debian.org>
and subject line closing RFS: scap-security-guide/0.1.31-1 ITP: security guides and conformity checks using SCAP standard
has caused the Debian Bug report #853903,
regarding RFS: scap-security-guide/0.1.31-1 ITP: security guides and conformity checks using SCAP standard
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
853903: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853903
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: wishlist

Dear mentors,

I am looking for a sponsor for my package "scap-security-guide"

 Package name    : scap-security-guide
 Version         : 0.1.31-3
 Upstream Author : Watson Yuuma Sato (wsato@redhat.com)
URL : https://www.open-scap.org/security-policies/scap-security-guide/ License : unlicenced (see https://github.com/OpenSCAP/scap-security-guide/blob/master/LICENSE)
 Section         : admin

It builds those binary packages:

 ssg-base   - SCAP Security guide base content and documentation
 ssg-debian8 - SCAP Guides and benchmarks targeting Debian 8
 ssg-firefox - SCAP Guides and benchmarks targeting Firefox Browser
ssg-jre - SCAP Guides and benchmarks targeting Java Runtime Environment
 ssg-ubuntu1604 - SCAP Guides and benchmarks targeting Ubuntu 16.04
 ssg-webmin - SCAP Guides and benchmarks targeting Webmin

To access further information about this package, please visit the following URL:

https://mentors.debian.net/package/scap-security-guide

Alternatively, one can download the package with dget using this command:

dget -x https://mentors.debian.net/debian/pool/main/s/scap-security-guide/scap-security-guide_0.1.31-3.dsc

More information about scap-security-guide can be obtained from https://www.open-scap.org/security-policies/scap-security-guide
The repository is on https://github.com/OpenSCAP/scap-security-guide

Changes since the last upload:

* Add XCCDF benchmarks and guides for JRE and Webmin

About SCAP-security-guide:

SCAP-security-guide works with the OpenSCAP tool, which is already packaged in Debian.

The goal of this package is to deploy SCAP XCCDF Benchmarks and Guides for various targets not deployed by the OpenSCAP core package, but supported by the SCAP-security-guide community in which I work as contributor for Ubuntu, Debian and ANSSI best practices.

Using these guides/benchmarks, it is possible to validate conformity of Debian-based deployment against standard security policies such as ANSSI Best-practices, PCI-DSS, NIST SP-800... and to launch remediation scripts when needed. Using the OpenSCAP ecosystem, it is possible to manage the security policy of a complete infrastructure, when launching OpenSCAP tool with the above benchmarks through ssh (for e.g.) or on VM or docker templates.

  Regards,
   Philippe Thierry

--- End Message ---
--- Begin Message ---
Package scap-security-guide version 0.1.31-1 is in unstable now.
https://packages.qa.debian.org/scap-security-guide

--- End Message ---

Reply to: