Visible to the public Automated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2

TitleAutomated Security Configuration Checklist for Apple iOS Devices Using SCAP v1.2
Publication TypeConference Paper
Year of Publication2018
AuthorsAdetunji, Akinbobola Oluwaseun, Butakov, Sergey, Zavarsky, Pavol
Conference Name2018 International Conference on Platform Technology and Service (PlatCon)
KeywordsApple iOS, Apple iOS device configuration, automated security configuration checklist, Automation, compliance, compositionality, human factors, information security management tasks, iOS (operating system), iOS Security, Metrics, Monitoring, organization, Organizations, patch management, policy compliance, pubcrawl, Resiliency, SCAP, security automation, security baseline, security configurations monitoring, security content automation protocol, security of data, security-related configuration settings, Standards organizations, Tools, Vulnerability
AbstractThe security content automation includes configurations of large number of systems, installation of patches securely, verification of security-related configuration settings, compliance with security policies and regulatory requirements, and ability to respond quickly when new threats are discovered [1]. Although humans are important in information security management, humans sometimes introduce errors and inconsistencies in an organization due to manual nature of their tasks [2]. Security Content Automation Protocol was developed by the U.S. NIST to automate information security management tasks such as vulnerability and patch management, and to achieve continuous monitoring of security configurations in an organization. In this paper, SCAP is employed to develop an automated security configuration checklist for use in verifying Apple iOS device configuration against the defined security baseline to enforce policy compliance in an enterprise.
DOI10.1109/PlatCon.2018.8472773
Citation Keyadetunji_automated_2018