{"id":814,"date":"2024-02-05T16:36:07","date_gmt":"2024-02-05T15:36:07","guid":{"rendered":"http:\/\/10.0.1.197\/?page_id=814"},"modified":"2024-09-12T08:36:24","modified_gmt":"2024-09-12T06:36:24","slug":"security-content-automation-protocol-scap","status":"publish","type":"page","link":"http:\/\/192.168.0.78\/services\/it-evaluation-assessment\/security-content-automation-protocol-scap\/","title":{"rendered":"\u5b89\u5168\u5185\u5bb9\u81ea\u52a8\u5316\u534f\u8bae (SCAP)"},"content":{"rendered":"\n
\n
\n
\n
\n
\n

IT \u8bc4\u4f30<\/p>\n\n\n\n

\u5b89\u5168\u5185\u5bb9\u81ea\u52a8\u5316\u534f\u8bae (SCAP)<\/h1>\n\n\n\n

\u54a8\u8be2\u6211\u4eec\u7684\u4e13\u5bb6\u3002\u6211\u4eec\u5f88\u9ad8\u5174\u4e3a\u60a8\u63d0\u4f9b\u652f\u6301\u3002<\/p>\n\n\n\n

\n
\u8054\u7cfb\u6211\u4eec<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n
\n
\n \n \n <\/path>\n \n <\/path>\n <\/g>\n \n \n \n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n <\/g>\n <\/g>\n <\/g>\n <\/g>\n \n \n \n <\/path>\n \n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n <\/g>\n <\/g>\n <\/g>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/g>\n \n <\/path>\n <\/path>\n <\/path>\n <\/path>\n \n <\/path>\n <\/g>\n <\/g>\n \n <\/path>\n <\/g>\n <\/g>\n <\/g>\n
\n
\n
\n
\n
\n
\n

\u4fe1\u606f\u5b89\u5168\u81ea\u52a8\u5316\u8ba1\u5212\uff08ISAP\uff1aThe Information Security Automation Program\uff09\uff0c\u662f\u7f8e\u56fd\u653f\u5e9c\u4e3a\u5b9e\u73b0\u6280\u672f\u5b89\u5168\u64cd\u4f5c\u7684\u81ea\u52a8\u5316\u548c\u6807\u51c6\u5316\u800c\u53d1\u8d77\u7684\u4e00\u9879\u5021\u8bae\uff0c\u7ed3\u5408\u4e86\u8bb8\u591a\u7528\u4e8e\u5217\u4e3e\u8f6f\u4ef6\u7f3a\u9677\u548c\u914d\u7f6e\u95ee\u9898\u7684\u5f00\u653e\u6807\u51c6\uff0c\u521b\u5efa\u4e86\u5b89\u5168\u5185\u5bb9\u81ea\u52a8\u5316\u534f\u8bae \uff08SCAP\uff1aSecurity Content Automation Protocol\uff09\u3002<\/p>\n\n\n\n

atsec\u63d0\u4f9b\u7684\u670d\u52a1\uff1a<\/h3>\n\n\n\n

atsec \u7f8e\u56fd\u63d0\u4f9b SCAP \u6d4b\u8bd5\u3001\u8bc4\u4f30\uff0c\u5e76\u901a\u8fc7\u5176\u8ba4\u53ef\u7684\u5bc6\u7801\u5b89\u5168\u6d4b\u8bd5 (CST) \u5b9e\u9a8c\u5ba4\uff08NVLAP \u5b9e\u9a8c\u5ba4\u4ee3\u7801 #200658-0\uff09\u4e3a\u4ea7\u54c1\u548c\u6a21\u5757\u63d0\u4f9b\u9a8c\u8bc1\u652f\u6301\uff1a<\/p>\n\n\n\n