Overview
OpenSCAP is the open standard for automated security compliance scanning. It evaluates a system against machine-readable SCAP (Security Content Automation Protocol) content — including CIS Benchmarks, DISA STIGs, PCI-DSS, HIPAA, and ANSSI profiles. Scan results are produced as detailed HTML and XML reports that map each test to a specific compliance requirement. Xloud Cloud Platform ships OpenSCAP tooling on XOS and supports fleet-wide compliance scanning via the XDeploy automation pipeline. Scan reports can be forwarded to SIEM systems or stored as audit artifacts for regulatory reviews.Xloud-Developed — OpenSCAP is one of three independent scanners in the Xloud triple compliance system. XAVS runs SCA benchmarks, system audit, and SCAP profile scans in parallel across all nodes, providing layered compliance coverage. Results from all three scanners are aggregated in the Security Operations Dashboard.
Prerequisites
openscap-scannerandscap-security-guidepackages installed (pre-installed on XOS nodes)- Guest VMs:
apt install openscap-scanner ssg-debderivedon Ubuntu/Debian - Root access on the target system
- Target profile selected from the SCAP Security Guide (SSG)
Available Profiles
The SCAP Security Guide ships dozens of profiles for common compliance frameworks. Key profiles for Xloud environments:| Profile ID | Framework | Target |
|---|---|---|
xccdf_org.ssgproject.content_profile_cis_level1_server | CIS Level 1 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_cis_level2_server | CIS Level 2 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_pci-dss | PCI-DSS v3.2.1 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_hipaa | HIPAA | Ubuntu Server |
xccdf_org.ssgproject.content_profile_anssi_bp28_high | ANSSI BP-028 HIGH | Ubuntu Server |
xccdf_org.ssgproject.content_profile_stig | DISA STIG | RHEL-based |
List all available profiles for your OS
Run a Compliance Scan
- Single Host
- With Remediation
- Fleet Scan (Ansible)
Run the scan against a profile
Scan against CIS Level 1 Server profile
results-cis-l1.xml— machine-readable XCCDF resultsreport-cis-l1.html— human-readable HTML report
Review the HTML report
Copy the report to a location accessible from a browser:The report shows each rule with a pass, fail, or not applicable result, linked to the compliance requirement ID and remediation guidance.
Copy report to web-accessible path
Check the score at the top of the report. A score above 80% indicates strong compliance posture for that profile.
Interpreting Results
Each rule in the HTML report maps to a specific compliance control:| Result | Meaning | Action |
|---|---|---|
| Pass | System meets the requirement | No action needed |
| Fail | Requirement not met | Apply remediation |
| Not Applicable | Rule does not apply to this system | Document exemption |
| Not Checked | Rule requires manual verification | Perform manual check |
| Error | Scan could not evaluate the rule | Check for missing dependencies |
Score Interpretation
| Score Range | Compliance Posture |
|---|---|
| 90–100% | Excellent — minimal gaps |
| 80–89% | Good — a few controls need attention |
| 70–79% | Moderate — hardening required before production |
| Below 70% | Poor — significant remediation needed |
Scheduled Scanning
Run scans on a weekly schedule and archive results:/etc/cron.weekly/openscap-scan
Profile Selection Guide
Which profile should I use?
Which profile should I use?
| Workload Type | Recommended Profile |
|---|---|
| General production VMs | CIS Level 1 Server |
| High-security workloads | CIS Level 2 Server |
| Payment card environments | PCI-DSS |
| Healthcare data | HIPAA |
| Government / defence | ANSSI BP-028 HIGH or DISA STIG |
| Development and staging | CIS Level 1 (relaxed enforcement) |
Custom profile development
Custom profile development
You can create tailored profiles by extending existing SSG content using SCAP Workbench or editing the XCCDF XML directly. Custom profiles allow you to:
- Disable rules that conflict with your application requirements
- Add organization-specific controls
- Override severity levels for risk-accepted findings
/etc/scap/custom-profiles/ and reference them with --profile-id in scan commands.Next Steps
Wazuh HIDS
Complement SCAP scans with continuous real-time host intrusion detection
Lynis Auditing
Run agentless OS security audits with hardening index scoring
Compliance Frameworks
Map SCAP results to SOC 2, ISO 27001, and HIPAA audit requirements
Hardening Guide
Apply baseline hardening before running compliance scans