Documentation Index
Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt
Use this file to discover all available pages before exploring further.
Overview
OpenSCAP is the open standard for automated security compliance scanning. It evaluates your system against machine-readable SCAP (Security Content Automation Protocol) content — including CIS Benchmarks, DISA STIGs, PCI-DSS, HIPAA, and ANSSI profiles. Each scan produces detailed HTML and XML reports that map every test to a specific compliance requirement. Xloud Platform ships OpenSCAP tooling on XOS and supports fleet-wide compliance scanning via the XDeploy automation pipeline. You can forward scan reports to SIEM systems or store them as audit artifacts for regulatory reviews.Xloud-Developed — OpenSCAP is one of three independent scanners in Xloud SIEM — Wazuh, Lynis, and OpenSCAP run in parallel across all nodes for layered compliance coverage. Results are aggregated on the Security Posture page in Monitor Center.
Prerequisites
openscap-scannerandscap-security-guidepackages installed (pre-installed on XOS nodes)- Guest VMs:
apt install openscap-scanner ssg-debderivedon Ubuntu/Debian - Root access on the target system
- Target profile selected from the SCAP Security Guide (SSG)
Available Profiles
The SCAP Security Guide ships dozens of profiles for common compliance frameworks. Key profiles for Xloud environments:| Profile ID | Framework | Target |
|---|---|---|
xccdf_org.ssgproject.content_profile_cis_level1_server | CIS Level 1 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_cis_level2_server | CIS Level 2 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_pci-dss | PCI-DSS v3.2.1 | Ubuntu Server |
xccdf_org.ssgproject.content_profile_hipaa | HIPAA | Ubuntu Server |
xccdf_org.ssgproject.content_profile_anssi_bp28_high | ANSSI BP-028 HIGH | Ubuntu Server |
xccdf_org.ssgproject.content_profile_stig | DISA STIG | RHEL-based |
List all available profiles for your OS
Run a Compliance Scan
- Single Host
- With Remediation
- Fleet Scan (Ansible)
Run the scan against a profile
Scan against CIS Level 1 Server profile
results-cis-l1.xml— machine-readable XCCDF resultsreport-cis-l1.html— human-readable HTML report
Review the HTML report
Copy the report to a location accessible from a browser:The report shows each rule with a pass, fail, or not applicable result, linked to the compliance requirement ID and remediation guidance.
Copy report to web-accessible path
Check the score at the top of the report. A score above 80% indicates strong compliance posture for that profile.
Interpreting Results
Each rule in the HTML report maps to a specific compliance control:| Result | Meaning | Action |
|---|---|---|
| Pass | System meets the requirement | No action needed |
| Fail | Requirement not met | Apply remediation |
| Not Applicable | Rule does not apply to this system | Document exemption |
| Not Checked | Rule requires manual verification | Perform manual check |
| Error | Scan could not evaluate the rule | Check for missing dependencies |
Score Interpretation
| Score Range | Compliance Posture |
|---|---|
| 90–100% | Excellent — minimal gaps |
| 80–89% | Good — a few controls need attention |
| 70–79% | Moderate — hardening required before production |
| Below 70% | Poor — significant remediation needed |
Scheduled Scanning
Run scans on a weekly schedule and archive results:/etc/cron.weekly/openscap-scan
Profile Selection Guide
Which profile should I use?
Which profile should I use?
| Workload Type | Recommended Profile |
|---|---|
| General production instances | CIS Level 1 Server |
| High-security workloads | CIS Level 2 Server |
| Payment card environments | PCI-DSS |
| Healthcare data | HIPAA |
| Government / defense | ANSSI BP-028 HIGH or DISA STIG |
| Development and staging | CIS Level 1 (relaxed enforcement) |
Custom profile development
Custom profile development
You can create tailored profiles by extending existing SSG content using SCAP Workbench or editing the XCCDF XML directly. Custom profiles allow you to:
- Disable rules that conflict with your application requirements
- Add organization-specific controls
- Override severity levels for risk-accepted findings
/etc/scap/custom-profiles/ and reference them with --profile-id in scan commands.Next Steps
Xloud SIEM Overview
Back to the unified Xloud SIEM hub — Security Posture and Alerts dashboards
Wazuh HIDS
Complement SCAP scans with continuous real-time host intrusion detection
Lynis Auditing
Run OS security audits with hardening index scoring
Compliance Frameworks
Map SCAP results to SOC 2, ISO 27001, and HIPAA audit requirements