cce.mitre.org
Preview meta tags from the cce.mitre.org website.
Linked Hostnames
4- 15 links tocce.mitre.org
- 1 link tomaking-security-measurable.1364806.n2.nabble.com
- 1 link tonvd.nist.gov
- 1 link towww.mitre.org
General Meta Tags
4- titleCommon Configuration Enumeration (CCE): Unique Identifiers for Common System Configuration Issues
- Content-Typetext/html; charset=iso-8859-1
- keywordsCCE, Common Configuration Enumeration, CCE List, CCE name, CCE entry, CCE entries, CCE Identifier, CCE Identifiers, CCE-ID, CCE-IDs, CCEs, CCE content, platform group, CCE Working Group, system configuration, system configuration issues, configuration assessment, configuration guidance statement, configuration guidance, computer policy, computer setting, policy compliance, benchmark, vendor guidance, vendor documentation, configuration assessment, configuration management, consolidated reporting system, configuration guidance statement, configuration best-practice documents, security guides, Federal Desktop Core Configuration, FDCC, CIS Benchmark Documents, NIST Security Configuration Guides, NSA Security Configuration Guides, Defense DISA Security Technical Implementation Guides, STIGs, CCE-Compatible, CCE Compatibility, CCE Adoption, CCE Naming Authority, CNA, CNAs, Common Vulnerabilities and Exposures, CVE, CVE List, National Vulnerability Database, NVD, vulnerabilities, exposures, information security, information security standards, community standards, standards, enterprise information security architecture, security information management, SIM, information security automation, Security Content Automation Protocol, SCAP, Making Security Measurable, MITRE, MITRE Corporation
- descriptionCommon Configuration Enumeration (CCET) provides unique identifiers (i.e., CCE Identifiers) to system configuration issues in order to facilitate fast and accurate correlation of configuration data across multiple information sources and tools. For example, CCE Identifiers can be used to associate checks in configuration assessment tools with statements in configuration best-practice documents and security guides, are the main identifiers used for the settings in the U.S. Federal Desktop Core Configuration (FDCC) data file downloads, and are a key component for enabling security content automation.
Link Tags
2- shortcut icon/favicon.ico
- stylesheetcce_styles.css
Emails
1Links
18- http://making-security-measurable.1364806.n2.nabble.com/CCE-Working-Group-f5769350.html
- http://nvd.nist.gov/cce/index.cfm
- http://www.mitre.org
- https://cce.mitre.org
- https://cce.mitre.org/about/documents.html