Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). It performs automated vulnerability scanning and device configuration assessment.
What is the ACAS software used for?
Part of the ACAS software monitors passive network traffic, new network hosts, and applications that are vulnerable to compromise. It also generates required reports and data that are remotely accessible, with a centralized console, and is Security Content Automation Protocol (SCAP) compliant.
What is the ACAS Nessus scanner?
Nessus is the scanning component of ACAS that is compliant with not only CVE vulnerability identifiers, but also DISA STIGs. This is one of the main advantages of Nessus over DoD’s previous scanner, Retina.
What is the collection of information for ACAS?
The collection of information for ACAS under 19 CFR 122.48 b is comprised of a subset of information already collected pursuant to 19 CFR 122.48 a under this approval, but information for ACAS will be now be collected earlier.
What is an ACAS referral for screening?
A referral for screening will be issued if the potential risk of the cargo is deemed high enough to warrant enhanced screening. A referral for screening must be resolved according to TSA-approved enhanced screening methods. (2) ACAS referral resolution.
What is the difference between ACAS and Nessus?
Nessus is considered the active scanner while PVS is passive. ... ACAS offers a more streamlined, centralized method for running scans, collecting scan data, and provides highly customizable reports that provide senior leadership the ability to measure the effectiveness of its security program.29-May-2015
What is ACAS vulnerability and compliance scanning?
The Assured Compliance Assessment Solution (ACAS) is the mandated enterprise vulnerability scanning capability for networks and components that are owned or operated by the Department of Defense (DoD).
Is ACAS Tenable?
Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), announced today it has been selected by the Defense Information Systems Agency (DISA) as the Assured Compliance Assessment Solution (ACAS).20-Apr-2012
What is DISA ACAS?
ACAS is an integrated software solution providing automated network vulnerability scanning, configuration assessment, and network discovery-highlighted by a suite of products to include the Security Center, Nessus Scanner and the Nessus Network Monitor. ...03-Sept-2019
How do you use ACAS?
0:144:06Ask ACAS - Tip 1: The 800-53 Dashboard for Configuration AuditingYouTubeStart of suggested clipEnd of suggested clipFamilies and their associated checks. This dashboard is based on revision 4 and can be customMoreFamilies and their associated checks. This dashboard is based on revision 4 and can be custom tailored to remove any checks which aren't applicable to your network.
What is ACAS training?
Assured Compliance Assessment Solution training courses offered globally. ... The course will provide ACAS Security Center users with the skills and knowledge necessary to discover and report relevant security information using ACAS products.27-Jun-2017
Is ACAS a government body?
Acas is an independent public body that receives funding from the government. We provide free and impartial advice to employers, employees and their representatives on: employment rights. best practice and policies.
How long is ACAS conciliation?
If early conciliation doesn't lead to an agreement, you'll always have at least 1 month after it ends to make your claim to a tribunal. Sometimes, you'll have more than 1 month because starting early conciliation extends the deadline for making a claim. Early conciliation lasts up to 6 weeks.
What is ACAS quizlet?
ACAS is a network-based security compliance and assessment capability designed to provide awareness of the security posture and network health of DoD networks. ... ACAS is a system that monitors and corrects vulnerabilities to provide security for the DoD networks.
What is a STIG Checklist?
DISA's Security Technical Implementation Guide (STIG) is the basis for evaluation of the security of all government applications. The STIG is intended to be used throughout the life cycles of these applications in order to provide security assurance for these applications.30-Sept-2020
What is Vulnerator?
The Mission. Vulnerator has been designed to assist U.S. Department of Defense (DoD) cybersecurity analysts with the daunting task of consolidating vulnerability data from the numerous sources that have been mandated: The Assured Compliance Assessment Solution (ACAS)
What is Nessus scanner?
Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.
What components of ACAS are used to monitor load?
The two components of ACAS you’ll have to monitor for load are Nessus and PVS. Nessus is considered the active scanner while PVS is passive.
What is a security center?
Security Center (SC) is the central management console for the configuration of Nessus & PVS. SC can collect scan data from all PVS and Nessus instances to provide custom dashboard and reports. One of the neat features of SC is the ability to roll-up SC instances for reporting purposes. This allows the DoD to deploy SC at various levels with all of them reporting to one or more main SC instances. As you can imagine, this reporting capability can be very beneficial as leadership now has the ability to view policy, vulnerability compliance, and total IT assets across the enterprise. Assessing the security posture of the DoD’s infrastructure is now easier than ever.
What is Nessus scanner?
Nessus is the scanning component of ACAS that is compliant with not only CVE vulnerability identifiers, but also DISA STIGs. This is one of the main advantages of Nessus over DoD’s previous scanner, Retina. In the DoD world, the compliance with STIGS is just as important as the compliance with software vulnerabilities.
What is passive vulnerability scan?
The main purpose of Passive Vulnerability Scanner (PVS) is to monitor network traffic at the packet level. While Nessus monitors device vulnerabilities, PVS monitors the network traffic traversing your network for vulnerabilities. Please note that PVS is not an IDS and does not replace one in your network. PVS provides the ability to discover new hosts added to a network, find out which ports are passing traffic across the network, identify when applications are compromised, and monitor mobile devices connected to your network.
What is an ACAS?
Written by Jeremy Galliani on May 29, 2015. The Assured Compliance Assessment Solution (ACAS) is a suite of COTS applications that each meet a variety of security objectives and was developed by Tenable.
Is Nessus an active scanner?
Nessus is considered the active scanner while PVS is passive. However, PVS by virtue of network probing can in many cases put more load on your network than running a typical Nessus scan. The DoD continues to develop their comprehensive security program to account for the ever changing cyber threat landscape.
Is PVS an IDS?
Please note that PVS is not an IDS and does not replace one in your network. PVS provides the ability to discover new hosts added to a network, find out which ports are passing traffic across the network, identify when applications are compromised, and monitor mobile devices connected to your network.
What is ACAS software?
Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with contracts awarded to Tenable and Hewlett Packard Enterprise Services to improve cybersecurity within the DoD. It is mandated by regulations for all DoD agencies and is deployed via download. Part of the ACAS software monitors passive network traffic, new network hosts, and applications that are vulnerable to compromise. It also generates required reports and data that are remotely accessible, with a centralized console, and is Security Content Automation Protocol (SCAP) compliant. The Defense Information Systems Agency 's Cyber Development (CD) provides program management and support in the deployment of ACAS. The Army's Systems Engineering and Integration Directorate said in 2016 that ACAS gives the Army "a clear, specific and timely picture of cyber vulnerabilities and how they are being addressed. Not only does the technology streamline processes at the operator level, it also enables broader goals such as the Cybersecurity Scorecard and automated patching for improved mission assurance."
When was ACAS implemented?
ACAS was implemented by the DoD in 2012, with contracts awarded to Tenable, Inc. (then known as Tenable Network Security) and Hewlett Packard Enterprise Services to improve cybersecurity within the DoD. It is mandated by regulations for all DoD agencies and is deployed via download.
History of the QCD scan policy
When I first started working with Nessus and SecurityCenter, I scanned using vulnerability and compliance scans. Often, when scanning systems for the first time, I had authentication issues. I would make changes and then rerun the vulnerability scan.
Building the scan
The custom QCD (Advanced) scan policy can be built by selecting a few individual plugins. The QCD scan pulls plugins from three families: General, Settings, and Windows.
Seeing the results
Two dashboard templates are helpful in looking at scan issues and the results from the QCD scans. The Credentialed Windows Scanning and Credentialed Linux Scanning dashboard display many of these plugin results. Remember to refresh the element after running the scan.
Summary
Try the Quick Credential Debug scan to rapidly solve your scan access issues while reducing impact on the target systems. And share your observations with us at the Tenable Community!
Ron Meldau
Ron Meldau is a Security Instructor, providing training to Tenable’s customers, partners, and employees. He has over 6 years’ experience teaching at Tenable and IBM. Ron has also administered corporate networks and systems, most recently protecting critical infrastructure on the power grid.
Are You Vulnerable to the Latest Exploits?
Enter your email to receive the latest cyber exposure alerts in your inbox.
What are the ACAS data elements?
They are: shipper name and address, consignee name and address, cargo description, total quantity based on the smallest external packing unit, total weight of cargo, and air waybill number. As explained above in Section III.C., each of these six data elements provides CBP with crucial information needed to target and identify high-risk cargo before it is loaded onto an aircraft destined to the United States. CBP has determined that when taken together, these six data elements, if provided within the ACAS time frame, will enable CBP to perform an effective risk assessment. Based on the ACAS pilot, CBP believes that ACAS filers will be able to provide this data in a consistent, timely, and reasonably accurate manner.
What is ACAS data?
The ACAS data for the ACAS program is a subset of the 19 CFR 122.48 a data. [ 24] It differs slightly from the ACAS pilot data. After an evaluation of the ACAS pilot, CBP determined that some improvements and additions to the data were needed. The ACAS data for the program is listed in the new 19 CFR 122.48 b (d). As discussed below, some of the data is mandatory, one data element is conditional and other data elements are optional. ACAS data will only be used to the extent consistent with the Trade Act.
What is ACAS in aviation?
To address ongoing aviation security threats, U.S. Customs and Border Protection (CBP) is amending its regulations pertaining to the submission of advance air cargo data to implement a mandatory Air Cargo Advance Screening (ACAS) program for any inbound aircraft required to make entry under the CBP regulations that will have commercial cargo aboard. The ACAS program requires the inbound carrier or other eligible party to electronically transmit specified advance cargo data (ACAS data) to CBP for air cargo transported onboard U.S.-bound aircraft as early as practicable, but no later than prior to loading of the cargo onto the aircraft. The ACAS program enhances the security of the aircraft and passengers on U.S.-bound flights by enabling CBP to perform targeted risk assessments on the air cargo prior to the aircraft's departure for the United States. These risk assessments will identify and prevent high-risk air cargo from being loaded on the aircraft that could pose a risk to the aircraft during flight.
What is the CBP ACAS?
In addition, CBP, in collaboration with TSA and the air cargo industry, began operating a voluntary Air Cargo Advance Screening (ACAS) pilot in December 2010 to collect certain advance air cargo data earlier in the supply chain.
What is TSA security?
With respect to air cargo security, TSA is charged, among other things, with ensuring and regulating the security of inbound air cargo, including the screening of 100% of international air cargo inbound to the United States on passenger aircraft . This screening mandate, established by the Implementing Recommendations of the 9/11 Commission Act (9/11 Act) of August 2007, requires that TSA ensure all cargo transported onboard passenger aircraft operating to, from, or within the United States is physically screened at a level commensurate with the screening of passenger checked baggage. To achieve this, TSA is authorized to issue security requirements for U.S. and foreign air carriers at non-U.S. locations for flights inbound to the United States. [ 12]
What is CBP risk assessment?
CBP uses a risk assessment strategy to target cargo that may pose a security risk. Upon receipt of the advance air cargo data in the specified time frames, CBP analyzes the data at the U.S. port of entry where the cargo is scheduled to arrive utilizing ATS to identify potential threats.
What is the CBP EDI system?
2071 note), authorizes CBP to promulgate regulations providing for the mandatory transmission of cargo information by way of a CBP-approved electronic data interchange (EDI) system before the cargo is brought into or departs the United States by any mode of commercial transportation. The required cargo information is that which is reasonably necessary to enable high-risk cargo to be identified for purposes of ensuring cargo safety and security pursuant to the laws enforced and administered by CBP.
