CCE Home Common Configuration Enumeration: Unique Identifiers for Common System Configuration Issues
CCE Website is in "Archive" status — read the announcement
 

      

About CCE Entries — Archive

Introduction

CCE Entries (also called "CCEs," "CCE Identifiers," and "CCE-IDs") provide unique, common identifiers to configuration issues. A configuration issue may be a configuration statement that specifies a preferred or required setting or policy for a computer system, or a configuration control such as a particular registry key, file, or GPO setting.

Every CCE entry includes descriptive elements that describe the CCE in a human-understandable manner. This consists of a textual description of the configuration element (with no specific recommendation) and the logical parameter values that might be associated with the control. For example, logical parameters might include "enabled" or "disabled" but not the actual storage values associated with these conceptual values. Each CCE entry also includes links to associated technical mechanisms (files, users, registry keys, permission bits), and references (prose statements, XCCDF, audit checks).

Specifically, each entry on the CCE List contains the following:

  • CCE Identifier Number — "CCE-2715-1"
  • Description — a humanly understandable description of the configuration issue
  • Conceptual Parameters — parameters that would need to be specified in order to implement a CCE on a system
  • Associated Technical Mechanisms — for any given configuration issue there may be one or more ways to implement the desired result
  • References — pointers to the specific sections of the documents or tools in which the configuration issue is described in detail

See the CCE List Key on the CCE List page for detailed descriptions of each component.

CCE IDENTIFIER NUMBER FORMAT

Example: CCE-2715-1

CCE = the type of identifier

2715 = the identifier, which is random and non-descriptive

1 = a check digit produced according to the Luhn Check Digit Algorithm, which can be used to detect common transcription errors

Configuration issues can be found in a variety of repositories such as security guides, benchmarks, vendor guidance and documentation, configuration assessment and management tools, and consolidated reporting systems. CCE facilitates fast, accurate correlation between elements in these domains by assigning a unique name to each atomic configuration issue.

Example:

  • CCE-3177-3, CCE-3551-9, CCE-3229-2, CCE-2986-8
  • Definition: The "account lockout threshold" setting should be configured correctly.
  • Parameters: Number of attempts.

In general, the scope of CCE-IDs is determined by the ability of an automated process to check the parameter of a particular configuration issue. For example, if a configuration statement can be verified by an assessment tool or applied by configuration management system, it should be assigned a CCE-ID.

Configuration Issues that Should Get CCEs

  • The required permissions for the directory %SystemRoot%\System32\Setup should be assigned.
  • The "account lockout threshold" setting should be configured correctly.
  • The startup type of the Remote Shell service should be set correctly.

The examples above are able to be verified automatically and can be set and checked using automated scripts, programs, or OS functions. These do not require any human effort in order to verify or interpret, and therefore can all be assigned CCE-IDs.

Configuration Issues that Should NOT Get CCEs

  • Never add user passwords to the users.conf file through a text editor.
  • The computer is stored in a locked room.
  • Use strong passwords.

There are several reasons why a configuration issue might not be assigned a CCE entry. For example, configuration statements that are effectively impossible to verify such as verifying the methods that a user might use to edit users.conf would require a substantial effort and is non-trivial without finer accountability systems within operating systems. Also, statements that require substantial human interpretation in order to be technically implemented are not assigned a CCE entry such as the statement "Use strong passwords", which is ambiguous and different analysts will interpret its technical meaning differently.

Example:

For Microsoft Windows XP, CCE would replace the statement "Use strong passwords" with these five statements:

  • The "minimum password age" setting should meet minimum requirements. (CCE-2439-8)
  • The "minimum password length" setting should meet minimum requirements. (CCE-2981-9)
  • The "password must meet complexity requirements" setting should be configured correctly. (CCE-2735-9)
  • The "enforce password history" setting should meet minimum requirements. (CCE-2994-2)
  • The "store password using reversible encryption for all users in the domain" setting should be configured correctly. (CCE-2889-4)

See CCE Editorial Policies for additional information.

BACK TO TOP

Conceptual Parameters

CCE conceptual parameters identify the possible values a configuration control might have at a conceptual level. For example, CCE considers the two statements below to be comparable as they are both about the same setting, the "Account logon lockout threshold".

Example Configuration Statements:

  • Source: DISA Gold Disk Tool for Windows 2000
  • Statement: Account logon lockout threshold = 3
  • Source: CIS Level 1 Benchmark for Windows 2000
  • Statement: Account logon lockout threshold = 50

These two statements differ only in the particular value for that setting asserted by the different guide authors. To capture this, CCE treats the number of maximum logon attempts as a parameter. The resulting CCE entry is:

Example CCE:

  • CCE-3665-7, CCE-3124-5
  • Definition: The maximum number of failed login attempts should meet minimum requirements.
  • Parameter: Maximum number of attempts.

It is important to note that the definition is written to be agnostic towards a specific recommended parameter value. CCE attempts to capture all potential values a configuration statement might encompass in a set of parameters.

See CCE Editorial Policies for additional information.

BACK TO TOP

Technical Mechanisms

CCE technical mechanisms describe the underlying technical control(s) used to affect the desired change on the system as indicated by the configuration control. The following examples are for Windows Vista.

Example Technical Mechanisms:

  • Windows Registry Key:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
    FirewallPolicy\StandardProfile\Logging\LogDroppedPackets

  • GPO Template:

    Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall\Standard Profile\Windows Firewall: Allow Logging - Log Dropped Packets

  • Windows Firewall Settings:

    Control Panel\Windows Firewall\Advanced\Security Logging\Logging Options\ Log dropped packets

These examples illustrate that there are at least three methods for setting the "Log Dropped Packets" option in the Windows Firewall: (1) by making direct registry key edits, (2) by using the GPO editor, or (3) by using the Windows Firewall tool interface. While there are subtle reasons why an administrator would choose one method over another, there is agreement that each of these methods is accomplishing a comparable goal. Within CCE, these statements represent three comparable technical mechanisms for the same CCE.

Example CCE:

  • CCE-3280-5
  • Definition: The "Log Dropped Packets" option for the Windows Firewall should be configured correctly for the Standard Profile.
  • Parameter: Enabled or Disabled.
  • Technical Mechanisms:
    • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
      FirewallPolicy\StandardProfile\Logging\LogDroppedPackets
    • Computer Configuration\Administrative Templates\Network\Network Connections\Windows Firewall\Standard Profile\Windows Firewall: Allow Logging - Log Dropped Packets
    • Control Panel\Windows Firewall\Advanced\Security Logging\Logging Options\ Log dropped packets

See CCE Editorial Policies for additional information.

BACK TO TOP

Platform Groups

A CCE "platform group" roughly identifies the operating system or application to which a CCE entry applies. CCE’s platform groups adhere to the same level of granularity commonly found in security configuration guidance that are written for individual platforms, as well as in the sets of checks and other features found in configuration audit and management tools. They are a set of high-level "buckets" that imply a particular CCE is "related to" the OS or application named by the platform group. These groups are meant for human interpretation, and are not definitive declarations of a CCE entry’s relation to a particular platform.

CCE Platform Group Examples:

  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
  • Microsoft Internet Explorer 7
  • Microsoft Office 2007
  • Red Hat Enterprise Linux 4
  • Red Hat Enterprise Linux 5
  • Sun Solaris 9
  • Sun Solaris 10

Each CCE entry is assigned a single platform group. Similar configuration issues that cross the CCE platform groups are assigned separate CCE-IDs. For example, Windows 2000 is distinguished from Windows XP, but Windows XP pre-Service Pack 2 and Windows XP post-Service Pack 2 are not distinguished.

In general, assignment of CCE entries to CCE platform groups are as follows:

  1. If the statement comes from an OS-oriented source and concerns an OS construct, it will be assigned the associated OS platform group.
  2. If the statement comes from an application-oriented source and concerns the application itself, it will be assigned the associated application platform group.
  3. If the statement comes from an OS-oriented source and clearly concerns an application for which no CCE platform group has been created (e.g., Microsoft Telnet, Bind), then it will be assigned to the OS platform group.
  4. If the statement comes from an OS-oriented source and clearly concerns an application for which a CCE platform group has been created (e.g., Microsoft Internet Explorer), then it will be assigned to the corresponding application platform group.
  5. If the statement comes from an application-oriented guide and clearly concerns a configuration control within the base OS, then it will be assigned the to the OS application group.
  6. All other assignments will be at the discretion of the CCE Moderator (currently MITRE).

BACK TO TOP

Additional Information

For additional information about CCE entries see CCE Entry Creation Process and CCE Editorial Policies

BACK TO TOP

      

Page Last Updated: March 22, 2013