Re: [Cacao] Updated Charter version 03

Allan Thomson <athomson@lookingglasscyber.com> Fri, 22 March 2019 19:15 UTC

Return-Path: <athomson@lookingglasscyber.com>
X-Original-To: cacao@ietfa.amsl.com
Delivered-To: cacao@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 369651314E7 for <cacao@ietfa.amsl.com>; Fri, 22 Mar 2019 12:15:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=lookingglasscyber.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PbBTSmHMyZgE for <cacao@ietfa.amsl.com>; Fri, 22 Mar 2019 12:15:54 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760082.outbound.protection.outlook.com [40.107.76.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 440511314E3 for <cacao@ietf.org>; Fri, 22 Mar 2019 12:15:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lookingglasscyber.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8fuRHbULJMFNVUcA7EHNeO8qDLCFes3LubXV49MRLwk=; b=dLZVdV/oZc1e/t4fRuWl3X1HeT03htSR+EjbPjmP7lrkDDmZFtBIQkUlc0qNlU/RSKx6cRyli0L0h5gTKoJ9lk3EqeVnklEevmozjN/84u/vlPvasWoC3MWu4xB5duZmTl0xs70CGyamGGtGZfR3ci8NZuUaCETIrkA+w5t3ql8=
Received: from MW2PR18MB2137.namprd18.prod.outlook.com (52.132.182.156) by MW2PR18MB2121.namprd18.prod.outlook.com (52.132.182.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1730.18; Fri, 22 Mar 2019 19:15:48 +0000
Received: from MW2PR18MB2137.namprd18.prod.outlook.com ([fe80::3d55:1718:775e:64f0]) by MW2PR18MB2137.namprd18.prod.outlook.com ([fe80::3d55:1718:775e:64f0%7]) with mapi id 15.20.1730.017; Fri, 22 Mar 2019 19:15:48 +0000
From: Allan Thomson <athomson@lookingglasscyber.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Bret Jordan <jordan.ietf@gmail.com>, "cacao@ietf.org" <cacao@ietf.org>
CC: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
Thread-Topic: [Cacao] Updated Charter version 03
Thread-Index: AQHUucBIVmNRxF79NEGPRLaGuer+kaYBh0OAgAASXgCABKS3MIARSWgwgABWtYA=
Date: Fri, 22 Mar 2019 19:15:48 +0000
Message-ID: <0BBCD40A-5C8F-4089-B265-F9F78F066B35@lookingglasscyber.com>
References: <F53E8B84-2905-4418-A232-FCFFA587135A@gmail.com> <787AE7BB302AE849A7480A190F8B93302EA35D68@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <E27A2E8E-A566-4BFD-B4AF-413DE1F16D58@lookingglasscyber.com> <787AE7BB302AE849A7480A190F8B93302EA37861@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <a927e2f0-05c0-4a9d-9058-f6b644640314@OPEXCAUBM32.corporate.adroot.infra.ftgroup>
In-Reply-To: <a927e2f0-05c0-4a9d-9058-f6b644640314@OPEXCAUBM32.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.17.0.190309
authentication-results: spf=none (sender IP is ) smtp.mailfrom=athomson@lookingglasscyber.com;
x-originating-ip: [69.181.82.213]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4a1e92f3-2831-449e-21d2-08d6aefaca88
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600127)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:MW2PR18MB2121;
x-ms-traffictypediagnostic: MW2PR18MB2121:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MW2PR18MB21213E733A03B3EC88C412FFDA430@MW2PR18MB2121.namprd18.prod.outlook.com>
x-forefront-prvs: 09840A4839
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(39840400004)(396003)(366004)(136003)(53754006)(189003)(199004)(149574003)(2501003)(7110500001)(8936002)(97736004)(99286004)(6116002)(76176011)(36756003)(14454004)(561944003)(25786009)(478600001)(68736007)(10710500007)(33656002)(2906002)(606006)(4326008)(966005)(6246003)(15650500001)(2420400007)(236005)(186003)(66066001)(26005)(53946003)(7736002)(6512007)(6486002)(6436002)(105586002)(66574012)(110136005)(3846002)(71200400001)(54896002)(71190400001)(106356001)(6306002)(30864003)(83716004)(5660300002)(316002)(82746002)(446003)(256004)(476003)(93886005)(53546011)(14444005)(2616005)(102836004)(11346002)(486006)(6506007)(53936002)(229853002)(81166006)(86362001)(81156014)(8676002)(58126008)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:MW2PR18MB2121; H:MW2PR18MB2137.namprd18.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: lookingglasscyber.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: rbJSLP+BI5bW9FzMi1FkjG9MR2pbHVSkEoprvnl2yZh3vNpjCU5C5s3HiZj7bi1n8t31hD5WWHF5ggKYGHop2I94rmrB63pynuwEKZmS0PpN9PQcyZPNxWRzhhOky1hL/SxLI8pCmAFXi/vg/zdX5+JkZMGeDcAD/AfFpJhcMpD0rZcBDAikW7N8AtxMKIjdibsFLdptCJ0R9zwwhjVK8kSknH2Fa3txn99QTDRoRloKT4PXh/tDP4jDJBdZfKVnBw8Y5zqtxA5BN+6YDcew0Us50Q1B5P5tK7eZy4qJyrzjBaGRhJ97thc8P2d4AAW3ujr20H3mYNzi7gOsgjtr/58vws+RacZneW5q0hYFW6r+PkCuHs/Lzv/qZ0SfMpS19IoRTMVX4rhiT3SUCUmec3EJ6+M8/0LCFdhrKKYLBCU=
Content-Type: multipart/alternative; boundary="_000_0BBCD40A5C8F4089B265F9F78F066B35lookingglasscybercom_"
MIME-Version: 1.0
X-OriginatorOrg: lookingglasscyber.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a1e92f3-2831-449e-21d2-08d6aefaca88
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2019 19:15:48.1509 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 11622456-b9ab-4329-8602-bf364508a848
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR18MB2121
Archived-At: <https://mailarchive.ietf.org/arch/msg/cacao/ZCuPbVOZeSKLdTv9pkTZElQJ5IM>
Subject: Re: [Cacao] Updated Charter version 03
X-BeenThere: cacao@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Collaborative Automated Course of Action Operations <cacao.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cacao>, <mailto:cacao-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cacao/>
List-Post: <mailto:cacao@ietf.org>
List-Help: <mailto:cacao-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cacao>, <mailto:cacao-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Mar 2019 19:16:00 -0000

Med – Given the focus has been on the BoF preparation and likely others will comment/share their perspectives also we are not planning to update the charter further until after that.

Allan

From: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Date: Friday, March 22, 2019 at 12:07 AM
To: Allan Thomson <athomson@lookingglasscyber.com>, Bret Jordan <jordan.ietf@gmail.com>, "cacao@ietf.org" <cacao@ietf.org>
Cc: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
Subject: RE: [Cacao] Updated Charter version 03

Hi all,

Any update about integrating the changes into the proposed charter?

Cheers,
Med

De : Cacao [mailto:cacao-bounces@ietf.org] De la part de mohamed.boucadair@orange.com
Envoyé : lundi 11 mars 2019 08:26
À : Allan Thomson; Bret Jordan; cacao@ietf.org
Cc : JACQUENET Christian TGI/OLN
Objet : Re: [Cacao] Updated Charter version 03

Hi Allan,

Thank you for the follow-up.

Please see inline.

Cheers,
Med

De : Allan Thomson [mailto:athomson@lookingglasscyber.com]
Envoyé : vendredi 8 mars 2019 17:12
À : BOUCADAIR Mohamed TGI/OLN; Bret Jordan; cacao@ietf.org
Cc : JACQUENET Christian TGI/OLN
Objet : Re: [Cacao] Updated Charter version 03

Mohamed –

A couple of responses to your input.


  1.  verify they were correctly executed, or easily share them across organizational boundaries and technology stacks.
[Med] Why “and technology stacks” is mentioned here?


AT: The intention is that CACAO works across different implementations and does not require a specific programming language or operating system as examples. That is what is intended ‘across technology stacks’.



[Med] Protocol specifications do not make an assumption on the programming language or OS. What is really key for CACAO is to share across administrative boundaries. How this is implemented is local to each domain. I still don’t see the need to mention “and technology stacks” in that sentence.



  1.  Each collaborative course of action will consist of a sequence of cyber defense actions
[Med] delete “cyber” (and in other parts of the text).



AT: Disagree with this suggestion. CACAO is focused on solving a cyber defense response. Removing cyber will cause confusion to what is the true intent of this work. Previous comments received were clear that making sure this work is focused on Cyber is important and I agree with that perspective. Unless you intend to broaden the scope of this work then I suggest we keep the term cyber.

[Med] Glad to see that we both agree on the need to have a restricted scope (as suggested in my proposal to select few applicability use cases). Nevertheless, “cyber” is hinting more vagueness to me than precise/restricted scope.


  1.  CACAO Protocol Specification

  - Specify and standardize the configuration for at least one protocol that can be used to distribute courses of action in both a direct delivery and publish-subscribe method

- CACAO Distribution and Response Application Layer Protocol

  - Identify and document the requirements to effectively report and alert on the deployment of CACAO actions and the potential threat response to those actions

 [Med] I’m not sure I would maintain this one as a separate item. I suggest to merge this item with the previous one. It is too early to decide whether one or more protocols will be required.


                AT: Respectfully, I disagree. We want to make it clear that we need a protocol for these different functions.

[Med] That can be easily added as an item under “CACAO Protocol Specification”.

If the group decides that a single protocol can support the requirements for both provisioning and monitoring/reporting later on then it is easy to state that.

[Med] The current language and structure seem to make a call. I do suggest we adopt something more neutral.

However, by removing the reporting/monitoring requirements we are losing an important aspect of the work.
[Med] That wasn’t my proposal.

On balance I think it is better to keep them separate for now and combine later on once everyone is on the same page regarding the requirements and how they are met.




  1.  that can be executed by the various systems that can act on those actions. Further, these COAs will be coordinated and deployed across heterogeneous cyber security systems such that both the actions requested and the resultant outcomes may be verified. These COA actions will be referenceable in a connected data structure like the OASIS STIX V2 model that provides support for connected data such as threat actors, campaigns, intrusion sets, malware, attack patterns, and other adversarial techniques, tactics, and procedures (TTPs).

[Med] delete « TTPs ».

AT: TTPs are an important cyber construct that provides valuable context to this sentence. They are in addition to the other terms such as campaigns, intrusion sets, ….etc and an important aspect to be considered. STIX2 data model is very explicit on how TTPs are important to the overall threat analysis and mitigation. Suggest we keep unless you are suggesting that TTPs are not important?

[Med] The comment was purely editorial. TTP is not used in the text and therefore there is no need to define the acronym. The intent is to keep the text as simple without overloading it with acronyms.


Allan Thomson
CTO (+1-408-331-6646)
LookingGlass Cyber Solutions<http://www.lookingglasscyber.com/>

From: Cacao <cacao-bounces@ietf.org> on behalf of "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Date: Thursday, March 7, 2019 at 11:06 PM
To: Bret Jordan <jordan.ietf@gmail.com>, "cacao@ietf.org" <cacao@ietf.org>
Cc: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
Subject: Re: [Cacao] Updated Charter version 03

Hi Bret,

Thank you for taking my comments shared on an earlier version of the draft charter.

Please see inline.

Cheers,
Med

De : Cacao [mailto:cacao-bounces@ietf.org] De la part de Bret Jordan
Envoyé : vendredi 1 février 2019 00:54
À : cacao@ietf.org
Objet : [Cacao] Updated Charter version 03

All,

Thanks for all of the great feedback on the charter text.  We have updated the document to address all comments that we have received and are releasing a new version of the text.  You can see it here: https://datatracker.ietf.org/doc/draft-jordan-cacao-charter/ and copied below.


### BEGIN

# Introduction
To defend against threat actors and their tactics, techniques, and procedures, organizations need to manually identify, create, and document prevention, mitigation, and remediation steps.
[Med]
OLD:
  need to manually identify, create, and document prevention, mitigation, and remediation steps
NEW
 usually identify, create, document, and update prevention, mitigation, and remediation steps.

These steps when grouped together into a course of action (COA) / playbook are used to protect systems, networks, data, and users. The problem is, once these steps have been created there is no standardized and structured way to document them,

[Med] s/to document them/ to document and udpate them

verify they were correctly executed, or easily share them across organizational boundaries and technology stacks.

[Med] Why “and technology stacks” is mentioned here?

This working group will create a standard that implements the playbook model based on current industry best practices for cybersecurity.
[Med] s/cybersecurity/security

This solution will specifically enable:

1. the creation and documentation of COAs in a structured machine-readable format
2. organizations to perform attestations on COAs
3. the sharing and distribution of COAs across organizational boundaries and technology stacks
[Med] s/ organizational boundaries and technology stacks/boubndaries.
4. the verification of deployed COAs.


This solution will contain (at a minimum) a standard JSON based data model
[Med] I would vote for YANG as a data model (it can be augmented, obsoleted, etc.). Mapping to JSON is straightforward. We don’t need IMO to pick a protocol in the charter.

, a defined set of functional capabilities and associated interfaces, and a mandatory to implement protocol. This solution will also provide a data model for actuators to confirm the status of the COA execution,
[Med] I’m not sure if that part of the architecture will require a specific data model or if protocol-related considerations are to be taken into account. I suggest to make this change:

s/provide a data model for actuators/ provide means for actuators.

however, it will be agnostic of how the COA is implemented by the actuator.
[Med] This text is redundant with “The working group will not consider how shared actions are used/enforced”

Each collaborative course of action will consist of a sequence of cyber defense actions
[Med] delete “cyber” (and in other parts of the text).

that can be executed by the various systems that can act on those actions. Further, these COAs will be coordinated and deployed across heterogeneous cyber security systems such that both the actions requested and the resultant outcomes may be verified. These COA actions will be referenceable in a connected data structure like the OASIS STIX V2 model that provides support for connected data such as threat actors, campaigns, intrusion sets, malware, attack patterns, and other adversarial techniques, tactics, and procedures (TTPs).

[Med] delete « TTPs ».


Where possible the working group will consider existing efforts, like OASIS OpenC2 and IETF I2NSF that define the atomic actions to be included in a process or sequence.
[Med] What is meant by “process” here?

The working group will not consider how shared actions are used/enforced, except where a response is expected for a specific action or step.
[Med] Detete “step”.

# Goals and Deliverables
This working group has the following major goals and deliverables. Some of the deliverables may be published through the IETF RFC stream as informational or standards track documents.

- CACAO Use Cases and Requirements
  - Specify the use cases and requirements
- CACAO Functional Architecture: Roles and Interfaces
  - Specify the system functions and roles that are needed to enable Collaborative Courses of Action
- CACAO Protocol Specification
  - Specify and standardize the configuration for at least one protocol that can be used to distribute courses of action in both a direct delivery and publish-subscribe method
- CACAO Distribution and Response Application Layer Protocol
  - Identify and document the requirements to effectively report and alert on the deployment of CACAO actions and the potential threat response to those actions

[Med] I’m not sure I would maintain this one as a separate item. I suggest to merge this item with the previous one. It is too early to decide whether one or more protocols will be required.

- CACAO JSON Data Model
  - Create a JSON data model that can capture and enable collaborative courses of action

[Med] Please update to cover both YANG and JSON.

- CACAO Interoperability Test Documents
  - Define and create a series of tests and documents to assist with interoperability of the various systems involved.

[Med] It would be helpful to scope the work to identify one or two applicability threats that will be used to assess/validate the proposed solution. Instead of the test document, it suggest to have one or more applicability statements focusing on specific attacks.

The working group may decide to not publish the use cases and requirements and test documents as RFCs.. That decision will be made during the lifetime of the working group.


### END


Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."