Re: [Cacao] Updated Charter version 03

Allan Thomson <athomson@lookingglasscyber.com> Sun, 10 March 2019 17:43 UTC

Return-Path: <athomson@lookingglasscyber.com>
X-Original-To: cacao@ietfa.amsl.com
Delivered-To: cacao@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C45612423B for <cacao@ietfa.amsl.com>; Sun, 10 Mar 2019 10:43:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=lookingglasscyber.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OaL7u-PlB-YR for <cacao@ietfa.amsl.com>; Sun, 10 Mar 2019 10:43:34 -0700 (PDT)
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-eopbgr810053.outbound.protection.outlook.com [40.107.81.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC0381240D3 for <cacao@ietf.org>; Sun, 10 Mar 2019 10:43:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lookingglasscyber.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OfOp3u6Y4p4mApEoNzGi83ONP2/BJu43Hp3HU/9/mSY=; b=TzzJdtiJSDlX8fu0DbilERL8UEM0agE9telgBAJ0ZhUCzWe2bDKOewDsg8oudfTebKVPFq6AWxQ56wmqNe1kN3rAtx41KB8qfh2YGIDILwUJcHHNWPwfsnf6Z2UrbgHqUSiK+/3yZ/9n59JV481jaT2REgHRI76uQviM9aKtHJo=
Received: from MW2PR18MB2137.namprd18.prod.outlook.com (52.132.182.156) by MW2PR18MB2217.namprd18.prod.outlook.com (52.132.183.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1686.19; Sun, 10 Mar 2019 17:43:29 +0000
Received: from MW2PR18MB2137.namprd18.prod.outlook.com ([fe80::3d55:1718:775e:64f0]) by MW2PR18MB2137.namprd18.prod.outlook.com ([fe80::3d55:1718:775e:64f0%6]) with mapi id 15.20.1686.021; Sun, 10 Mar 2019 17:43:29 +0000
From: Allan Thomson <athomson@lookingglasscyber.com>
To: Qin Wu <bill.wu@huawei.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Bret Jordan <jordan.ietf@gmail.com>, "cacao@ietf.org" <cacao@ietf.org>
CC: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
Thread-Topic: [Cacao] Updated Charter version 03
Thread-Index: AdTXRPS6kux6lbfuSxeP2IbxEyX1cv//0kaA
Date: Sun, 10 Mar 2019 17:43:28 +0000
Message-ID: <AFE9DA48-DA60-4B87-B74E-342BDE97C7F2@lookingglasscyber.com>
References: <B8F9A780D330094D99AF023C5877DABA9B2CB3E8@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9B2CB3E8@nkgeml513-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.16.1.190220
authentication-results: spf=none (sender IP is ) smtp.mailfrom=athomson@lookingglasscyber.com;
x-originating-ip: [69.181.82.213]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 896a2972-378a-4e59-aebb-08d6a57fe828
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:MW2PR18MB2217;
x-ms-traffictypediagnostic: MW2PR18MB2217:
x-ms-exchange-purlcount: 2
x-microsoft-exchange-diagnostics: 1;MW2PR18MB2217;23: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
x-microsoft-antispam-prvs: <MW2PR18MB22173ECFE7D2DE3F32F355C6DA4F0@MW2PR18MB2217.namprd18.prod.outlook.com>
x-forefront-prvs: 0972DEC1D9
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(366004)(346002)(396003)(39840400004)(376002)(78114003)(149574003)(199004)(189003)(66066001)(99286004)(36756003)(110136005)(2906002)(2616005)(316002)(58126008)(476003)(486006)(446003)(11346002)(15650500001)(2420400007)(106356001)(105586002)(6506007)(53546011)(7110500001)(26005)(6116002)(186003)(14454004)(606006)(97736004)(102836004)(68736007)(3846002)(966005)(81156014)(8676002)(81166006)(10710500007)(82746002)(76176011)(7736002)(8936002)(30864003)(86362001)(6436002)(53936002)(229853002)(71190400001)(71200400001)(6246003)(5660300002)(83716004)(53946003)(33656002)(66574012)(478600001)(4326008)(236005)(2501003)(6512007)(6486002)(25786009)(54896002)(6306002)(256004)(14444005)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:MW2PR18MB2217; H:MW2PR18MB2137.namprd18.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: lookingglasscyber.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: lfu0C166c81Fv9Okr5DUkGo9OOyXjJN7d0GWwUuxZapBXos3LeAxAmreypd7ljg2TYyD3QkY+rlT9c71kcE9kYthIvEEZfEicw9ZbetSQ0tq8PAlX/sYe1TDR2ARk35F/uFm5Iomd8p54FC37ArcV3a8fq2jekWuMzhAAxLWKr/c2CKuhWtIzRnqqvJCVPQkEo2vuLbrltGio77SyUrf0R/a7oqnW1mQglAIxJRQhvKLLXwJuOltjkK71wplryBaxxtu57PV8yg097NTtWbLtYqt7DLTMhRFXuOBVZCiw5jOM7DChQJguMGIba9+LswhgOOx44T9zj/QgkV+oflSVF8RauBQHmSgsSupSxqsgRepVY3SbxJJZNIt97RWcUKtVgnZQLIvTcLdeJQ6+BcVmXGcl4mmOCMa+rw7ifMBB7I=
Content-Type: multipart/alternative; boundary="_000_AFE9DA48DA604B87B74E342BDE97C7F2lookingglasscybercom_"
MIME-Version: 1.0
X-OriginatorOrg: lookingglasscyber.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 896a2972-378a-4e59-aebb-08d6a57fe828
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2019 17:43:29.2302 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 11622456-b9ab-4329-8602-bf364508a848
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR18MB2217
Archived-At: <https://mailarchive.ietf.org/arch/msg/cacao/bxwz7q0oV3KPOwg3PSiCUWSRssg>
Subject: Re: [Cacao] Updated Charter version 03
X-BeenThere: cacao@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Collaborative Automated Course of Action Operations <cacao.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cacao>, <mailto:cacao-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cacao/>
List-Post: <mailto:cacao@ietf.org>
List-Help: <mailto:cacao-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cacao>, <mailto:cacao-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Mar 2019 17:43:39 -0000

  1.  Each collaborative course of action will consist of a sequence of cyber defense actions
[Med] delete “cyber” (and in other parts of the text).



AT: Disagree with this suggestion. CACAO is focused on solving a cyber defense response. Removing cyber will cause confusion to what is the true intent of this work. Previous comments received were clear that making sure this work is focused on Cyber is important and I agree with that perspective. Unless you intend to broaden the scope of this work then I suggest we keep the term cyber.
               [Qin]: Cyber attack may be perfect use case for collaborative course of action, but I assume ansible playbook has other network management automation use cases. Limit the scope to cyber attack is too   restrictive, in my opinion.

AT: The cyber security challenges are immense. It is true that this technology could be extended to consider other non-security use cases but trying to solve an even broader solution set when the cyber security solution is already huge will likely just result in failure for all use cases. My suggestion would be that we focus on cybersecurity and after we have *successful* defined something that is both workable and *implemented* by products in the marketplace then it is worthwhile considering how CACAO can be extended for non-security use cases.


  - Identify and document the requirements to effectively report and alert on the deployment of CACAO actions and the potential threat response to those actions

 [Med] I’m not sure I would maintain this one as a separate item. I suggest to merge this item with the previous one. It is too early to decide whether one or more protocols will be required.


                AT: Respectfully, I disagree. We want to make it clear that we need a protocol for these different functions. If the group decides that a single protocol can support the requirements for both provisioning and monitoring/reporting later on then it is easy to state that. However, by removing the reporting/monitoring requirements we are losing an important aspect of the work. On balance I think it is better to keep them separate for now and combine later on once everyone is on the same page regarding the requirements and how they are met.

[Qin]: Agree with Med, I am wondering COMI, NETCONF, RESTCONF, is not enough?

AT: No one has suggested what the solution is right now. We are discussing requirements and making sure requirements are clearly defined and agreed before we discuss what would solve those requirements. The charter is about requirements and making sure those requirements are clearly defined. Combining the 2 items (provisioning vs monitoring/reporting) into 1 item suggests an implementation or solution when that is neither the goal or intent of a requirement definition.

Allan

From: Qin Wu <bill.wu@huawei.com>
Date: Sunday, March 10, 2019 at 6:27 AM
To: Allan Thomson <athomson@lookingglasscyber.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, Bret Jordan <jordan.ietf@gmail.com>, "cacao@ietf.org" <cacao@ietf.org>
Cc: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
Subject: RE: [Cacao] Updated Charter version 03

Hi,

发件人: Cacao [mailto:cacao-bounces@ietf.org] 代表 Allan Thomson
发送时间: 2019年3月9日 0:12
收件人: mohamed.boucadair@orange.com; Bret Jordan <jordan.ietf@gmail.com>; cacao@ietf.org
抄送: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com>
主题: Re: [Cacao] Updated Charter version 03

Mohamed –

A couple of responses to your input.


  1.  verify they were correctly executed, or easily share them across organizational boundaries and technology stacks.
[Med] Why “and technology stacks” is mentioned here?


AT: The intention is that CACAO works across different implementations and does not require a specific programming language or operating system as examples. That is what is intended ‘across technology stacks’.



  1.  Each collaborative course of action will consist of a sequence of cyber defense actions
[Med] delete “cyber” (and in other parts of the text).



AT: Disagree with this suggestion. CACAO is focused on solving a cyber defense response. Removing cyber will cause confusion to what is the true intent of this work. Previous comments received were clear that making sure this work is focused on Cyber is important and I agree with that perspective. Unless you intend to broaden the scope of this work then I suggest we keep the term cyber.
               [Qin]: Cyber attack may be perfect use case for collaborative course of action, but I assume ansible playbook has other network management automation use cases. Limit the scope to cyber attack is too   restrictive, in my opinion.

  1.  CACAO Protocol Specification

  - Specify and standardize the configuration for at least one protocol that can be used to distribute courses of action in both a direct delivery and publish-subscribe method

- CACAO Distribution and Response Application Layer Protocol

  - Identify and document the requirements to effectively report and alert on the deployment of CACAO actions and the potential threat response to those actions

 [Med] I’m not sure I would maintain this one as a separate item. I suggest to merge this item with the previous one. It is too early to decide whether one or more protocols will be required.


                AT: Respectfully, I disagree. We want to make it clear that we need a protocol for these different functions. If the group decides that a single protocol can support the requirements for both provisioning and monitoring/reporting later on then it is easy to state that. However, by removing the reporting/monitoring requirements we are losing an important aspect of the work. On balance I think it is better to keep them separate for now and combine later on once everyone is on the same page regarding the requirements and how they are met.

[Qin]: Agree with Med, I am wondering COMI, NETCONF, RESTCONF, is not enough?

  1.  that can be executed by the various systems that can act on those actions. Further, these COAs will be coordinated and deployed across heterogeneous cyber security systems such that both the actions requested and the resultant outcomes may be verified. These COA actions will be referenceable in a connected data structure like the OASIS STIX V2 model that provides support for connected data such as threat actors, campaigns, intrusion sets, malware, attack patterns, and other adversarial techniques, tactics, and procedures (TTPs).

[Med] delete « TTPs ».

AT: TTPs are an important cyber construct that provides valuable context to this sentence. They are in addition to the other terms such as campaigns, intrusion sets, ….etc and an important aspect to be considered. STIX2 data model is very explicit on how TTPs are important to the overall threat analysis and mitigation. Suggest we keep unless you are suggesting that TTPs are not important?

Allan Thomson
CTO (+1-408-331-6646)
LookingGlass Cyber Solutions<http://www.lookingglasscyber.com/>

From: Cacao <cacao-bounces@ietf.org<mailto:cacao-bounces@ietf.org>> on behalf of "mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>" <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Date: Thursday, March 7, 2019 at 11:06 PM
To: Bret Jordan <jordan.ietf@gmail.com<mailto:jordan.ietf@gmail.com>>, "cacao@ietf.org<mailto:cacao@ietf.org>" <cacao@ietf.org<mailto:cacao@ietf.org>>
Cc: JACQUENET Christian TGI/OLN <christian.jacquenet@orange.com<mailto:christian.jacquenet@orange.com>>
Subject: Re: [Cacao] Updated Charter version 03

Hi Bret,

Thank you for taking my comments shared on an earlier version of the draft charter.

Please see inline.

Cheers,
Med

De : Cacao [mailto:cacao-bounces@ietf.org] De la part de Bret Jordan
Envoyé : vendredi 1 février 2019 00:54
À : cacao@ietf.org<mailto:cacao@ietf.org>
Objet : [Cacao] Updated Charter version 03

All,

Thanks for all of the great feedback on the charter text.  We have updated the document to address all comments that we have received and are releasing a new version of the text.  You can see it here: https://datatracker.ietf.org/doc/draft-jordan-cacao-charter/ and copied below.


### BEGIN

# Introduction
To defend against threat actors and their tactics, techniques, and procedures, organizations need to manually identify, create, and document prevention, mitigation, and remediation steps.
[Med]
OLD:
  need to manually identify, create, and document prevention, mitigation, and remediation steps
NEW
 usually identify, create, document, and update prevention, mitigation, and remediation steps.

These steps when grouped together into a course of action (COA) / playbook are used to protect systems, networks, data, and users. The problem is, once these steps have been created there is no standardized and structured way to document them,

[Med] s/to document them/ to document and udpate them

verify they were correctly executed, or easily share them across organizational boundaries and technology stacks.

[Med] Why “and technology stacks” is mentioned here?

This working group will create a standard that implements the playbook model based on current industry best practices for cybersecurity.
[Med] s/cybersecurity/security

This solution will specifically enable:

1. the creation and documentation of COAs in a structured machine-readable format
2. organizations to perform attestations on COAs
3. the sharing and distribution of COAs across organizational boundaries and technology stacks
[Med] s/ organizational boundaries and technology stacks/boubndaries.
4. the verification of deployed COAs.



This solution will contain (at a minimum) a standard JSON based data model
[Med] I would vote for YANG as a data model (it can be augmented, obsoleted, etc.). Mapping to JSON is straightforward. We don’t need IMO to pick a protocol in the charter.

, a defined set of functional capabilities and associated interfaces, and a mandatory to implement protocol. This solution will also provide a data model for actuators to confirm the status of the COA execution,
[Med] I’m not sure if that part of the architecture will require a specific data model or if protocol-related considerations are to be taken into account. I suggest to make this change:

s/provide a data model for actuators/ provide means for actuators.

however, it will be agnostic of how the COA is implemented by the actuator.
[Med] This text is redundant with “The working group will not consider how shared actions are used/enforced”

Each collaborative course of action will consist of a sequence of cyber defense actions
[Med] delete “cyber” (and in other parts of the text).

that can be executed by the various systems that can act on those actions. Further, these COAs will be coordinated and deployed across heterogeneous cyber security systems such that both the actions requested and the resultant outcomes may be verified. These COA actions will be referenceable in a connected data structure like the OASIS STIX V2 model that provides support for connected data such as threat actors, campaigns, intrusion sets, malware, attack patterns, and other adversarial techniques, tactics, and procedures (TTPs).

[Med] delete « TTPs ».


Where possible the working group will consider existing efforts, like OASIS OpenC2 and IETF I2NSF that define the atomic actions to be included in a process or sequence.
[Med] What is meant by “process” here?

The working group will not consider how shared actions are used/enforced, except where a response is expected for a specific action or step.
[Med] Detete “step”.

# Goals and Deliverables
This working group has the following major goals and deliverables. Some of the deliverables may be published through the IETF RFC stream as informational or standards track documents.

- CACAO Use Cases and Requirements
  - Specify the use cases and requirements
- CACAO Functional Architecture: Roles and Interfaces
  - Specify the system functions and roles that are needed to enable Collaborative Courses of Action
- CACAO Protocol Specification
  - Specify and standardize the configuration for at least one protocol that can be used to distribute courses of action in both a direct delivery and publish-subscribe method
- CACAO Distribution and Response Application Layer Protocol
  - Identify and document the requirements to effectively report and alert on the deployment of CACAO actions and the potential threat response to those actions

[Med] I’m not sure I would maintain this one as a separate item. I suggest to merge this item with the previous one. It is too early to decide whether one or more protocols will be required.

- CACAO JSON Data Model
  - Create a JSON data model that can capture and enable collaborative courses of action

[Med] Please update to cover both YANG and JSON.

- CACAO Interoperability Test Documents
  - Define and create a series of tests and documents to assist with interoperability of the various systems involved.

[Med] It would be helpful to scope the work to identify one or two applicability threats that will be used to assess/validate the proposed solution. Instead of the test document, it suggest to have one or more applicability statements focusing on specific attacks.

The working group may decide to not publish the use cases and requirements and test documents as RFCs.. That decision will be made during the lifetime of the working group.




### END


Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."