I-D Action: draft-ietf-opsawg-sbom-access-18.txt

internet-drafts@ietf.org Fri, 28 April 2023 18:41 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5AA24C1CAB4A; Fri, 28 Apr 2023 11:41:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: opsawg@ietf.org
Subject: I-D Action: draft-ietf-opsawg-sbom-access-18.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 10.1.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: opsawg@ietf.org
Message-ID: <168270728434.50055.14139324263270906984@ietfa.amsl.com>
Date: Fri, 28 Apr 2023 11:41:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/aGk8pP2jsAVbYCZG9hhGw2lo8bU>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.39
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Apr 2023 18:41:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Operations and
Management Area Working Group (OPSAWG) WG of the IETF.

   Title           : Discovering and Retrieving Software Transparency and Vulnerability Information
   Authors         : Eliot Lear
                     Scott Rose
   Filename        : draft-ietf-opsawg-sbom-access-18.txt
   Pages           : 21
   Date            : 2023-04-28

Abstract:
   To improve cybersecurity posture, automation is necessary to locate
   the software a device is using, and whether that software has known
   vulnerabilities, and what, if any recommendations suppliers may have.
   This memo extends the MUD YANG schema to provide the locations of
   software bills of materials (SBOMS) and to vulnerability information
   by introducing a transparency schema.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-sbom-access/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-sbom-access-18

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-sbom-access-18

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts