Last Call: <draft-ietf-sacm-use-cases-08.txt> (Endpoint Security Posture Assessment - Enterprise Use Cases) to Informational RFC

The IESG <> Mon, 02 March 2015 14:36 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id BCB941A8793; Mon, 2 Mar 2015 06:36:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id GZ58lnYdm9X7; Mon, 2 Mar 2015 06:36:51 -0800 (PST)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id 9A2121A8789; Mon, 2 Mar 2015 06:36:51 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: "IETF-Announce" <>
Subject: Last Call: <draft-ietf-sacm-use-cases-08.txt> (Endpoint Security Posture Assessment - Enterprise Use Cases) to Informational RFC
X-Test-IDTracker: no
X-IETF-IDTracker: 5.12.0.p1
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <>
Message-ID: <>
Date: Mon, 02 Mar 2015 06:36:51 -0800
Archived-At: <>
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 02 Mar 2015 14:36:53 -0000

The IESG has received a request from the Security Automation and
Continuous Monitoring WG (sacm) to consider the following document:
- 'Endpoint Security Posture Assessment - Enterprise Use Cases'
  <draft-ietf-sacm-use-cases-08.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2015-03-16. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   This memo documents a sampling of use cases for securely aggregating
   configuration and operational data and evaluating that data to
   determine an organization's security posture.  From these operational
   use cases, we can derive common functional capabilities and
   requirements to guide development of vendor-neutral, interoperable
   standards for aggregating and evaluating data relevant to security

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.