[Iotops] I-D Action: draft-ietf-iotops-security-summary-01.txt

internet-drafts@ietf.org Mon, 23 October 2023 19:07 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: iotops@ietf.org
Delivered-To: iotops@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C0249C16F3F3; Mon, 23 Oct 2023 12:07:03 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: iotops@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.13.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: iotops@ietf.org
Message-ID: <169808802377.55895.1785074101288701572@ietfa.amsl.com>
Date: Mon, 23 Oct 2023 12:07:03 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/ARe5V1dHFM2QvlfoymXdkP3_Yjo>
Subject: [Iotops] I-D Action: draft-ietf-iotops-security-summary-01.txt
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.39
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Oct 2023 19:07:03 -0000

Internet-Draft draft-ietf-iotops-security-summary-01.txt is now available. It
is a work item of the IOT Operations (IOTOPS) WG of the IETF.

   Title:   A summary of security-enabling technologies for IoT devices
   Author:  Brendan Moran
   Name:    draft-ietf-iotops-security-summary-01.txt
   Pages:   27
   Dates:   2023-10-23

Abstract:

   The IETF has developed security technologies that help to secure the
   Internet of Things even over constrained networks and when targetting
   constrained nodes.  These technologies can be used independenly or
   can be composed into larger systems to mitigate a variety of threats.
   This documents illustrates an overview over these technologies and
   highlights their relationships.  Ultimately, a threat model is
   presented as a basis to derive requirements that interconnect
   existing and emerging solution technologies.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-iotops-security-summary/

There is also an HTMLized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-iotops-security-summary-01

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-iotops-security-summary-01

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts