Re: [mile] New Version Notification for draft-murillo-mile-cps-00.txt

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Thu, 22 May 2014 13:53 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: mile@ietfa.amsl.com
Delivered-To: mile@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB3151A01BA for <mile@ietfa.amsl.com>; Thu, 22 May 2014 06:53:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.8
X-Spam-Level:
X-Spam-Status: No, score=-0.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, J_CHICKENPOX_56=0.6, J_CHICKENPOX_57=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C3cYBDO-1BP0 for <mile@ietfa.amsl.com>; Thu, 22 May 2014 06:53:00 -0700 (PDT)
Received: from mail-yh0-x22f.google.com (mail-yh0-x22f.google.com [IPv6:2607:f8b0:4002:c01::22f]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BA361A0176 for <mile@ietf.org>; Thu, 22 May 2014 06:53:00 -0700 (PDT)
Received: by mail-yh0-f47.google.com with SMTP id z6so2979680yhz.34 for <mile@ietf.org>; Thu, 22 May 2014 06:52:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8kH+ViPTIhGPGQnK4KXMEGijTlYX3Yy2SJFvxL2SEtw=; b=ts7/BsTXqdASPixbHQ37xqQGGBwfe5KMyRAooTCTFtuJfU6vAD30PBpti5qGbmkbLe dg68h6vBIqyRJU/ZNPhjvCKsZ7bIBdub7nPSOKz0SMHhqTsFLZz5oJ6yKg1WcyMgCmM7 SO92ABeZygOKP+ZPj9jemTeQ+7/khga42WV6nTcK0gE3vzMAp0GQeVtp07Gk+TKdy2m5 hUY8V+Kvzi5NnM5wpo89G7EwSeWitdqQuAGUidD4MXt3o7KtTPr8LIO9spfjA7vDj0wH FHdsPoz5TmI703FSDT+33evpapwPSTHO1ymNTYyVF5kpqKXvJFepxt5DscHjM4IqjwBP 2q2w==
X-Received: by 10.236.157.40 with SMTP id n28mr30089537yhk.29.1400766778470; Thu, 22 May 2014 06:52:58 -0700 (PDT)
Received: from [10.210.130.79] (mobile-166-147-117-244.mycingular.net. [166.147.117.244]) by mx.google.com with ESMTPSA id m50sm8433123yha.8.2014.05.22.06.52.56 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 22 May 2014 06:52:57 -0700 (PDT)
X-Google-Original-From: Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
X-Mailer: iPhone Mail (11D167)
In-Reply-To: <000a01cf75be$4623a190$d26ae4b0$@nict.go.jp>
Date: Thu, 22 May 2014 09:52:56 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <7D802BE8-B9B5-4B5D-80A1-783F25BBFF5D@gmail.com>
References: <000001cf6b78$42243370$c66c9a50$@nict.go.jp> <63DF8BAD-3A7B-4454-8B40-AE8A9D1E1333@standardstrack.com> <000a01cf75be$4623a190$d26ae4b0$@nict.go.jp>
To: Takeshi Takahashi <takeshi_takahashi@nict.go.jp>
Archived-At: http://mailarchive.ietf.org/arch/msg/mile/fH5lJJzS-wPLQtpOQ6J17RZyQ3I
Cc: "<mile@ietf.org>" <mile@ietf.org>, Eric Burger <eburger@standardstrack.com>
Subject: Re: [mile] New Version Notification for draft-murillo-mile-cps-00.txt
X-BeenThere: mile@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Managed Incident Lightweight Exchange, IODEF extensions and RID exchanges" <mile.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mile>, <mailto:mile-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mile/>
List-Post: <mailto:mile@ietf.org>
List-Help: <mailto:mile-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mile>, <mailto:mile-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 May 2014 13:53:04 -0000

+1

Sent from my iPhone

> On May 22, 2014, at 9:03 AM, "Takeshi Takahashi" <takeshi_takahashi@nict.go.jp> wrote:
> 
> Hi Eric and Martin,
> 
> Thank you for your kind comment.
> We will keep in mind that we should avoid having two things that do the same
> thing.
> 
> In my humble opinion, the CPS draft hands issues that are outside the scope
> of the SCI draft.
> I think the next version of the CPS draft will sort out lots of this type of
> questions.
> 
> Kind wishes,
> Take
> 
> 
>> -----Original Message-----
>> From: mile [mailto:mile-bounces@ietf.org] On Behalf Of Eric Burger
>> Sent: Thursday, May 22, 2014 4:56 AM
>> To: mile@ietf.org
>> Subject: Re: [mile] New Version Notification for
>> draft-murillo-mile-cps-00.txt
>> 
>> And I do not think the world is eager to have two things that do the same
>> thing. We already have that problem in this space. I would suggest
> adopting
>> one and only one way of doing this. I have no opinion as to whether it
> should
>> be CPS or SCI.
>> 
>> On May 9, 2014, at 7:17 AM, Takeshi Takahashi
>> <takeshi_takahashi@nict.go.jp> wrote:
>> 
>>> Hi Martin,
>>> 
>>> Thank you for your kind comments.
>>> 
>>>> There's one question that still lingers: whether we should not
>>>> re-utilize other extensions or use the IODEF-extension for structured
>>>> cybersecurity (draft-ietf-mile-sci-11.txt). Ideas? I believe the
>>>> points above would be applicable to both scenarios.
>>> 
>>> I like this CPS draft, but I also like IODEF-SCI's framework (well, I
>>> am one of the authors).
>>> I do not want to be the obstacle of developing this interesting work,
>>> so I do not have any intention to stick to IODEF-SCI at all.
>>> But I would like to understand the pros and cons of not using SCI
>>> framework for the CPS extension more vividly.
>>> 
>>> Section 1.7 of the CPS draft explains the reason for not using the
>>> IODEF-SCI's framework, but it was not so clear to me..
>>> Can we discuss this issue when we have got example XML documents of
>>> the CPS extension? (I guess later version of the CPS draft will have
>>> the example XML
>>> documents?) Then we can compare how the XML documents will look like
>>> for each case of using and not using IODEF-SCI framework on the CPS
>> extension.
>>> 
>>> Kind regards,
>>> Take
>>> 
>>> 
>>>> -----Original Message-----
>>>> From: Martin Murillo [mailto:murillo@ieee.org]
>>>> Sent: Wednesday, April 30, 2014 12:30 PM
>>>> To: Takeshi Takahashi; mile@ietf.org
>>>> Subject: Re: [mile] Fwd: New Version Notification for
>>>> draft-murillo-mile-cps-00.txt
>>>> 
>>>> Dear Takeshi,
>>>> 
>>>> Thanks for the feedback and highlighting various extraneous elements
>>>> which have rich IODEF equivalents. This makes the reporting lighter
>>>> and decreases implementation overhead. I have answered to each item
>> below.
>>>> 
>>>> 1. The IncidentType element specifies whether the incident is
>>>> accidental, on purpose, or theresult of other actions. The IncdntType
>>>> attribute is missplaced. Thanks for taking notice of that. However I
>>>> wonder whether the IncidentType element should be renamed. I think we
>>>> agree that we need a field where whether the incident is accidental,
>>>> on purpose, or undetermined can be placed. While the nature of the
>>>> incident is rarely known immediately, there are instances in which
>>>> the operator or other local party causes accidental instances; these
>>>> instances might cause repercussions in other locations (i.e.
>>>> balancing in
>>> an electric grid).
>>>> 
>>>> 2. I agree with you, the IncidentTilte element is a perfect candidate
>>>> to go to a shallower level, especially when it will be the first
>>>> variable that an operator or appropriate party reads.
>>>> 
>>>> 3. Given that the IODEF:Contact class is rich enough to differentiate
>>>> between a reporting party and an additional contact
>>>> person/institution, I believe that we should use such class. Because
>>>> the different stakeholders responsible for the Corporate Network,
>>>> Control Servers, and Field Devices, this class might need to be
>>>> extended. This is also relevant when the attack has taken place at
>>>> any of those levels: For instance, the Corporate Network (or a false
>>>> impersonator) might instruct the control room (Control servers) wrong
>>>> setpoint configurations. Or the Control Network might experience a
>>>> breach and setpoints altered in such servers. In extreme situations,
>>>> the
>>> attacks might be directly to the field devices. In each of those cases.
>>>> In each of those cases the contact person might be one or more.
>>>> 
>>>> 4, 5, 6. I think the IODEF classes can be indeed used. Thank you. The
>>>> extension capabilities fo the System Class makes it quite appropriate
>>>> to offer rich information.
>>>> 
>>>> Regarding your last point, SFK should indeed be used instead of SFC.
>>>> 
>>>> There's one question that still lingers: whether we should not
>>>> re-utilize other extensions or use the IODEF-extension for structured
>>>> cybersecurity (draft-ietf-mile-sci-11.txt). Ideas? I believe the
>>>> points above would be applicable to both scenarios.
>>>> 
>>>> Martin
>>>> 
>>>>> On 4/23/2014 4:42 AM, Takeshi Takahashi wrote:
>>>>> Hi Martin,
>>>>> 
>>>>> I've read through the drafts. Thank you very much for sharing your
>>>>> expertise here.
>>>>> It was a new use case for me, and was really interesting.
>>>>> 
>>>>> I am wondering if we can minimize the number of extension fields by
>>>>> using the existing IODEF fields.
>>>>> By minimizing the number of similar fields, I hope we can simplify
>>>>> the draft and minimize the burden of implementations.
>>>>> 
>>>>>> From this viewpoint, let me ask several checking questions.
>>>>> 
>>>>> 1. IncidentType element and IncdntType Attribute
>>>>>  What are the difference between them? I think your current draft
>>>>> has them as place holders. I would like to hear a bit further.
>>>>> 
>>>>> 2. The IncidentTitle element
>>>>>  Can we use the Description element inside the IODEF:Incident class
>>>>> for this purpose, instead of having new field here?
>>>>>  It would be useful to have title or such information that can hint
>>>>> the content of the IODEF document, but I feel like that it would be
>>>>> helpful to have this type of information at the shallower level of
>>>>> IODEF document rather than having it in the deeper level of IODEF
>>>>> document (inside
>>>>> additionalData)
>>>>> 
>>>>> 3. The ReportingParty element
>>>>>  Can we use the IODEF:contact class instead of having new field?
>>>>> We could extend it further if needed.
>>>>> 
>>>>> 4. The ReportReliability element
>>>>>  Can we use the IODEF:confidence class instead of having new field?
>>>>> We could extend it further if needed.
>>>>> 
>>>>> 5. The TargetSystems element
>>>>>  Can we extend the IODEF:system class instead of having new field?
>>>>> We could extend it further if needed.
>>>>> 
>>>>> 6. type attribute of the IODEF:Impact class
>>>>>  When we use this extension, what value should be set for the type
>>>>> attribute of the IODEF:Impact class?
>>>>> 
>>>>> By the way, here are small questions.
>>>>> 
>>>>> 1. should [SFC] be [SFK], since the acronym seems to come from the
>>>>> initials of the authors of the reference (Stouffer, K., Falco, J.,
>>>>> and
>>>> K. Scarfonw) ?
>>>>> 
>>>>> I might have misunderstood your draft, so please correct me if I am
>>> wrong.
>>>>> 
>>>>> Kind regards,
>>>>> Take
>>>>> 
>>>>> 
>>>>>> -----Original Message-----
>>>>>> From: mile [mailto:mile-bounces@ietf.org] On Behalf Of Martin
>>>>>> Murillo
>>>>>> Sent: Wednesday, January 29, 2014 10:11 AM
>>>>>> To: Johnson, Blake; Jerome Athias
>>>>>> Cc: mile@ietf.org
>>>>>> Subject: Re: [mile] Fwd: New Version Notification for
>>>>>> draft-murillo-mile-cps-00.txt
>>>>>> 
>>>>>> Have read the links posted by Jerome and info on the Experience
>>>>>> Sharing Tool (EST). It is my impression that a revision under the
>>>>>> light of the EST would be very appropriate, and one of the first
>>>>>> uses of the extension, given its report-based nature.  Look forward
>>>>>> to seeing
>>>>> the reviews in this light.
>>>>>> As Jerome mentioned, focusing on referencing already existing
>>>>>> taxonomies (and when necessary reusing them and referencing their
>>>>>> xml implementations, if publicly available) would be the best
>>>>>> approach; given the early stages in the field, I tend to think that
>>>>>> atomic data will
>>>>> need to be used.
>>>>>> Regarding the term "Asset" vs "System", I believe system provides a
>>>>>> more general connotation, while asset, seem to focus more on
>>>>>> mainstream infrastructure; because the inclusion of IoT-related
>>>>>> infrastructure (anywhere from centralized home control to
>>>>>> self-driving cars), I wonder whether "Asset" is too an specific term.
>>>>>> 
>>>>>> Martin
>>>>>> 
>>>>>> Martin
>>>>>> 
>>>>>>> On 1/24/2014 2:09 PM, Johnson, Blake wrote:
>>>>>>> This is an interesting application of IODEF that I had not
> considered.
>>>>>> Most industry sharing that takes place in this space, from my
>>>>>> perspective, is in the form of in person and telephone threat
>>>>>> briefings. These are facilitated by the FBI, DHS, and the ISAC's.
>>>>>>> At least a handful of the ISAC's have started sharing structured
>>>>>>> threat
>>>>>> indicator data, and the taxonomy for this extension could cover
>>>>>> what the Electric Sector ISAC currently refers to as 'Experience
>>> Sharing.'
>>>>>> I can review this proposal as it relates to information captured by
>>>>>> the ES-ISAC's Experience Sharing tool, using IEC/ANSI 62443 (ISA99)
>>>>>> as an informative reference.
>>>>>>> Blake Johnson
>>>>>>> Threat Intelligence Analyst
>>>>>>> Alliant Energy | Infrastructure Secruity
>>>>>>> Office: 608-458-6320 | Cell: 608-843-2790
>>>>>>> 
>>>>>>> 
>>>>>>> -----Original Message-----
>>>>>>> From: mile [mailto:mile-bounces@ietf.org] On Behalf Of Jerome
>>>>>>> Athias
>>>>>>> Sent: Friday, January 24, 2014 3:18 AM
>>>>>>> To: murillo@ieee.org
>>>>>>> Cc: mile@ietf.org
>>>>>>> Subject: Re: [mile] Fwd: New Version Notification for
>>>>>>> draft-murillo-mile-cps-00.txt
>>>>>>> 
>>>>>>> Hi,
>>>>>>> 
>>>>>>> from what I know (which is limited), and as you mention, this ICS
>>>>>>> area is often also called Critical Infrastructures (CIs), or SCADA
>>>>>>> 
>>>>>>> for a little bit of background, we could explore the Cybersecurity
>>>>>>> Framework Example references
>>>>>>> http://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx
>> http://www.ictqatar.qa/en/documents/download/National%20Industrial%20
>>>>>> C
>>>>>>> ontrol%20Systems%20Security%20Standard-English.pdf
>>>>>>> ANSI/ISA-99.02.01-2009
>>>>>>> 
>>>>>>> I don't have enough knowledge about the status and adoption of the
>>>>>>> different efforts in term of XML representation/format/standards
>>>>>>> http://xml.coverpages.org/emergencyManagement.html
>>>>>>> and resilience
>>>>>>> 
>>>>>>> It would maybe be possible to obtain information from there
>>>>>>> http://ics-cert.us-cert.gov http://ics-isac.org/
>>>>>>> 
>>>>>>> My first feedback is that it looks like an interesting extension.
>>>>>>> 
>>>>>>> I would suggest to focus on the reuse of existing Taxonomies, or
>>>>>>> references to them.
>>>>>>> 
>>>>>>> As such, for [Industry], maybe
>>>>>>> http://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012
>>>>>>> ISO 3166 (Country Codes)
>>>>>>> 
>>>>>>> 
>>>>>>> [TargetSystems], I (personally) don't like the word "system" and
>>>>>>> prefer
>>>>>> "asset"
>>>>>>> [CompromisedPhysicalInfrastrucute] (with a typo ;p) seems to be a
>>>>>>> category of "Infrastructure" (or group of assets)
>>>>>>> 
>>>>>>> 
>>>>>>> [EntryPoint] could be ok since it could be a little bit different
>>>>>>> from "endpoint"
>>>>>>> 
>>>>>>> [PerpetratingParty] seems to reference "Threat Actor" or "Threat
>>>>>>> Agent" or "Attacker"
>>>>>>> 
>>>>>>> [RecurrencePreventionMeasures] is this Security Controls? (and
>>>>>>> Mitigations/Remediations)
>>>>>>> Reference:
>>>> https://web.nvd.nist.gov/view/800-53/control?controlName=AC-3&type=1
>>>>>>> 
>>>>>>> 
>>>>>>> Describing an [Exploit] is not so easy (depending on the level of
>>>>>>> details wanted/needed)
>>>>>>> 
>>>>>>> Figure 1 (or "Diagram 1") is interesting, (of course it is
>>>>>>> different from, i.e. CAESARS), it MAYBE could be more layered
>> http://www.isa.org/InTechTemplate.cfm?template=/ContentManagement/Con
>>>>>> t
>>>>>>> entDisplay.cfm&ContentID=94401
>>>>>>> 
>>>>>>> (To follow: ENISA CDXI)
>>>>>>> 
>>>>>>> 
>>>>>>> Some typos
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> Next step: more XML focused ;)
>>>>>>> 
>>>>>>> 
>>>>>>> My 2 bitcents
>>>>>>> 
>>>>>>> 2014/1/24 Martin Murillo <murillo@ieee.org>:
>>>>>>>> Dear all,
>>>>>>>> 
>>>>>>>> Please find below a link to a proposed draft for extending IODEF
>>>>>>>> for the reporting of cyber-physical system incidents. These
>>>>>>>> systems are often referred as  Operational Technology Systems,
>>>>>>>> Industrial Control Systems, Automatic Control  Systems, or simply
>>>>>>>> Control
>>>> Systems.
>>>>>>>> 
>>>>>>>> Cyber-Physical systems have been around for decades.  However,
>>>>>>>> they are now at a higher risk to be  the target of attacks by
>>>>>>>> individual highly-skilled attackers, organized groups,
>>>>>>>> nation-states, or simply suffer repercussions of mainstream IT
>>>>>>>> cyber-attacks. While over 90% of critical control system
>>>>>>>> infrastructure is currently owned by private enterprises, these
>>>>>>>> can have direct repercussions on national security of world
>>>>>>>> nations.  Indeed, various of these systems are key parts of
>>>>>>>> nuclear reactor facilities, transportation systems, electric
>>>>>>>> power distribution, oil and natural gas distribution, health
>>>>>>>> care, water
>>>>>> and waste-water treatment, dam infrastructure, missile
>>>>>>>> and defense systems, and others.   The disruption of these control
>>>>>> systems
>>>>>>>> could have a significant impact on public health, safety, and
>>>>>>>> lead to large economic losses.
>>>>>>>> 
>>>>>>>> Among the issues that catalyze this higher risk are:
>>>>>>>> 
>>>>>>>> i) these systems are gradually becoming more interconnected, ii)
>>>>>>>> legacy systems do not have proper cybersecurity protection, iii)
>>>>>>>> the existence of highly-skilled individuals and motivations, iv)
>>>>>>>> some these systems are generally considered critical, v) these
>>>>>>>> are a natural extension of IT cyber-attacks, vi) the emergence of
>>>>>>>> the Internet of Things (IOT), and vi) these attacks can be
>>>>>>>> carried out
>>>>>> remotely and quite inexpensively.
>>>>>>>> While there might exist national approaches to deal with
>>>>>>>> incidents, there's the need of a global international approach
>>>>>>>> that will engulf governments, private organizations and other
>>> stakeholders.
>>>>>>>> IETF, as a leading global Internet standards organization, seeks
>>>>>>>> to satisfy this need through open standards that seek to
>>>>>>>> encompass issues that are critical for the global community.
>>>>>>>> 
>>>>>>>> Feedback at two levels are welcome:
>>>>>>>> 
>>>>>>>> 1. On the existence and inclusion either by utilizing any already
>>>>> existing
>>>>>>>> industry formats (XML-   encoded) and/or by utilizing atomic data
>>>>>>>> 2. Contributions on making the extension (and background
>>>>>>>> information) more comprehensive, accurate and principally useful
>>>>>>>> for the community
>>>>>>>> 
>>>>>>>> Look forward to feedback and other input!
>>>>>>>> 
>>>>>>>> Martin Murillo
>>>>>>>> 
>>>>>>>> A new version of I-D, draft-murillo-mile-cps-00.txt has been
>>>>>>>> successfully submitted by Martin Murillo and posted to the IETF
>>>>>>>> repository.
>>>>>>>> 
>>>>>>>> Name:           draft-murillo-mile-cps
>>>>>>>> Revision:       00
>>>>>>>> Title:          IODEF extension for Reporting Cyber-Physical
>> System
>>>>>>>> Incidents
>>>>>>>> Document date:  2014-01-21
>>>>>>>> Group:          Individual Submission
>>>>>>>> Pages:          24
>>>>>>>> URL:
>> http://www.ietf.org/internet-drafts/draft-murillo-mile-cps-00.txt
>>>>>>>> Status:
>>>>>> https://datatracker.ietf.org/doc/draft-murillo-mile-cps/
>>>>>>>> Htmlized:
>>>> http://tools.ietf.org/html/draft-murillo-mile-cps-00
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Abstract:
>>>>>>>>   This draft document will extend the Incident Object Description
>>>>>>>>   Exchange Format (IODEF) defined in [RFC5070] to support the
>>>>>> reporting
>>>>>>>>   of incidents dealing with attacks to physical infrastructure
>>>>> through
>>>>>>>>   the utilization of IT means as a vehicle or as a tool.  These
>>>>> systems
>>>>>>>>   might also be referred as Cyber-Physical Systems (CPS),
>>>> Operational
>>>>>>>>   Technology Systems, Industrial Control Systems, Automatic
>>>> Control
>>>>>>>>   Systems, or simply Control Systems.  These names are used
>>>>>>>>   interchangeably in this document.  In this context, an
>>>>>>>> incident
>>>> is
>>>>>>>>   generally the result of a cybersecurity issue whose main goal
>>>>>>>> is
>>>>>> to
>>>>>>>>   affect the operation of a CPS.  It is considered that any
>>>>>>>>   unauthorized alteration of the operation is always malign.  This
>>>>>>>>   extension will provide the capability of embedding structured
>>>>>>>>   information, such as identifier- and XML-based information.
>>>>>>>> In
>>>> its
>>>>>>>>   current state, this document provides important considerations
>>>> for
>>>>>>>>   further work in implementing Cyber-Physical System incident
>>>>>> reports,
>>>>>>>>   either by utilizing any already existing industry formats (XML-
>>>>>>>>   encoded) and/or by utilizing atomic data.
>>>>>>>> 
>>>>>>>>   In addition, this document should provide appropriate material
>>>> for
>>>>>>>>   helping making due considerations in making an appropriate
>>>> decision
>>>>>>>>   on how a CPS reporting is done: 1) through a data format
>>>>>>>> extension
>>>>>> to
>>>>>>>>   the Incident Object Description Exchange Format [RFC5070], 2)
>>>>>> forming
>>>>>>>>   part of an already existing IODEF-extension for structured
>>>>>>>>   cybersecurity information (currently draft
>>>>>>>>   draft-ietf-mile-sci-11.txt), or others.  While the format and
>>>>>>>>   contents of the present document fit more the earlier option,
>>> these
>>>>>>>>   can also be incorporated to the later.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Please note that it may take a couple of minutes from the time of
>>>>>>>> submission until the htmlized version and diff are available at
>>>>>> tools.ietf.org.
>>>>>>>> The IETF Secretariat
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> mile mailing list
>>>>>>>> mile@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/mile
>>>>>>> _______________________________________________
>>>>>>> mile mailing list
>>>>>>> mile@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/mile
>>>>>> _______________________________________________
>>>>>> mile mailing list
>>>>>> mile@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/mile
>>> 
>>> _______________________________________________
>>> mile mailing list
>>> mile@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mile
> 
> 
> _______________________________________________
> mile mailing list
> mile@ietf.org
> https://www.ietf.org/mailman/listinfo/mile