Re: [sacm] Components for Vulnerability Assessment

"Haynes, Dan" <dhaynes@mitre.org> Tue, 18 April 2017 14:55 UTC

Return-Path: <dhaynes@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A5E212F290 for <sacm@ietfa.amsl.com>; Tue, 18 Apr 2017 07:55:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rHq9XutkYtXS for <sacm@ietfa.amsl.com>; Tue, 18 Apr 2017 07:55:34 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id A86AA12EC01 for <sacm@ietf.org>; Tue, 18 Apr 2017 07:55:34 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 4891A6C02CA; Tue, 18 Apr 2017 10:55:43 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (imshyb01.mitre.org [129.83.29.2]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id 3A4D66C02CD; Tue, 18 Apr 2017 10:55:43 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Tue, 18 Apr 2017 10:55:33 -0400
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Tue, 18 Apr 2017 10:55:33 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com; s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=SNo27t2KGV560Fr7Abc71s5kK6cFUNuJ2JAyNkWR0iY=; b=QSAuzdixQRPGO5ktkIGno1V6y0uJmEO6+rXhdx+vI0jvQQGhQN+fF4/L9z6t7ZXEjguDqKgClKxXNVDcoSG+YpCZzs9pJhhZ6OLuMWa2cbZwXX+XxpDbY2y1+1BD1cvywqEBZKViGmvH5Y4LnRi2tzsehrgH6Apofd4SqY7AJRA=
Received: from DM5PR09MB1354.namprd09.prod.outlook.com (10.172.38.135) by DM5PR09MB1353.namprd09.prod.outlook.com (10.172.38.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.10; Tue, 18 Apr 2017 14:55:27 +0000
Received: from DM5PR09MB1354.namprd09.prod.outlook.com ([10.172.38.135]) by DM5PR09MB1354.namprd09.prod.outlook.com ([10.172.38.135]) with mapi id 15.01.1034.015; Tue, 18 Apr 2017 14:55:27 +0000
From: "Haynes, Dan" <dhaynes@mitre.org>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, Adam Montville <adam.w.montville@gmail.com>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: [sacm] Components for Vulnerability Assessment
Thread-Index: AQHSuERo1RuKpbFar0WA/n0zX/1IM6HLLVhQgAAH2ACAAAD5UA==
Date: Tue, 18 Apr 2017 14:55:27 +0000
Message-ID: <DM5PR09MB1354C4B0912DA300919F4D13A5190@DM5PR09MB1354.namprd09.prod.outlook.com>
References: <CACknUNUNhCCV8LRDpjEm1SvgwpLq+NEEDbc3LOPYzMyRbmfy9w@mail.gmail.com> <DM5PR09MB1354969FE7F3B67DC662A84AA5190@DM5PR09MB1354.namprd09.prod.outlook.com> <10eb6709-c198-5fdc-1306-cb19c2f6da89@sit.fraunhofer.de>
In-Reply-To: <10eb6709-c198-5fdc-1306-cb19c2f6da89@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: sit.fraunhofer.de; dkim=none (message not signed) header.d=none;sit.fraunhofer.de; dmarc=none action=none header.from=mitre.org;
x-originating-ip: [192.80.55.86]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR09MB1353; 7:Xu2amHl+Th5riXJGUyk1zrHPJeYqc5r18VyhiRF/CxydIdjE7n028bE1/yB4h5JHABXrfmRvD9Pl2vU8s/Ol8mmtX7jwPtuQXDsg9NN/IP5SqbXJEIOWuL2ZXM/2xWXNffpA9Is/Xy/dTlnT2YPt6tFz90/F5jLLB689KBjbPE818uI9TypoAtSwAW5NYSSz+2UlexMs2BqWZ9wSKNKnDriYnucRTatzDOiTwEN1So+EpZlyCSFUFYh3MYBQrxu0BjuE6HV9g70Z1D69XgviB/6yi3qouJyBW5RV57wxV3h5sQZksu3fzxFx5Xq7Nc5dhJqcpHVN68YOVvSIkagcbA==
x-ms-office365-filtering-correlation-id: ff3e96de-9883-4c34-c6fe-08d4866af368
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081)(201702281549075); SRVR:DM5PR09MB1353;
x-microsoft-antispam-prvs: <DM5PR09MB13532007E1653BAF19408A05A5190@DM5PR09MB1353.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(100405760836317);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(20161123562025)(20161123560025)(20161123555025)(20161123564025)(6072148); SRVR:DM5PR09MB1353; BCL:0; PCL:0; RULEID:; SRVR:DM5PR09MB1353;
x-forefront-prvs: 028166BF91
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39450400003)(39400400002)(39410400002)(39850400002)(39860400002)(377454003)(53754006)(24454002)(13464003)(2950100002)(6116002)(102836003)(3846002)(39060400002)(38730400002)(7696004)(50986999)(76176999)(6506006)(33656002)(305945005)(7736002)(74316002)(6436002)(6246003)(189998001)(9686003)(6306002)(55016002)(99286003)(53936002)(5660300001)(229853002)(106356001)(77096006)(54356999)(2501003)(3280700002)(66066001)(3660700001)(2900100001)(86362001)(122556002)(2906002)(8676002)(81166006)(53546009)(8936002)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR09MB1353; H:DM5PR09MB1354.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2017 14:55:27.3347 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR09MB1353
X-OriginatorOrg: mitre.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/DQ0UItk_Pdw24bViANgRjMr19ds>
Subject: Re: [sacm] Components for Vulnerability Assessment
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Apr 2017 14:55:36 -0000

Hi Henk,

The reasoning behind my comment was that in the IETF 98 notes (https://www.ietf.org/proceedings/98/minutes/minutes-98-sacm-00) it says:

---
Per Slide 7:
Q: (Adam Montville): Is the vulnerability assessor talk to the repository or talking directly to the collector?
A: (Jessica Fitzgerald-McKay): I could see an implementer combining the collector and end-point repository into one.  If we're treating them as functional components I'm not sure we need to be that specific.
A: (Dave Waltermire): We want this architecture to be de-composable.  If we treat the end-point repository as a proxy, we might be making things too complicated. It might be simpler to treat the end-point repository as a data store.
A: (Adam Montville): Agreed.

Q: (Dave Waltermire) Are there any concerns with separating the end-point repository and the collector being the component responsible for collection?
A: <no response>

Comment: (Adam Montville): The "results repository" will now go into the "end-point repository.
---

Given that, I thought there was some consensus around making that change.

Thanks,

Danny

> -----Original Message-----
> From: Henk Birkholz [mailto:henk.birkholz@sit.fraunhofer.de]
> Sent: Tuesday, April 18, 2017 10:49 AM
> To: Haynes, Dan <dhaynes@mitre.org>; Adam Montville
> <adam.w.montville@gmail.com>; sacm@ietf.org
> Subject: Re: [sacm] Components for Vulnerability Assessment
> 
> Hello Danny,
> 
> the "Assessment Results Repository" and "Endpoint Repository" are two
> different components with different functions. The "Endpoint Repository"
> of course is the provider for the consumer that is the "Assessment Results
> Repository".
> 
> Most certainly, both components can be running on the same endpoint or be
> composed in a single service that merges both components. I suppose that is
> what you meant?
> 
> For the sake of show-casing how the architecture is working. I would
> recommend to start with each SACM component instantiated as a separate
> software component. Despite the fact that it looks simpler to just add the
> "Assessment Result" to the ""Endpoint Characterization Records"
> retained in an "Endpoint Repository".
> 
> Ultimately, people will want to use existing software and Asset/Inventory
> Management Software is a big candidate to provide the functions of an
> "Endpoint Repository". In consequence, I would keep these components
> instantiated separately in the first iteration.
> 
> What does the group think?
> 
> Viele Grüße,
> 
> Henk
> 
> On 04/18/2017 04:21 PM, Haynes, Dan wrote:
> > Hi Adam,
> >
> >
> >
> > I think this is a good list for me, but, should the assessment results
> > repository be merged into the endpoint repository?
> >
> > Thanks,
> >
> > Danny
> >
> >
> >
> > *From:*sacm [mailto:sacm-bounces@ietf.org] *On Behalf Of *Adam
> > Montville
> > *Sent:* Tuesday, April 18, 2017 9:04 AM
> > *To:* sacm@ietf.org
> > *Subject:* [sacm] Components for Vulnerability Assessment
> >
> >
> >
> > Hi All:
> >
> >
> >
> > We've got a list of components we think we care about for our
> > vulnerability assessment scenario (focusing on the narrowest "ideal
> > case" through the scenario for the time being.
> >
> >
> >
> > These are:
> >
> >
> >
> > * Vulnerability Detection Data Repository
> >
> > * Vulnerability Assessor
> >
> > * Endpoint Repository
> >
> > * Collector
> >
> > * Target Endpoint
> >
> > * Assessment Results Repository
> >
> >
> >
> > For reference, see our wiki [1] and/or the slides from IETF 98 [2]
> > and/or the minutes from IETF 98 [3]
> >
> >
> >
> > Question to the WG: Is this an appropriate initial list of components?
> >
> >
> >
> > Please opine within the next few days (say by end of your day on
> > Thursday, wherever you may be), so that we can generate some momentum
> > on this effort.
> >
> >
> >
> > Kind regards,
> >
> >
> >
> > Adam
> >
> >
> >
> > [1]
> > https://trac.ietf.org/trac/sacm/wiki/SacmVulnerabilityAssessmentScenar
> > io
> >
> > [2]
> > https://www.ietf.org/proceedings/98/slides/slides-98-sacm-vulnerabilit
> > y-scenario-discussion-00.pdf
> >
> > [3] https://www.ietf.org/proceedings/98/minutes/minutes-98-sacm-00.txt
> >
> >
> >
> >
> >
> >
> >
> > _______________________________________________
> > sacm mailing list
> > sacm@ietf.org
> > https://www.ietf.org/mailman/listinfo/sacm
> >