Re: [sacm] Draft updated charter for SACM

"Waltermire, David A. (Fed)" <david.waltermire@nist.gov> Fri, 22 September 2017 14:14 UTC

Return-Path: <david.waltermire@nist.gov>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CD3E134313 for <sacm@ietfa.amsl.com>; Fri, 22 Sep 2017 07:14:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ynN9JlQAsjwS for <sacm@ietfa.amsl.com>; Fri, 22 Sep 2017 07:14:32 -0700 (PDT)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0129.outbound.protection.outlook.com [23.103.201.129]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD8B5134464 for <sacm@ietf.org>; Fri, 22 Sep 2017 07:14:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=HCsGJ5CpW3ygRlmChQfpbZZcehcaaJ5q9mKtxU7f/NA=; b=GacoOlmtG6bxkwsCwdPLM+sctoussf27NDdle1IeULQon4gpG/8QTA2GZ4YbruhMB3gU75Aai9ZcIYpSqGNyQwEYVUWZMxPngf0eQzclc9Dz4fRjY4TtJHLlZwC7lz4rYlvr8kX4kp6NwzJpXN76RJ2/xPEdXua4O2T+Dz5Q16I=
Received: from CY4PR09MB1495.namprd09.prod.outlook.com (10.173.191.141) by CY4PR09MB1303.namprd09.prod.outlook.com (10.172.66.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7; Fri, 22 Sep 2017 14:14:29 +0000
Received: from CY4PR09MB1495.namprd09.prod.outlook.com ([10.173.191.141]) by CY4PR09MB1495.namprd09.prod.outlook.com ([10.173.191.141]) with mapi id 15.20.0077.011; Fri, 22 Sep 2017 14:14:29 +0000
From: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>
To: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, Adam Montville <adam.w.montville@gmail.com>, "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: [sacm] Draft updated charter for SACM
Thread-Index: AQHTMXImL5J6XLTHTHmuWb5S6+MSpqK8pP8wgANG1gCAACicgIAA4t+X
Date: Fri, 22 Sep 2017 14:14:28 +0000
Message-ID: <imrisdjonqv7qa6ej1tiuovb.1506089285235@email.android.com>
References: <3565E201-6E8D-4D5D-811D-E5857300601D@cisco.com> <CY4PR09MB1495C6A1CD869C070DEEF3B9F0600@CY4PR09MB1495.namprd09.prod.outlook.com> <CACknUNV9XYrN2K0DixGT1c4Gu-o4L3c2rcDS5NYGXxam4zUU8g@mail.gmail.com>, <943376CB-9F33-4171-A448-1E239D5CC86C@cisco.com>
In-Reply-To: <943376CB-9F33-4171-A448-1E239D5CC86C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=david.waltermire@nist.gov;
x-originating-ip: [2600:1003:b01a:a86c:8e4:7fa3:d0ce:9300]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR09MB1303; 6:X5GBkWHiMuv5ri6BWwr7dKSEqZuhBL3lXNgAnQvNHrmYhmUPwH4E9zNw4Hlf9n3rYzw8udmHk698hEvwBAn1wgd9aW/D56ZiOZqa1EsJPWKgopdZhhkLIAoU0ipcqMTCgj1w7q+2pun27NvPXX6MTxVHy57UZm0CvpsonKXg1EOc3aCxRj9zJZNm8YfbiySmZAk9DSs4Z7rpfM30PDzLmZo8VlO7f+4Tv/ll2w1zPZvVXDrCy/qhr7dr1r0/b2EoZ54KstGhj+Tap4jDK/qd4E8JtjONrsROJQFQmO1hp/mO6FtPGNds2JPtShQaECblz0NPPAvW3ovlVd7j+PMXNg==; 5:OmM4fn3VlGpiJPX6fx4SVSUDfvifxJBhrpNiWBQkplHke4s5nkDLZVRcizi3MGJHKAQNKnUMH64hYT1v33S6kzc8dd0Z/kzTzZSz+YWJZb2RnUFkD/hdD509aOxPMHzhQfS+6n1N2ggSCg6j4bYiPA==; 24:maYT9edHFSBCHqo+EdWEeYYiiiaj68xFrPYcb9JBVruJrs/LU4Wk7NQ7rPAj00/1b4mUftB2XJ7uC84UHfSXXJ5bfyBmH30gML/2D5zTEOU=; 7:6DmbYvLYn1LqZ8Hh/p38hL5PXMijHB0R5mAzmCyvDy/M4rxK67b+7a+QhfsNKOBn80dYos1EPMBFuf8CCEU7sul0t+5Idz2QczXyepqVcsmFFN8knYEcTd6aMkCOANMJByKHf3aM4JpipJTzdsU4468zZg93XHt57aTrzUtsGApfGF3fg24HbaaWRq9sM3X1GPfmqmFqMv05eV+2HvYkBAkBsl5eyF0rPJlzD4p8rls=
x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR;
x-forefront-antispam-report: SFV:SKI; SCL:-1; SFV:NSPM; SFS:(10019020)(346002)(376002)(39860400002)(377454003)(24454002)(189002)(377424004)(199003)(13464003)(76176999)(54356999)(229853002)(2501003)(95246002)(86362001)(3280700002)(2906002)(68736007)(2900100001)(3660700001)(966005)(7736002)(106356001)(102836003)(6116002)(33646002)(101416001)(105586002)(50986999)(77096006)(51650200002)(54896002)(6306002)(99286003)(6512007)(2950100002)(189998001)(316002)(9686003)(8936002)(6486002)(93886005)(81166006)(81156014)(6246003)(39060400002)(236005)(53546010)(14454004)(8676002)(97736004)(53936002)(6506006)(15650500001)(110136005)(478600001)(606006)(25786009)(6436002)(5660300001)(63666004)(561944003); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR09MB1303; H:CY4PR09MB1495.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
x-ms-office365-filtering-correlation-id: 42e7fcb3-75ba-45ce-7e24-08d501c43d0a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(2017052603199)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CY4PR09MB1303;
x-ms-traffictypediagnostic: CY4PR09MB1303:
x-exchange-antispam-report-test: UriScan:(65766998875637)(192374486261705)(131327999870524)(100405760836317)(95692535739014);
x-microsoft-antispam-prvs: <CY4PR09MB1303519606F69A04C892377DF0670@CY4PR09MB1303.namprd09.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(6055026)(6041248)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123564025)(20161123555025)(20161123558100)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR09MB1303; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR09MB1303;
x-forefront-prvs: 0438F90F17
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_imrisdjonqv7qa6ej1tiuovb1506089285235emailandroidcom_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Sep 2017 14:14:29.0390 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR09MB1303
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/M2eF_N7AeiwQtiL45wPW6VIOqC8>
Subject: Re: [sacm] Draft updated charter for SACM
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Sep 2017 14:14:37 -0000

The charter should describe the work we are planning to do. The milestones should reflect the timing. Given that this group has suffered from a lack of agreement around what we are working on, I think it is prudent to be more concrete about our work items in the charter. I know of other WGs that do this when it serves their needs. I think we should keep and refine the work items text to get to a consensus position on what work needs to be done.

All of the work listed either is being worked on or has interested parties that are willing to do the work. This is another good reason to move forward with these work items.

Regards,
Dave


-------- Original Message --------
From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
Date: Thu, September 21, 2017 8:42 PM -0400
To: Adam Montville <adam.w.montville@gmail.com>, "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>, "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>, sacm@ietf.org
Subject: Re: [sacm] Draft updated charter for SACM

Hi Adam,
Thanks for that reminder….and yes, that was the gist of my comments.  That is, the charter is to define the intent of goals vs. calling out explicit drafts as those are best addressed in milestones….I am fine with the first proposed set of changes posted by Karen.  In general, I felt the additions are more suited for milestones.

                Nancy.

From: Adam Montville <adam.w.montville@gmail.com>
Date: Thursday, September 21, 2017 at 3:17 PM
To: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>, "ncamwing@cisco.com" <ncamwing@cisco.com>, "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>, "sacm@ietf.org" <sacm@ietf.org>
Subject: Re: [sacm] Draft updated charter for SACM

Would any of the additions/questions be addressed if we adhered to Karen's initial reminder that "we plan to call out specific drafts using the milestone process and not include them in the base charter"?


On Tue, Sep 19, 2017 at 1:41 PM Waltermire, David A. (Fed) <david.waltermire@nist.gov<mailto:david.waltermire@nist.gov>> wrote:
Comments inline below.

Thanks,
Dave

> -----Original Message-----
> From: sacm [mailto:sacm-bounces@ietf.org<mailto:sacm-bounces@ietf.org>] On Behalf Of Nancy Cam-
> Winget (ncamwing)
> Sent: Tuesday, September 19, 2017 2:07 PM
> To: Banghart, Stephen A. (Fed) <stephen.banghart@nist.gov<mailto:stephen.banghart@nist.gov>>;
> sacm@ietf.org<mailto:sacm@ietf.org>
> Subject: Re: [sacm] Draft updated charter for SACM
>
> Please see my comments below:
>
> On 9/18/17, 11:08 AM, "sacm on behalf of Banghart, Stephen A. (Fed)"
> <sacm-bounces@ietf.org<mailto:sacm-bounces@ietf.org> on behalf of stephen.banghart@nist.gov<mailto:stephen.banghart@nist.gov>> wrote:
>
>     All,
>
>     After discussion with a few other SACM document authors this version of
> the new charter proposal was put together. The changes throughout are
> minimal; the primary change is several additions to the work items section
> that covers other work currently being done in the WG.
>
>     Does anyone have any thoughts/comments/concerns on this proposed
> draft update?
>
>     Thanks,
>     Stephen Banghart
>
>     ------------------------------------------------------------------------------------------
>
>     SACM Charter Proposal
>     2017-09-12
>
>     Securing information and the systems that store, process, and transmit
> that information is a challenging task for organizations of all sizes, and many
> security practitioners spend much of their time on manual processes.
> Standardized protocols and models aiding collection and evaluation of
> endpoint attributes enable automation, thus freeing practitioners to focus on
> high priority tasks .
>
>     At its core, posture assessment  consists of five basic steps, which the
> working group desires to fulfill  in an innovative, automated manner capable
> of avoiding ad hoc or scheduled assessments:
>
>     1. Describe target endpoints
>     2. Determine specific endpoint elements  to assess
>     3. Collect and make available specified elements' actual values
>     4. Compare actual element values to expected element values
>     5. Make results available
>
>     This working group will focus on collection, evaluation, and orchestration
> and communication, as described herein.
>
>     A. Collection. The WG will define a standardized way to provide two types
> of imperative guidance to collectors over varying collection mechanisms:
>
>     1) Which target endpoints to collect from, and
>     2) What to collect from these target endpoints.
>
>     When classified , a set of instructions (such as vulnerability description
> data, YANG filter expressions, Windows Management Instrumentation
> classes, etc.) can be brokered to the appropriate collectors using the control
> plane functions  defined by "C. Orchestration and Communication" (below).
> Detecting and classifying desired attributes beforehand may require
> orchestrating functions that go beyond the set of capabilities a collector can
> provide, and will inform the requirements and characteristics for "C.
> Orchestration and Communication". The working group recognizes that
> manual configuration of targets and corresponding collection profiles will not
> scale and does not seem to be a viable option.
>
>     B. Evaluation. The working group will standardize a criteria language
> enabling evaluation of actual endpoint posture information against desired
> endpoint posture information to produce a standardized result. This
> extensible language will support complex Boolean statements, comparison
> operators, logical flow statements, and functions for string manipulation.
> Additionally, the working group will seek to discover an approach that allows
> data from any posture collection mechanism to be generically evaluated.
>
>     C. Orchestration and Communication. The working group will define a set
> of control plane functions to enable the discovery and orchestration
> between devices that can provide the requisite information  sought by
> posture collectors, posture evaluators, data repositories, and other SACM
> architectural components.
>
>     Due to the breadth of this work, the working group will address enterprise
> use cases pertaining to the assessment of endpoint posture (using the
> definitions of Endpoint and Posture from RFC 5209). The working group will,
> whenever reasonable and possible, reuse existing work.
> [NCW] I think we need to incorporate https://tools.ietf.org/html/draft-ietf-
> sacm-terminology as we need to have a well understood set of definitions
> beyond “endpoint” and “posture”

[daw: When you suggest incorporating sacm-terminology, are you suggesting to add it as a work item? I am in favor of adding terminology as a work item, but I am concerned with referencing unstable terminology in the charter. We don't want the meaning of the charter to change over time.]

>
>     Specific work items will include the following:
>
>     -  The WG will define a way to provide two types of imperative guidance to
> the correct SACM collectors: 1) Which target endpoints to collect from and 2)
> what to collect from these target endpoints. When classified, a set of
> instructions, such as vulnerability description data or YANG filter expressions,
> can be brokered to the appropriate collectors. Detecting and classifying
> beforehand might require orchestrating functions that go beyond the set of
> capabilities a SACM collector can provide.
>
>     -  The WG will describe a criteria language capable of being evaluated
> against endpoint posture information to produce a standardized result. The
> language will support complex Boolean statements, comparison operators,
> and functions for string manipulation; and will be extensible enough to be
> applicable to the full range of collected posture attributes. Additionally, this
> document will describe an approach that allows data from any posture
> collection mechanism to be evaluated.
>
>     - The WG will define a control plane function to enable the discovery and
> orchestration between devices that can provide the requisite information
> sought by posture collectors, posture evaluators or both. As an example, a
> document that describes an instance of such a control plane and transfer
> protocol for data, is through the use of XMPP and extensions as needed to
> demonstrate XMPP’s applicability to SACM.
>
>     - A method of expressing software metadata is needed that is suitable for
> use by constrained devices. The WG will create a standards track document
> that defines a CBOR-based format that represents software metadata to
> include software identification, file hashes, and other descriptive
> information. This format will be derived from the ISO/IEC 19770-2 Software
> Identification (SWID) tag standard.
> [NCW]  I am not sure why this is called out explicitly as software metadata
> could also be represented with the Yang model?  Perhaps the intent is to
> show this as one example for how it can be expressed?  That is, there are
> other representations that the IETF is looking at that could also be leveraged.

[daw: This work item description is for the draft-ietf-sacm-coswid work, which is SWID tag based. Doing this work is not mutually exclusive with work on YANG-based software models. I personally believe both should be worked on. By including this work item, I wanted to make sure we identified an existing portion of adopted SACM work as something we plan to complete under this revised charter. This does not exclude working on YANG models in SACM or elsewhere that relate to software.]

>
>     - To support collection of posture information from traditional computing
> devices (e.g., servers, laptops, etc.), the WG will create standards track
> documents describing mechanisms for the collection and delivery of
> information about installed software on an endpoint by extending IETF NEA.
>
>     - To provide for the integration of multiple standards to support posture
> information collection, the WG will define best practices  for the collection of
> posture information from endpoints and its delivery to a collector, from
> which it can be distributed using the SACM messaging standards.
> [NCW] This seems to
>
>     -The WG will define standards track documents describing extensions to
> the Resource-Oriented Lightweight Information Exchange (ROLIE) that
> provide IANA registrations and requirements to support the sharing of
> software, configuration information, and other forms of imperative
> guidance.
> [NCW] Similar to my previous comment, about CBOR/SWID,  there can be
> other means for providing information exchange.  For example, using Yang
> model and leveraging NETCONFs work for the information exchange.

[daw: This work item addresses  draft-banghart-sacm-rolie-softwaredescriptor (which has been adopted) and
draft-mandm-sacm-rolie-configuration-checklist. The ROLIE-based software descriptor model supports vendor-to-enterprise exchange of CBOR/XML SWID information (a type of imperative guidance), which can be used to provide golden measurements, to construct vulnerability detection data, and other security automation/assessment related use cases. Configuration setting checklists expressed in a machine readable form are another example of imperative guidance that can be exchanged over ROLIE with the definition of a proper extension. This imperative guidance can be used to drive collection and evaluation by defining what needs to be gathered and what the expected state must be according to policy. ROLIE exchanges are different than the exchanges supported by NETCONF and SWIMA, which are focused on endpoint-to-enterprise exchanges of current state. Both the vendor-to-enterprise and the endpoint-to-enterprise exchanges are needed in my view, since they support different aspects of the assessment workflow.]

>
>     Additionally, the working group will describe: 1) a SACM Architecture
> including protocol requirements and their associated use cases as well as a
> description of how SACM protocols fit together into a system, and 2) a SACM
> Information Model.
>
>
>     > -----Original Message-----
>     > From: sacm [mailto:sacm-bounces@ietf.org<mailto:sacm-bounces@ietf.org>] On Behalf Of Karen
>     > O'Donoghue
>     > Sent: Tuesday, September 12, 2017 12:48 PM
>     > To: sacm@ietf.org<mailto:sacm@ietf.org>
>     > Subject: [sacm] Draft updated charter for SACM
>     >
>     > Folks,
>     >
>     > Below is a draft update to our charter based on discussion at the last IETF
> and
>     > some subsequent private discussions. Comments welcome. Please
>     > remember that we plan to call out specific drafts using the milestone
> process
>     > and not include them in the base charter.
>     >
>     > Regards,
>     > Karen
>     >
>     > ***************
>     >
>     > SACM Charter Proposal
>     > 2017-09-12
>     >
>     > Securing information and the systems that store, process, and transmit
> that
>     > information is a challenging task for organizations of all sizes, and many
>     > security practitioners spend much of their time on manual processes.
>     > Standardized protocols and models aiding collection and evaluation of
>     > endpoint attributes enable automation, thus freeing practitioners to
> focus on
>     > high priority tasks.
>     >
>     > At its core, posture assessment consists of five basic steps, which the
>     > working group desires to fulfill in an innovative, automated manner
> capable
>     > of avoiding ad hoc or scheduled assessments:
>     >
>     > 1. Describe target endpoints
>     > 2. Determine specific endpoint elements to assess 3. Collect and make
>     > available specified elements' actual values 4. Compare actual element
> values
>     > to expected element values 5. Make results available
>     >
>     > This working group will focus on collection, evaluation, and orchestration
> and
>     > communication, as described herein.
>     >
>     > A. Collection. The WG will define a standardized way to provide two
> types of
>     > imperative guidance to collectors over varying collection mechanisms:
>     >
>     > 1) Which target endpoints to collect from, and
>     > 2) What to collect from these target endpoints.
>     >
>     > When classified, a set of instructions (such as vulnerability description
> data,
>     > YANG filter expressions, Windows Management Instrumentation classes,
>     > etc.) can be brokered to the appropriate collectors using the control
> plane
>     > functions defined by "C. Orchestration and Communication" (below).
>     > Detecting and classifying desired attributes beforehand may require
>     > orchestrating functions that go beyond the set of capabilities a collector
> can
>     > provide, and will inform the requirements and characteristics for "C.
>     > Orchestration and Communication". The working group recognizes that
>     > manual configuration of targets and corresponding collection profiles will
> not
>     > scale and does not seem to be a viable option.
>     >
>     > B. Evaluation. The working group will standardize a criteria language
> enabling
>     > evaluation of actual endpoint posture information against desired
> endpoint
>     > posture information to produce a standardized result. This extensible
>     > language will support complex Boolean statements, comparison
> operators,
>     > logical flow statements, and functions for string manipulation.
> Additionally,
>     > the working group will seek to discover an approach that allows data from
>     > any posture collection mechanism to be generically evaluated.
>     >
>     > C. Orchestration and Communication. The working group will define a set
> of
>     > control plane functions to enable the discovery and orchestration
> between
>     > devices that can provide the requisite information sought by posture
>     > collectors, posture evaluators, data repositories, and other SACM
>     > architectural components.
>     >
>     > Due to the breadth of this work, the working group will address
> enterprise
>     > use cases pertaining to the assessment of endpoint posture (using the
>     > definitions of Endpoint and Posture from RFC 5209). The working group
> will,
>     > whenever reasonable and possible, reuse existing work.
>     >
>     > Specific work items will include the following:
>     >
>     > - Collection: The WG will define a way to provide two types of imperative
>     > guidance to the correct SACM collectors: 1) Which target endpoints to
> collect
>     > from and 2) what to collect from these target endpoints. When classified,
> a
>     > set of instructions, such as vulnerability description data or YANG filter
>     > expressions, can be brokered to the appropriate collectors. Detecting
> and
>     > classifying beforehand might require orchestrating functions that go
> beyond
>     > the set of capabilities a SACM collector can provide.
>     >
>     > - Evaluation: The working group will describe a criteria language capable
> of
>     > being evaluated against endpoint posture information to produce a
>     > standardized result. The language will support complex Boolean
> statements,
>     > comparison operators, and functions for string manipulation; and will be
>     > extensible enough to be applicable to the full range of collected posture
>     > attributes. Additionally, this document will describe an approach that
> allows
>     > data from any posture collection mechanism to be evaluated.
>     >
>     > - Messaging: The WG will define a control plane function to enable the
>     > discovery and orchestration between devices that can provide the
> requisite
>     > information sought by posture collectors, posture evaluators or both. As
> an
>     > example, a document that describes an instance of such a control plane
> and
>     > transfer protocol for data, is through the use of XMPP and extensions as
>     > needed to demonstrate XMPP’s applicability to SACM.
>     >
>     > Additionally, the working group will describe: 1) a SACM Architecture
>     > including protocol requirements and their associated use cases as well as
> a
>     > description of how SACM protocols fit together into a system, and 2) a
> SACM
>     > Information Model.
>     >
>     > _______________________________________________
>     > sacm mailing list
>     > sacm@ietf.org<mailto:sacm@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/sacm
>     _______________________________________________
>     sacm mailing list
>     sacm@ietf.org<mailto:sacm@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sacm
>
>
> _______________________________________________
> sacm mailing list
> sacm@ietf.org<mailto:sacm@ietf.org>
> https://www.ietf.org/mailman/listinfo/sacm
_______________________________________________
sacm mailing list
sacm@ietf.org<mailto:sacm@ietf.org>
https://www.ietf.org/mailman/listinfo/sacm