Re: [sacm] SACM BoF Request
"Baker, Jon" <bakerj@mitre.org> Wed, 26 September 2012 02:06 UTC
Return-Path: <bakerj@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B108F1F0C95 for <sacm@ietfa.amsl.com>; Tue, 25 Sep 2012 19:06:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VwcbA-HYfUxr for <sacm@ietfa.amsl.com>; Tue, 25 Sep 2012 19:06:56 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 785FC1F0C51 for <sacm@ietf.org>; Tue, 25 Sep 2012 19:06:54 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 8E44E21B0D07; Tue, 25 Sep 2012 22:06:53 -0400 (EDT)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 6FEF821B0D04; Tue, 25 Sep 2012 22:06:53 -0400 (EDT)
Received: from IMCMBX03.MITRE.ORG ([169.254.3.178]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.02.0318.001; Tue, 25 Sep 2012 22:06:53 -0400
From: "Baker, Jon" <bakerj@mitre.org>
To: "Moriarty, Kathleen" <kathleen.moriarty@emc.com>, "Waltermire, David A." <david.waltermire@nist.gov>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: SACM BoF Request
Thread-Index: Ac2PpI2xUd5L9DozTL2wga4UXLDq3gBPqh4QAdU48n4ATkiD4AALKfEgAHsIJlA=
Date: Wed, 26 Sep 2012 02:06:52 +0000
Message-ID: <6C1C15D8B5510B4B8FF132B10D3865130227FCAA@IMCMBX03.MITRE.ORG>
References: <66930F41F45C954AA119D59EE69C06E90C69E659DF@MBCLUSTER.xchange.nist.gov>, <D7A0423E5E193F40BE6E94126930C4930BA25D8895@MBCLUSTER.xchange.nist.gov> <F5063677821E3B4F81ACFB7905573F24092B0176@MX15A.corp.emc.com> <6C1C15D8B5510B4B8FF132B10D3865130225EEB0@IMCMBX03.MITRE.ORG> <F5063677821E3B4F81ACFB7905573F2409292AF4@MX15A.corp.emc.com>
In-Reply-To: <F5063677821E3B4F81ACFB7905573F2409292AF4@MX15A.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [129.83.31.51]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [sacm] SACM BoF Request
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discussion List for IETFers interested in the Security Content Automation Protocol \(SCAP\)." <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sacm>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Sep 2012 02:06:57 -0000
In your message below, you say "select either CPE or SWID". I really have not looked at it as a one or the other decision. I believe that there remains a need for both efforts. SWIDs are well suited for identifying specific instances of installed software all the way down to the patch level. However, SWIDS are not currently designed to support what we have referred to as abstract names like "Windows 7". Security guidance is generally written to target these sorts of abstractions. Vulnerability information is often reported and shared using these sorts of abstractions. For example, "Flash 1.2.3 has a zero day vulnerability that is actively being exploited." Enterprise reporting also tends to leverage this abstraction capability. To make this work you end up needing a way to determine if one name matches another (CPE Matching Spec) and a way to state that something (benchmark/vulnerability/etc) applies to a given platform (CPE Applicability). I think there is a near and medium term need for both efforts. There has also been a lot of recent work to harmonize the efforts. Jon ============================================ Jonathan O. Baker G022 - IA Industry Collaboration The MITRE Corporation Email: bakerj@mitre.org >-----Original Message----- >From: Moriarty, Kathleen [mailto:kathleen.moriarty@emc.com] >Sent: Sunday, September 23, 2012 11:15 AM >To: Baker, Jon; Waltermire, David A.; sacm@ietf.org >Subject: RE: SACM BoF Request > >Hi Jon, > >With the recent approval of CPE specifications by the ITU-T, these are now >formal recommendations and I believe the full content was included in these >Recommendations (5 total Recommendations), is that correct? If the group >were to select either CPE or SWID, it would need to be by reference now, >correct? > >Best regards, >Kathleen > >-----Original Message----- >From: sacm-bounces@ietf.org [mailto:sacm-bounces@ietf.org] On Behalf Of >Baker, Jon >Sent: Sunday, September 23, 2012 5:59 AM >To: Moriarty, Kathleen; Waltermire, David A.; sacm@ietf.org >Subject: Re: [sacm] SACM BoF Request > >Also, I noticed the following: > >>- A Standards Track document specifying platform naming >>- A Standards Track document specifying platform matching >>- A Standards Track document specifying platform applicability > >Those seem to roughly align with CPE Naming, CPE Matching, CPE Applicability >Language. Has the group considered the SWID specification (ISO/IEC 19770-2). >The following page and its referenced document may be of help in >considering how cpe and swids fit together: > >http://tagvault.org/Automating_CPE_name_creation > > >Jon > >============================================ >Jonathan O. Baker >G022 - IA Industry Collaboration >The MITRE Corporation >Email: bakerj@mitre.org > > >>-----Original Message----- >>From: sacm-bounces@ietf.org [mailto:sacm-bounces@ietf.org] On Behalf Of >>Moriarty, Kathleen >>Sent: Friday, September 21, 2012 4:32 PM >>To: Waltermire, David A.; sacm@ietf.org >>Subject: Re: [sacm] SACM BoF Request >> >>Hello, >> >>I am including an updated version of the SACM Charter that includes more of >>an emphasis on the protocols to share and exchange data within and >between >>enterprises/organizations. Please feel free to provide feedback to the list! >> >>Thanks & have a good weekend! >>Kathleen >> >> >> >>BOF full name: Security Automation and Continuous Monitoring [SACM] >>AREA: Security >>BOF Chairs: Kathleen Moriarty (kathleen.moriarty@emc.com) >> David Waltermire (david.waltermire@nist.gov) >>Agenda: >> >>* Review the draft charter >>* Review draft-waltermire-sacm-use-cases-02 >>* Review drafts submitted in support of the charter >> - draft-waltermire-content-repository-00 >> - More expected before -00 deadline >> >>Full Description of BOF: The SACM BoF is intended to progress the work from >>the SACM mailing list to solidify discussions on a proposed charter, use cases >>and milestones in support of moving to an IETF working group. >> >>CONFLICTS to avoid: SAAG, MILE >>Expected Attendance: 40, not sure what the previous attendance was? >>Special Requests: Meetecho support >>Number of sessions: 1 >>Length of session: 2 hours >> >>Draft Charter: >> >>Proposed Working Group Charter >> >>Chairs: >>TBD >>TBD >> >>Security Area Directors: >> Stephen Farrell <stephen.farrell@cs.tcd.ie> >> Sean Turner <turners@ieca.com> >> >>Security Area Advisor: >> Sean Turner <turners@ieca.com> >> >>Mailing Lists: >> General Discussion: sacm@ietf.org >> To Subscribe: http://www.ietf.org/mailman/listinfo/sacm >> Archive: http://www.ietf.org/mail-archive/web/sacm >> >>Description of Working Group >> >>Securing information and the systems that store, process, and transmit that >>information has become a challenging task for organizations of all sizes, and >>we find that security practitioners spend most of their time on manual >>processes relegating them to ineffectiveness. Security automation to verify >>system configurations with the ability to prioritize risk based on increased >>situational awareness from shared intelligence is the key to escaping this rut. >>This working group will develop security automation protocols and data >>format standards in support of information security processes and practices >>where practical. These standards will help security practitioners to be better >>utilized within their organizations by automating routine tasks related to >>endpoint and server security so that practitioners can focus on more >>advanced tasks. The initial focus of this work is to address enterprise use >>cases. >> >>The working group will achieve this by enabling the exchange of shared >>intelligence and continuing the security automation work already performed >>by various organizations around the world. The initial work has been fruitful, >>and the data formats previously published are ready for expansion on the >>international stage. Of particular interest to this working group are the >>security automation specifications supporting asset, change, configuration, >>and vulnerability management. Of additional interest to this working group >>are the emerging security automation interfaces and data formats relating to >>event management and continuous assessment. The continuous >assessment >>capabilities enable organizational situational awareness through frequent >>snapshots of the operating state of their environment, with risk prioritized >>based on consumed information provided by shared intelligence >>(vulnerabilities, threats, etc.). >> >>By undertaking this work, we recognize that there are multiple categories of >>problems in the security automation domain: enabling interoperable data >>exchanges through standardized protocols, defining expressions for >particular >>domain concepts (i.e. data formats), establishing a standards-based >>foundation supporting the curation and exchange of security automation >>content collections in content repositories, and enabling interoperability >>through the development and use of standard interfaces and >communications >>protocols. Content based on rich data standards and protocols will provide >the >>authoritative instructions needed by data-driven tools to enable the >>automated collection and exchange of configuration and vulnerability data >>pertaining to enterprise assets. Information produced by these tools will >>provide accurate and timely situational awareness in support of >organizational >>decision making. >> >>The data exchange protocols will need to meet several exchange types >>including those between and within organizations for sharing intelligence >data >>to increase situational awareness, report exchanges both internal and >>external to an enterprise, and those between enterprise servers and end >>points for assessments >> >>This working group will provide solutions to these categories of problems >and >>the main areas of focus for this working group are described as follows: >> >>1. Define, either by normative reference, adoption, or creation, a set of >>standards to enable the exchange of data to increase situational awareness >or >>gain access to shared content to improve the security posture of an >>enterprise. This area of focus provides for the integration of interoperable >>protocols to access shared data repositories between organizations to >>increase situational awareness and reduce risks to an enterprise. In support >>of accessing shared intelligence for expected system state and related risks, >>define, either by normative reference, adoption, or creation, a set of >>standards that can be used for the purpose of assessing and aggregating >>device states and comparing these device states against expected values, >and >>reporting on those results in a predefined or ad hoc manner. This area of >>focus provides for necessary language and data format specifications. >> >>3. Define, either by normative reference, adoption, or creation, a set of >>standards that can be used to continuously assess and report on the state of >>systems, composed of many different types of devices and networks, >>operated by varying personnel, to ensure security process effectiveness in a >>pre-defined or ad-hoc manner. This area of focus provides for integration >>protocols supporting plug and play continuous assessment and security >>automation networking within an enterprise. >> >>This working group will achieve the following milestones in two phases: >> >>Phase One >>- A standards track document to define a protocol for interacting with >content >>repositories >>- Standards Track document specifying security automation/continuous >>assessment interfaces >>- A Standards Track document specifying communication protocols used for >>security automation and continuous assessment >>- A Standards Track document describing the messages and network >protocols >>for distributing security automation content (content repository) >>- A Standards Track document describing protocols and data formats for >>securely sharing dynamic network state information among security systems >>- A Standards Track document specifying asset description format >>- A Standards Track document specifying asset identification >>- A Standards Track document specifying platform naming >>- A Standards Track document specifying platform matching >>- A Standards Track document specifying platform applicability >> >>Phase Two >>- A Standards Track document specifying a control framework representation >>format. >>- A Standards Track document specifying benchmark configuration >>representation >>- An Informational document stating guidelines / requirements for specifying >>checking languages >>- Standards Track documents specifying device state checking languages >>- A Standards Track document specifying an interrogative checking language >>- A Standards Track document specifying asset reporting information >>- Standards Track document describing how to use the languages and other >>content defined in this group with the NEA protocols >>_______________________________________________ >>sacm mailing list >>sacm@ietf.org >>https://www.ietf.org/mailman/listinfo/sacm >_______________________________________________ >sacm mailing list >sacm@ietf.org >https://www.ietf.org/mailman/listinfo/sacm
- [sacm] FW: SACM BoF Request Waltermire, David A.
- Re: [sacm] FW: SACM BoF Request Adam W. Montville
- Re: [sacm] FW: SACM BoF Request Waltermire, David A.
- Re: [sacm] FW: SACM BoF Request Adam Montville
- Re: [sacm] FW: SACM BoF Request david.oliva
- Re: [sacm] FW: SACM BoF Request Davidson II, Mark S
- Re: [sacm] FW: SACM BoF Request Adam Montville
- Re: [sacm] FW: SACM BoF Request Waltermire, David A.
- Re: [sacm] FW: SACM BoF Request Davidson II, Mark S
- Re: [sacm] FW: SACM BoF Request Moriarty, Kathleen
- Re: [sacm] FW: SACM BoF Request Michael Hammer
- Re: [sacm] SACM BoF Request Moriarty, Kathleen
- Re: [sacm] SACM BoF Request Baker, Jon
- Re: [sacm] SACM BoF Request Baker, Jon
- Re: [sacm] SACM BoF Request Moriarty, Kathleen
- Re: [sacm] SACM BoF Request Moriarty, Kathleen
- Re: [sacm] SACM BoF Request Gunnar Engelbach
- Re: [sacm] SACM BoF Request Adam Montville
- Re: [sacm] SACM BoF Request Martin, Robert A.
- Re: [sacm] FW: SACM BoF Request Sean Turner
- Re: [sacm] SACM BoF Request Sean Turner
- Re: [sacm] SACM BoF Request Baker, Jon
- Re: [sacm] SACM BoF Request Sean Turner
- Re: [sacm] SACM BoF Request Baker, Jon
- Re: [sacm] SACM BoF Request Moriarty, Kathleen
- Re: [sacm] SACM BoF Request Adam Montville
- Re: [sacm] SACM BoF Request Baker, Jon
- Re: [sacm] SACM BoF Request Jan-Oliver Wagner
- Re: [sacm] SACM BoF Request Moriarty, Kathleen
- Re: [sacm] SACM BoF Request Adam W. Montville
- [sacm] SWID and CPE: WAS - Re: SACM BoF Request Adam Montville
- Re: [sacm] SWID and CPE: WAS - Re: SACM BoF Reque… Cheikes, Brant A.
- Re: [sacm] SWID and CPE: WAS - Re: SACM BoF Reque… Steve Klos
- Re: [sacm] SWID and CPE: WAS - Re: SACM BoF Reque… Jan-Oliver Wagner
- Re: [sacm] SWID and CPE: WAS - Re: SACM BoF Reque… Michael Hammer
- Re: [sacm] SWID and CPE: WAS - Re: SACM BoF Reque… Steve Klos