[sacm] I-D Action: draft-ietf-sacm-vuln-scenario-02.txt
internet-drafts@ietf.org Fri, 09 September 2016 14:17 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 196EE12B034; Fri, 9 Sep 2016 07:17:54 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.32.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <147343067409.8120.132730152426085899.idtracker@ietfa.amsl.com>
Date: Fri, 09 Sep 2016 07:17:54 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/_FC95RLHqawGfUgVREfS5iEjx5E>
Cc: sacm@ietf.org
Subject: [sacm] I-D Action: draft-ietf-sacm-vuln-scenario-02.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.17
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Sep 2016 14:17:54 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Security Automation and Continuous Monitoring of the IETF. Title : SACM Vulnerability Assessment Scenario Authors : Christopher Coffin Brant Cheikes Charles Schmidt Daniel Haynes Jessica Fitzgerald-McKay David Waltermire Filename : draft-ietf-sacm-vuln-scenario-02.txt Pages : 24 Date : 2016-09-09 Abstract: This document describes an automated enterprise vulnerability assessment scenario aligned with the SACM Use Cases. The scenario assumes the existence of endpoint management capabilities and begins with an enterprise ingesting vulnerability description information. Endpoints are assessed against the vulnerability description information based on a combination of examining known endpoint characterization information and collected endpoint information. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-sacm-vuln-scenario/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-ietf-sacm-vuln-scenario-02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-vuln-scenario-02 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [sacm] I-D Action: draft-ietf-sacm-vuln-scenario-… internet-drafts