Re: [sacm] ECP Architecture Diagram Feedback

Adam Montville <adam.w.montville@gmail.com> Wed, 04 April 2018 13:04 UTC

Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39B71128896 for <sacm@ietfa.amsl.com>; Wed, 4 Apr 2018 06:04:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AouMP9VFrdw3 for <sacm@ietfa.amsl.com>; Wed, 4 Apr 2018 06:04:23 -0700 (PDT)
Received: from mail-qk0-x22d.google.com (mail-qk0-x22d.google.com [IPv6:2607:f8b0:400d:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5318E127333 for <sacm@ietf.org>; Wed, 4 Apr 2018 06:04:23 -0700 (PDT)
Received: by mail-qk0-x22d.google.com with SMTP id w6so22357437qkb.4 for <sacm@ietf.org>; Wed, 04 Apr 2018 06:04:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=xLhKXjhJeAJ7Sias8chYgGY7su22+5DYiqiWFzo1nV0=; b=XxaIvysUhH+4s2ojgMuzh7P/ifqawZc2Mi7A1omAtHBQ0cXL78kiMsPsdFo1MkIIMk Okil1WF2epPThCccdTPNEf64HM36cPihBUds/pqdNobcbHyJ18u7+LGbTqQRObguirnE b6QYSGzVtjiEbQLNK+XOJENv+0VNkySAFctv6uS0EEOU31g3e9ZbMLmND338VzlndSvJ FE6JQuPvSYjL0QGuyAMIXSp0qe0Q8YZVjlrZ7D3+SEvwPYI5bYH/x16AfmMoZsb4RsFr 9rnn4Ji03BgfJZ1Z2hxoZasSutJeiDuOI/2S3tPEGaIrxamAzi5tfSOGczE+NevFj8Uc e/ww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=xLhKXjhJeAJ7Sias8chYgGY7su22+5DYiqiWFzo1nV0=; b=Kj4U1fKW5IOi6YG9ZQDrpzR77X27Smmlhu8zT/T+TEfxQv5v/IdlyMCy3JHlKaIdwT dUz7gVhB2CuBcD5kNQOdA7zf9kZj/ulHSO2fLG6zAzV5ZCGErFu0dZR6Q/P294ZTVATl Oq4Svu5jqsXnruiUh+rmgMjyN6Ibt/XfmqX9Ek44yLwzrBi4KrW/1MDqKFuyaNIsKMhR eYUoq4X6//zqv7cPQGd5ukoKcsLSAApT5Dvr1XPZwVEDILuggEvRzrY7tb4GNARl1pDe GnZF7+WSvvgBsKmPBN1humfrMcmsWjnWvR9ZQPi75zACM3OCBPPlLef3SfROUlcQwWsd 1fZA==
X-Gm-Message-State: ALQs6tBvMphs0KguIwWrQrC28NcOnKXinNPOTEfICbyIJj5AzyjKbQkM HjegQ5BWlohrabIsZ/V1heg=
X-Google-Smtp-Source: AIpwx4+VSLVJzx6AGW68aFB0xbN7AaaHqaTXYvl9oodEeFJrOSpRP3hyID0IL4AckyBpmHQMb/NnVg==
X-Received: by 10.55.161.69 with SMTP id k66mr24689811qke.55.1522847062329; Wed, 04 Apr 2018 06:04:22 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id b125sm4139983qkd.62.2018.04.04.06.04.19 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 04 Apr 2018 06:04:21 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Message-Id: <4A75DCB1-9AFA-411D-B22D-741B067B2429@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_57C6258E-3B26-4043-B317-7FDF0DED6739"
Mime-Version: 1.0 (Mac OS X Mail 11.3 \(3445.6.18\))
Date: Wed, 04 Apr 2018 08:04:18 -0500
In-Reply-To: <CAOxmg6tbzQBpqubuxn5DPFe1mcB7gjhX3hr5g8A4hMoexyki-A@mail.gmail.com>
Cc: "Haynes Jr., Dan" <dhaynes@mitre.org>, "sacm@ietf.org" <sacm@ietf.org>
To: Sherif Mansour <cherifmansour@gmail.com>
References: <DM5PR0901MB2197070C2CF8BA9A4283251CA5A60@DM5PR0901MB2197.namprd09.prod.outlook.com> <D0D3E5A5-2D22-4B3A-AD3E-27386CC43887@gmail.com> <DM5PR0901MB2197CA6B3C285DD17A0D1C04A5A50@DM5PR0901MB2197.namprd09.prod.outlook.com> <CAOxmg6tbzQBpqubuxn5DPFe1mcB7gjhX3hr5g8A4hMoexyki-A@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.6.18)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/_XmXeG57byGlSDekvP03ELsnT7U>
Subject: Re: [sacm] ECP Architecture Diagram Feedback
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Apr 2018 13:04:26 -0000


> On Apr 3, 2018, at 4:36 PM, Sherif Mansour <cherifmansour@gmail.com> wrote:
> 
> Hi Danny,
> 
> I would recommend that the Orchestrator sits between the posture manager and repository. This is for a few reasons, some tactical and some strategic:
> Strategically (Long term), it allows you to switch between posture managers without having to do much (if any) changes on the repository, in their all it means is it will be pulling data through the orchatrator, it just happens to be from a different tool.
> Tactically (short term), is is because these connections currently do not exist, so if you have many posture managers you need to develop different integration in several areas (one connection for the orchestrator & repository). By leveraging the orchastrator, you only need to create a singe integration with the posture manager, it simply just needs more features (i.e. the ability to pull security end point findings, both in raw vendor specific data or in a uniform agreed data model).
Logically, I think I could see this, but in practice it's not always applicable. An orchestrator should orchestrate, but not necessarily be responsible for data transfer. 

> The second point is that there are a few "invisible" boxes. The first is reference data, a lot of the repository data would be enriched with information that is specific to the organization such as the team which owns specific assets or the context to which they are used. Now, on thing that is out of scope is the reporting, I am aware this is out of scope, but an organisation has not moved the needle in terms of security if they have detected security issues but not resolved them. It is therefore natural that there is an interface somewhere between the repository and a reporting system. 
> 
> Finally one key benefit of the orchestrator is automation and self service, there for an interface to allow it to work in a devops model would also increase its value, if the interface can (easily) integrate with Jenkins/Bamboo, or chef recipes / Ansible playbooks, this would go a long way for adoption.
> 
> -Sherif
> 
> 
> 
> 
> 
> 
> 
> On Tue, Apr 3, 2018 at 7:36 PM, Haynes Jr., Dan <dhaynes@mitre.org <mailto:dhaynes@mitre.org>> wrote:
> Hi Adam,
> 
>  
> 
> I hope it was a good trip out there and that you were able to see some of the sights!
> 
>  
> 
> As far as scoping and the diagram, I think it’s worth nothing that all the components in it are in scope for ECP. It is just a matter of when we actually get to creating drafts for them (if that makes any sense). I think what you are looking for is a diagram that shows what we are currently working on? Or, maybe I am misunderstanding your comments?
> 
>  
> 
> Thanks,
> 
> Danny   
> 
>  
> 
> From: Adam Montville [mailto:adam.w.montville@gmail.com <mailto:adam.w.montville@gmail.com>] 
> Sent: Monday, April 02, 2018 3:33 PM
> To: Haynes Jr., Dan <dhaynes@mitre.org <mailto:dhaynes@mitre.org>>
> Cc: sacm@ietf.org <mailto:sacm@ietf.org>
> Subject: Re: [sacm] ECP Architecture Diagram Feedback
> 
>  
> 
> Hi Danny,
> 
>  
> 
> We missed you in London. I think the diagram is ok, but I do have scoping questions (just sent to the list) which may suggest some modification to the diagram once resolved. If the way I'm interpreting the ECP draft at this point is close to accurate, then it might be a good idea to add a horizontal scoping line between the left hand and the right hand of the diagram, where the posture manager is the first component on the right-hand side. Alternatively, an in-scope boundary box could be drawn around the appropriate components.
> 
>  
> 
> What really matters is whether the diagram accurately depicts the intended scope of the draft from the authors' perspectives, and whether a typical reader would see it that way.
> 
>  
> 
> Adam
> 
> 
> 
> 
> On Apr 2, 2018, at 1:32 PM, Haynes Jr., Dan <dhaynes@mitre.org <mailto:dhaynes@mitre.org>> wrote:
> 
>  
> 
> Hi Everyone,
> 
> At IETF 101, we presented an updated architecture diagram [1] that was based on feedback from the September virtual interim [2][3] and was included in the ECP -01 draft [4]. During the meeting, we did not receive any feedback on the architecture diagram.
> 
>  
> 
> As a result, we just wanted to follow-up on the list and see if there was any feedback or objections to the updated ECP architecture diagram that was proposed.
> 
>  
> 
> Thanks,
> 
> Danny
> 
>  
> 
>  
> 
> [1] https://datatracker.ietf.org/meeting/101/materials/slides-101-sacm-endpoint-compliance-profile-00 <https://datatracker.ietf.org/meeting/101/materials/slides-101-sacm-endpoint-compliance-profile-00> (see slide 4)
> 
> [2] https://datatracker.ietf.org/doc/slides-interim-2017-sacm-03-sessa-ecp/00/ <https://datatracker.ietf.org/doc/slides-interim-2017-sacm-03-sessa-ecp/00/> (see slide 5)
> 
> [3] https://datatracker.ietf.org/meeting/interim-2017-sacm-03/materials/minutes-interim-2017-sacm-03-201709260900-00 <https://datatracker.ietf.org/meeting/interim-2017-sacm-03/materials/minutes-interim-2017-sacm-03-201709260900-00> (see page 1 and 2)
> 
> [4] https://datatracker.ietf.org/doc/draft-ietf-sacm-ecp/ <https://datatracker.ietf.org/doc/draft-ietf-sacm-ecp/>
>  
> 
> _______________________________________________
> sacm mailing list
> sacm@ietf.org <mailto:sacm@ietf.org>
> https://www.ietf.org/mailman/listinfo/sacm <https://www.ietf.org/mailman/listinfo/sacm>
>  
> 
> 
> _______________________________________________
> sacm mailing list
> sacm@ietf.org <mailto:sacm@ietf.org>
> https://www.ietf.org/mailman/listinfo/sacm <https://www.ietf.org/mailman/listinfo/sacm>
> 
>