Security Automation and Continuous Monitoring WG D. Waltermire
Internet-Draft NIST
Intended status: Informational A. Montville
Expires: August 15, 2015 CIS
D. Harrington
Effective Software
N. Cam-Winget
Cisco Systems
J. Lu
Oracle Corporation
B. Ford
Lancope
M. Kaeo
Double Shot Security
February 11, 2015

Terminology for Security Assessment
draft-ietf-sacm-terminology-06

Abstract

This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on August 15, 2015.

Copyright Notice

Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

Our goal with this document is to improve our agreement on the terminology used in documents produced by the IETF Working Group for Security Automation and Continuous Monitoring. Agreeing on terminology should help reach consensus on which problems we're trying to solve, and propose solutions and decide which ones to use.

2. Terms and Definitions

This section describes terms that have been defined by other RFC's and defines new ones. The predefined terms will reference the RFC and where appropriate will be annotated with the specific context by which the term is used in SACM.

Assessment

Asset

Asset characterization

Asset Management

Asset Targeting

Attribute

Broker

Building Block

Capability

Client

Collection Task

Consumer

Endpoint

Evaluation Task

Endpoint Target

Endpoint Discovery

Evaluation Result

Expected Endpoint State

Function

Information Model

Management Plane (TBD per list; was "Control Plane")

Posture

Posture Attributes

Provider

Proxy

Repository

Role

Security Automation

Supplicant

System Resource

3. IANA Considerations

This memo includes no request to IANA.

4. Security Considerations

This memo documents terminology for security automation. While it is about security, it does not affect security.

5. Acknowledgements

6. Change Log

6.1. ietf-sacm-terminology-01- to -02-

Added simple list of terms extracted from UC draft -05. It is expected that comments will be received on this list of terms as to whether they should be kept in this document. Those that are kept will be appropriately defined or cited.

6.2. ietf-sacm-terminology-01- to -02-

Added Vulnerability, Vulnerability Management, xposure, Misconfiguration, and Software flaw.

6.3. ietf-sacm-terminology-02- to -03-

Removed Section 2.1. Cleaned up some editing nits; broke terms into 2 sections (predefined and newly defined terms). Added some of the relevant terms per the proposed list discussed in the IETF 89 meeting.

6.4. ietf-sacm-terminology-03 to -04-

TODO

6.5. ietf-sacm-terminology-04 to -05-

TODO

6.6. ietf-sacm-terminology-05 to -06-

7. Informative References

[RFC3444] Pras, A. and J. Schoenwaelder, "On the Difference between Information Models and Data Models", RFC 3444, January 2003.
[RFC4949] Shirey, R., "Internet Security Glossary, Version 2", RFC 4949, August 2007.
[RFC5209] Sangster, P., Khosravi, H., Mani, M., Narayan, K. and J. Tardo, "Network Endpoint Assessment (NEA): Overview and Requirements", RFC 5209, June 2008.

Authors' Addresses

David Waltermire National Institute of Standards and Technology 100 Bureau Drive Gaithersburg, Maryland 20877 USA EMail: david.waltermire@nist.gov
Adam W. Montville Center for Internet Security 31 Tech Valley Drive East Greenbush, New York 12061 USA EMail: adam.w.montville@gmail.com
David Harrington Effective Software 50 Harding Rd Portsmouth, NH 03801 USA EMail: ietfdbh@comcast.net
Nancy Cam-Winget Cisco Systems 3550 Cisco Way San Jose, CA 95134 US EMail: ncamwing@cisco.com
Jarrett Lu Oracle Corporation 4180 Network Circle Santa Clara, California 95054 EMail: jarrett.lu@oracle.com
Brian Ford Lancope 3650 Brookside Parkway, Suite 500 Alpharetta, Georgia 30022 EMail: bford@lancope.com
Merike Kaeo Double Shot Security 3518 Fremont Avenue North, Suite 363 Seattle, Washington 98103 EMail: merike@doubleshotsecurity.com