<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parsons-opsawg-security-operations-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Security Operations">Security Operations Fundamentals and Guidance</title>
    <seriesInfo name="Internet-Draft" value="draft-parsons-opsawg-security-operations-01"/>
    <author fullname="Michael Parsons">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>michael.p1@ncsc.gov.uk</email>
      </address>
    </author>
    <author fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>florence.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2026" month="May" day="20"/>
    <area>OPS</area>
    <workgroup>TBD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>
<t>Security operators are responsible for detecting malicious activity, responding to threats and defending their networks and systems from cyber attacks. Security operations are commonly entwined with other operational and management priorities to ensure that both security and operational priorities are considered holistically.</t>
      <t>With security operators being a crucial part of operation, management and security of the network, it is valuable to give consideration to them during the design of new protocols. This document builds upon draft-ietf-opsawg-rfc5706bis, describing the fundamentals of security operations to provide a foundation for considerations for protocol design and guidance. This document also describes how security operations considerations can be most usefully included in other IETF documents.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parsons-opsawg-security-operations/"/>.
      </t>
      <t>
      </t>
    </note>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Security operations are a crucial part of both the security and management of a network, enterprise or system. Security operators work to not only prevent cyber attacks but also to identify, limit the impact of and recover from attacks that bypass preventative security controls, through monitoring and responding to threats as part of day-to-day operation.</t>
      <t>The approach, tools and day-to-day work of security operators is deeply tied together with the protocols that run over their networks and are used by attackers and defenders. As such, it is valuable to provide security operators with guidance to address any changes that may affect ability to detect and respond to threats when deploying a new protocol. This document describes how one might consider how the range of functions of a security operator may be impacted and, where possible, suggests how to document these and provide guidance on deployment or operation. This early guidance is particularly valuable as retrofitting mechanisms can be difficult and any impact may risk both the operational efficiency and security of the network.</t>
      <t>Security operations are commonly run from a Security Operations Centre (SOC); a centralised team or function that includes both cyber security analysts and operational engineers protect and defend the network. Many different of organisations will have a SOC, particularly those that manage sensitive data, or provide a critical service. A SOC is distinguished from a Network Operations Centre (NOC) by its function. While a SOC is responsible for protecting an organisation from and responding to cyber attacks, a NOC is responsible for ensuring that network performance is maintained during normal business.</t>
      <t>Those who work in security operations may have many different roles or job titles including, but not limited to, cyber security analyst, incident responder, security engineer and security operations manager. In this document the term security operator is used to cover all roles in security operations.</t>
      <t>Security operators improve the security of the network through a broad range of functions. These range from pre-emptive threat intelligence and knowledge building, through continuous network management and monitoring for suspicious activity, responding to incidents and defending the network during an attack, and recovery of the system to a secure state following an incident.</t>
      <t>One organisational model is for operational and security responsibilities to be managed by separate teams with distinct objectives: security teams focusing on identifying and mitigating cyber security threats, and operational teams prioritising availability, performance, and the overall efficiency of network services. This model can have advantages, for example in enabling separation of duties. However, complete separation can also lead to conflicting priorities and outcomes. For example, security or compliance requirements could delay the deployment of new services, while operational and efficiency requirements could inadvertently introduce weaknesses that increase security risks.</t>
      <t>The term SecOps <xref target="SECOPS"/>, is commonly used to define an approach to combine operational and security teams, tools and processes to ensure both the protection and reliable operation of networks. As cyber security threats continue to increase in both frequency and scale, a more integrated and coordinated approach is often necessary. When security processes are siloed from operational processes, it can be challenging to adapt to emerging threats in a timely manner, and overall security may be reduced. Embedding security practices directly into operation and management, rather than as a bolt-on, is often vital for security, hence security operations becoming an integral part of the operation and management of many environments and enterprises. In this model the NOC and SOC may be one function, focused on both network performance and security, although this is not required. The SecOps approach considers the system as a whole in order to achieve both security and operational goals.</t>
      <t>As such, security operations should be considered during the design of new protocols. This document outlines the key fundamentals of security operations to supplement the guidance provided in <xref target="I-D.ietf-opsawg-rfc5706bis"/> to support protocol designers.This document provides fundamentals but is not exhaustive; protocol designers are encouraged to work with security operators during development and review.</t>
    </section>
    <section anchor="responsibilities-of-security-operators">
      <name>Responsibilities of Security Operators</name>
      <t>Security operators have key responsibilities to ensure the security of their network, which can be broken down into the categories below. During the design of new protocols, it may be useful to take these responsibilities into account to reduce or highlight any potential adverse impact. Different organisations will consider different functions and roles as part of their security operations team, so these categories will not apply to all organisations.</t>
      <section anchor="threat-intelligence">
        <name>Threat Intelligence</name>
        <t>Threat Intelligence (TI) is a term used to refer to the knowledge of cyber attackers' activities. This may include an understanding of a threat actor's motivations, in-depth technical descriptions, and indicators of an attacker's activities. Security operators can both produce their own Threat Intelligence and consume it from other sources to stay ahead of new attacker techniques. Building Threat Intelligence includes the collection, analysis and dissemination of information about possible cyber security threats. Security operators are responsible for developing their understanding of threat actor capabilities, tools and techniques in order to plan ahead to mitigate and respond to potential threats. They also ensure Threat Intelligence information is deployed across their network to support detection of malicious activity. Effective deployment of Threat Intelligence contributes not only to the security of the networks under the operators' responsibility but also strengthens the broader security community by enabling shared awareness of evolving threats.</t>
      </section>
      <section anchor="security-monitoring">
        <name>Security Monitoring</name>
        <t>Security operators are responsible for monitoring all parts of the environment that they are protecting and managing including any infrastructure, network traffic, endpoints, data flows and log sources. The objective of this monitoring is to establish a baseline of normal activity and identify deviations that may indicate malicious activity. It is essential that this monitoring is continuous as advanced actors frequently "dwell" in the network to evade immediate detection and conduct malicious activity at known operational downtimes to reduce the likelihood of being observed by security operators. In addition to reactive monitoring, security operators perform proactive "threat hunting". Rather than awaiting alerts generated by security tooling, threat hunting involves targeted analysis of the network and investigation to identify previously unknown indicators of malicious activity. Based on the Threat Intelligence responsibility, security operators are responsible for developing their capability to detect attackers, through developing and using tooling, which will involve engineering and operational experts to ensure this capability is maintained and improved.</t>
      </section>
      <section anchor="incident-response">
        <name>Incident Response</name>
        <t>Security operators are responsible for responding to cyber security incidents should the network be targeted by a cyber attack. Such attacks can have significant impact, and a vital part of a security operator's role is to design, implement and update an incident response plan to minimise the impact and help normal operations resume as quickly as possible. Through effective security monitoring, security operators discover potential suspicious activity, and it is their responsibility to investigate this and determine whether the activity is malicious. In the event of confirming such an attack on the network, the security operators will follow their plan to conduct rapid response to defend against the attack, reduce its impact and return the network to a secure and operational state. Following the resolution of an incident, security operators also conduct post incident analysis to understand the impact, for example if any data breaches occurred, and may perform a root-cause analysis to prevent similar attacks in future.</t>
        <t>Security operators have a range of tools and techniques that they commonly deploy and rely upon to be able to fulfil these responsibilities, which should be considered during protocol design.</t>
      </section>
    </section>
    <section anchor="artefact-requirements">
      <name>Artefact Requirements</name>
      <t>This section outlines some of the fundamental artefacts that are used by security operators to ensure security and operation of the network.</t>
      <t>With increasingly complex cyber threats, and to support both operational and security objectives, it is vital that security operators have multiple opportunities to detect malicious activity at different parts of the network and to account for different points of failure. Thus, network defence techniques often use multiple layers of defence with several different mitigations at each layer - a concept referred to as "defence-in-depth". This approach can apply to considering security at different parts of the network, for example detecting activity at the network edge and on endpoints, and security operators also apply network level controls to separate traffic to support their security monitoring responsibilities. Security operators rely upon artefacts from a variety of sources to achieve their goals.</t>
      <section anchor="asset-management">
        <name>Asset Management</name>
        <t>Defence and management of an environment relies on knowing what hardware and software assets have access to, or are installed on, a network or system. An accurate inventory is necessary to manage the security of an organisation's assets, to ensure that unauthorised devices are not present on the system and to understand how an organisation may be impacted by a cyber incident.</t>
        <t>The term "Shadow IT" is often used to refer to assets that are not accounted for. This can include devices which are not officially onboarded or are misconfigured, but also includes services, tools and accounts with access to the system. Shadow IT may introduce threats to the security of the system as protections and controls put in place may be ineffective.</t>
        <t>In modern environments and networks, particularly the cloud, assets may not be static. Therefore, approaches that take into account the dynamic and ephemeral nature of resources are required to distinguish between legitimate auto-scaling and malicious activity.</t>
        <t>A good asset management approach will use tools to scan the environment for new, modified or removed assets on a regular or continuous basis. It should maintain an authoritative and accurate source of information, which should be made accessible to security operators.  It could use a variety of data sources including procurement records, mobile device management and logging platforms. Security operators are most likely to use asset management systems to identify devices or software that should not be on the system, as well as to identify legitimate assets that need to be protected as part of a cyber incident.</t>
      </section>
      <section anchor="identity-and-access-management">
        <name>Identity and Access Management</name>
        <t>Protecting against cyber threats also relies on understanding and managing who and what should have access to data, systems and services, as well as monitoring access. Identity and access management (IAM) is necessary to distinguish legitimate access from an attack.</t>
        <t>A good IAM approach should include logging and monitoring of authentication and authorisation events. These logs should be safeguarded against tampering, with inbuilt alerts for suspicious behaviour. These could include login attempts that fail the second step of multi-factor authentication (MFA), brute-forcing of passwords, and attempts from unexpected locations or devices. Activity from high-privilege accounts (e.g. admin accounts) should be monitored with particular attention.</t>
      </section>
      <section anchor="indictors-of-compromise">
        <name>Indictors of Compromise</name>
        <t>The identification of Indicators of Compromise (IoCs) is relied upon by security operators to identify and defend against malicious activity on the network and endpoints that they are responsible for. As outlined in <xref target="RFC9424"/>, IoCs are observable artefacts relating to a cyber threat actor or their activities, such as their tactics, techniques, procedures (TTPs), or tooling and attack infrastructure. Examples of IoCs include hash values of known malicious files or executables, IP addresses or domain names associated with malicious traffic or software and tooling used by attackers. These artefacts could be network based, such as information about Command and Control (C2) infrastructure embedded in network protocols, endpoint based, such as suspicious files or software, or behaviour based such as irregular account or access activity.</t>
        <t>These artefacts can be observed on the network or at hosts and endpoints, including infrastructure, services and applications. They help security operators to proactively block malicious activity, whether that be blocking traffic or preventing code execution at a point in the network. IoCs support Incident Response as they are crucial in determining whether an attack has taken place. Similarly, they can be used to link discovered suspicious activity to a known attackers, which enables further investigation and mitigations to be put in place. Having IoCs deployed to various security control points across a system supports a defence-in-depth approach which should be used by security operators.</t>
        <t>Security operators not only discover, use and deploy IoCs in the systems that they are responsible for, but also consume and share IoCs with the wider security community to increase wider understanding of emerging cyber threats.</t>
      </section>
      <section anchor="digital-forensics-and-logging">
        <name>Digital Forensics and Logging</name>
        <t>Alongside deployment of IoCs to detect and reduce the effects of compromise, security operators require digital forensics from the network, endpoints, hosts and applicationsto enable effective incident response or threat hunting. For example, details of authentication or authorization events, network traffic or endpoint-detection events can be found in logs.</t>
        <t>Using a range of log sources is vital, as each log source will give a different view of attacker activity to build a full picture and enable effective defensive mitigations. For example, authentication logs provide details when adversaries attempt to gain unauthorised access to systems, DNS logs can provide the first indications of a compromise device, and anti-malware software logs help to identify specific attacker capabilities. <xref target="NIST_800-81"/> contains more information on the use of DNS for threat intelligence.</t>
        <t>Understanding and interpreting log sources is not always straightforward, so security operators typically use log analytic techniques to index, enrich and query log data and thus take effective action.</t>
        <t>Security operators, through their Threat Intelligence insight play a role in threat modelling which enables effective identification of valuable log sources. Security operators are responsible for ensuring that logging processes and data are secured effectively.</t>
        <t><xref target="DIGITAL_FORENSICS"/> provides additional guidance on digital forensics, including logging requirements, management and protection.</t>
      </section>
    </section>
    <section anchor="tooling-requirements">
      <name>Tooling Requirements</name>
      <t>Changes to protocols may require changes to tooling in order to continue to be effective for security operations. Such changes may also affect how safely and effectively such tools, including automated tools, can be used. This should be highlighted when writing protocol specifications. To assess this, the following section outlines the common tooling used and relied upon by security operators and which could be considered in protocol development. This is non-exhaustive, so other operational tools and techniques may also be worth considering.</t>
      <t>Endpoint Detection and Response (EDR) tools are deployed to endpoints, or end-user devices such as workstations, laptops or phones attached to the network that security operators are responsible for. EDR tooling can also be deployed to workloads in cloud environments. EDR tooling monitors events and provides security operators visibility of any malicious activity where they are deployed. EDR tooling also allows security operators to not only monitor and identify threats, but also respond to them, for example by isolating potentially compromised devices from the network in order to prevent a cyber threat actor's next stages of attack. A challenge that security operators face when using EDR tooling is the increase in cyber threat actors deploying "living off the land" <xref target="LOTL"/> techniques, so that their activity does not appear malicious and thus is not identified by EDR tooling.</t>
      <t>Network Detection and Response (NDR) tools are designed to detect threats by analysing network data and traffic flows to identify suspicious patterns. As a complement to EDR, NDR tooling is often relied upon to detect threats that may be hard to detect at the endpoint, for example an attacker moving laterally through the network towards more sensitive data or suspicious behaviour such as unauthorized credential use or data exfiltration. Security operators often use NDR tooling to establish a baseline of the network's normal behaviour patterns and deviations from this trigger alerts. As with EDR, NDR tooling can offer the ability to respond to threats in addition to monitoring for them, for example by blocking malicious traffic.</t>
      <t>Security Information and Event Management (SIEM) tooling is used by security operators to collect and analyse data from across the network in order to build a comprehensive view of the network activity, which is key to identify and respond to malicious activity. Note that, in comparison to EDR and NDR, SIEM tools collect and analyse events, rather than monitor the network directly. SIEM analysis would not be possible manually, so security operators rely on tooling to combine and analyse a range of data, including log data, network events and threat intelligence feeds in order to identify suspected suspicious events that require further investigation. SIEM tooling will send security operators automatic alerts based on predefined security rules to reduce the impact of compromise. These rules require effective management, as false positive may lead to "alert fatigue", where too frequent alerts may be ignored, raising the risk of real compromises being missed.</t>
      <t>Security Orchestration, Automation, and Response (SOAR) tooling <xref target="IBM-SOAR"/> offers security operators the ability to automate routine security and operational tasks to improve efficiency of response. Based on threat related data that is collected, SOAR tools are used to automate responses without human intervention, based on predefined "playbooks". These playbooks are designed by security operators with both incident response and operational priorities in mind. This automation is vital to security operators who experience an overwhelming volume of threats and would otherwise be unable to defend their networks. This automated action provided by SOAR tools complements the data analytic and insight provided by SIEM tools to respond to threats identified.</t>
      <t>Security operators rely upon Protocol Dissectors to parse and interpret individual network protocols. Dissecting protocols across network layers allows security operators to understand, analyse and filter traffic on their system in order to detect and defend against attacks. Dissectors support the identification of suspicious behaviour and malicious traffic that would otherwise be hidden within regular network traffic. These tools also support forensic investigation after an attack to understand how an attacker gained access and prevent this in future.</t>
    </section>
    <section anchor="additional-benefits-of-security-operations">
      <name>Additional Benefits of Security Operations</name>
      <t>Whilst the core responsibilities of security operators are outlined above, they may be well placed to support other important security functions.</t>
      <section anchor="vulnerability-management">
        <name>Vulnerability management</name>
        <t>Security operators are well positioned to proactively find vulnerabilities in the systems and infrastructure that they are responsible for. As part of their investigations security operators may conduct vulnerability scanning and security assessments and thus be able to triage and report priority issues to system owners who are responsible for patch management. This helps to mitigate security issues found before they can be exploited by cyber threat actors. This patching and remediation is an example where the joining of security and operational teams has particular value as patch management may involve prioritisation based on impact, risk and deployment considerations. When designing new protocols, consideration should be given to enabling efficient patching, for example supporting cheap and fast connection handoffs and reconnections to enable services to be brought down, updated and re-established quickly and efficiently.</t>
      </section>
      <section anchor="threat-modelling-and-architecture-review">
        <name>Threat Modelling and Architecture Review</name>
        <t>With their unique position, security operators are well placed to support wider security teams in developing the required security posture for their network. Blending insight from Threat Intelligence with a deep understanding of the operational aspects of the network, security operators can work with design teams to ensure their priorities are supported. This perspective of current cyber threats and operational experience can also be considered in protocol development.</t>
      </section>
    </section>
    <section anchor="security-operation-considerations">
      <name>Security Operation Considerations</name>
      <t>The previous sections outline what security operations is, and the artefacts and tooling that it relies upon. During the design and development of protocols, it is valuable to consider how security operators could be impacted by changes and mitigate such impact if possible. If they cannot be mitigated, then clearly documenting such considerations will aid security operators if and when the new protocol is deployed. Different organisations and systems may have different requirements, priorities and risks, so relevant considerations will depend on the context. For example, telecom operators may require increased focus on scale and throughput when compared to enterprise scenarios.</t>
      <t>New protocols may have implications for the types, locations or availability of IoCs and it is important for security operators to understand these implications in order to continue to effectively monitor for malicious activity. To support this, protocol designers could document which observable artefacts remain available to defenders, which indicators can no longer be observed and whether new artefacts are introduced that could support detection, investigation or incident response.</t>
      <t>Similarly, consideration should be given to how a new protocol or a change to a protocol may impact attackers' capabilities, such as Command and Control (C2) communications, network traversal or facilitation of exfiltration of data from the network. Where there are new or different opportunities for performing such malicious activity or where current defence techniques are prevented, it is important that this is captured to inform security operations and mitigated where possible to ensure their Threat Intelligence function can be fulfilled. <xref target="MITRE_ATTACK"/> provides a a knowledge base of attacker techniques which may be useful for assessing how a protocol impacts such capabilities. Protocol designers are encouraged to work with security operators and other cyber security experts for support during protocol design.</t>
      <t>One indicator of malicious activity that security operators use is to consider traffic levels and traffic patterns in order to identify suspicious activity or to defend against malicious distributed denial-of-service (DDoS) attacks. Mitigations should be included or threats documented if new protocols could be used to create DDoS attacks, for example amplification attacks in DNS or NTP. <xref target="RFC4732"/> provides further considerations for protocol designers with regards to denial-of-service.</t>
      <t>As outlined above, security operations rely on a variety of log sources enable effective incident response or threat hunting. If a new protocol changes the properties or topology of the network, this may impact the requirement for digital forensics. Whilst not a complete solution, considering logging during protocol design is a positive mechanism to support security operators. <xref target="I-D.ietf-quic-qlog-main-schema"/> is an example of structured logging for network protocols, which was designed to be extensible for different scenarios and to avoid fragmentated, non-standardised formats being created independently.</t>
      <t>Protocol designers and implementers have expertise in the possible errors or abnormal conditions can occur in the running of the protocol. Where possible, detectable error conditions should be documented to support security operators to respond effectively. This documentation could include possible error conditions along with recommendations about how they can be detected and which fields should be logged.</t>
      <t>Impact on tooling should be considered. Updating and augmenting existing tools is expected when the network is upgraded or new functionality is deployed, but having to completely rebuild such tooling will greatly reduce the effectiveness of security operators. A mitigation for this may be to consider designing flexibility for future versions and extensions into protocols so that code can be easily written to handle, identify and differentiate between protocol versions. As  well as the impact on efficacy of a tool, protocol designers should consider the impact of a design on the ability to audit and validate actions taken or observations made by a tool.</t>
      <t>In general, where protocols are being updated or replaced, consideration should be given to the current techniques employed by security operators who use the deployed protocol. This should include the techniques, tooling and corresponding infrastructure used to provide security and effective operation of the network. Where possible, these practices should remain consistent, or mitigations or documentation included to ensure security operations are not adversely affected.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document focuses primarily on operational considerations in addition to <xref target="I-D.ietf-opsawg-rfc5706bis"/> .</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document supports improving security by helping protocol designers consider security operators and their effort to mitigate cyber threats. It focused on the operational aspects, rather than the security of the protocols.</t>
      <t>Security operators have access to sensitive data, which is critical to protect for the security and privacy of the network. It is important that such data is suitably secured and that appropriate controls are in place to enforce this, for example ensuring security operations data is segregated from the rest of the network, security operations tools and actions audited, and logs and forensic data securely stored and access controlled. Protocol designers may need to consider both security observability and appropriate handling of sensitive data when designing operational artefacts or logging mechanisms. Additional legal and governance requirements are often raised on security operators to ensure that such access is only being used for the intended purpose and thus benefiting the security of the system.</t>
      <t>As per <xref target="RFC6973"/>, it is important to consider privacy of users of the system and its relation to effective security operations. There may be tensions when making choices between effective security operations and complete privacy during protocol design and deployment. Security operators benefit from a detailed understanding of activity on the network in order to identify and respond to cyber attacks and this may be at odds with minimising information to increase user privacy. In contrast, effective security operations can prevent malicious actors from accessing and exfiltrating user data, thus improving privacy. The necessary amount of observability for user privacy and security will depend on the context and the system. Protocol design choices should be documented so implementers and users can make informed decisions in order to maximise security and privacy properties.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="SECOPS" target="https://niccs.cisa.gov/resources/glossary">
        <front>
          <title>NICCS Glossary</title>
          <author>
            <organization/>
          </author>
          <date year="2026" month="February"/>
        </front>
      </reference>
      <reference anchor="LOTL" target="https://www.cisa.gov/sites/default/files/2025-03/Joint-Guidance-Identifying-and-Mitigating-LOTL508.pdf">
        <front>
          <title>Identifying and Mitigating Living Off the Land Techniques</title>
          <author>
            <organization/>
          </author>
          <date year="2025" month="March"/>
        </front>
      </reference>
      <reference anchor="IBM-SOAR" target="https://www.ibm.com/think/topics/security-orchestration-automation-response">
        <front>
          <title>What is SOAR?</title>
          <author>
            <organization/>
          </author>
          <date year="2026" month="May"/>
        </front>
      </reference>
      <reference anchor="NIST_800-81" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf">
        <front>
          <title>Secure DNS Deployment Guide</title>
          <author>
            <organization/>
          </author>
          <date year="2026" month="March"/>
        </front>
      </reference>
      <reference anchor="MITRE_ATTACK" target="https://attack.mitre.org/">
        <front>
          <title>MITRE ATT&amp;CK</title>
          <author>
            <organization/>
          </author>
          <date year="2026" month="May"/>
        </front>
      </reference>
      <reference anchor="DIGITAL_FORENSICS" target="https://www.ncsc.gov.uk/guidance/guidance-on-digital-forensics-protective-monitoring">
        <front>
          <title>Guidance on digital forensics</title>
          <author>
            <organization/>
          </author>
          <date year="2025" month="February"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-opsawg-rfc5706bis">
        <front>
          <title>Guidelines for Considering Operations and Management in IETF Specifications</title>
          <author fullname="Benoît Claise" initials="B." surname="Claise">
            <organization>Everything OPS</organization>
          </author>
          <author fullname="Joe Clarke" initials="J." surname="Clarke">
            <organization>Cisco</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
            <organization>Blue Fern Consulting</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE</organization>
          </author>
          <date day="15" month="March" year="2026"/>
          <abstract>
            <t>   New Protocols and Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when writing documents in the IETF Stream that document a
   specification for New Protocols or Protocol Extensions or describe
   their use.

   This document obsoletes RFC 5706, replacing it completely and
   updating it with new operational and management techniques and
   mechanisms.  It also updates RFC 2360 to obsolete mandatory MIB
   creation.  Finally, it introduces a requirement to include an
   "Operational Considerations" section in new RFCs in the IETF Stream
   that define New Protocols or Protocol Extensions or describe their
   use (including relevant YANG Models), while providing an escape
   clause if no new considerations are identified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-rfc5706bis-04"/>
      </reference>
      <reference anchor="RFC9424">
        <front>
          <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
          <author fullname="K. Paine" initials="K." surname="Paine"/>
          <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
          <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
          <author fullname="A. Shaw" initials="A." surname="Shaw"/>
          <date month="August" year="2023"/>
          <abstract>
            <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9424"/>
        <seriesInfo name="DOI" value="10.17487/RFC9424"/>
      </reference>
      <reference anchor="RFC4732">
        <front>
          <title>Internet Denial-of-Service Considerations</title>
          <author fullname="M. Handley" initials="M." role="editor" surname="Handley"/>
          <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <date month="December" year="2006"/>
          <abstract>
            <t>This document provides an overview of possible avenues for denial-of-service (DoS) attack on Internet systems. The aim is to encourage protocol designers and network engineers towards designs that are more robust. We discuss partial solutions that reduce the effectiveness of attacks, and how some solutions might inadvertently open up alternative vulnerabilities. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4732"/>
        <seriesInfo name="DOI" value="10.17487/RFC4732"/>
      </reference>
      <reference anchor="I-D.ietf-quic-qlog-main-schema">
        <front>
          <title>qlog: Structured Logging for Network Protocols</title>
          <author fullname="Robin Marx" initials="R." surname="Marx">
            <organization>Akamai</organization>
          </author>
          <author fullname="Luca Niccolini" initials="L." surname="Niccolini">
            <organization>Meta</organization>
          </author>
          <author fullname="Marten Seemann" initials="M." surname="Seemann">
         </author>
          <author fullname="Lucas Pardue" initials="L." surname="Pardue">
            <organization>Cloudflare</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   qlog provides extensible structured logging for network protocols,
   allowing for easy sharing of data that benefits common debug and
   analysis methods and tooling.  This document describes key concepts
   of qlog: formats, files, traces, events, and extension points.  This
   definition includes the high-level log file schemas, and generic
   event schemas.  Requirements and guidelines for creating protocol-
   specific event schemas are also presented.  All schemas are defined
   independent of serialization format, allowing logs to be represented
   in various ways such as JSON, CSV, or protobuf.

Note to Readers

      Note to RFC editor: Please remove this section before publication.

   Feedback and discussion are welcome at https://github.com/quicwg/qlog
   (https://github.com/quicwg/qlog).  Readers are advised to refer to
   the "editor's draft" at that URL for an up-to-date version of this
   document.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-qlog-main-schema-13"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
    </references>
    <?line 195?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
