Skip to main content

SACM Vulnerability Assessment Scenario
draft-coffin-sacm-vuln-scenario-01

Document Type Replaced Internet-Draft (sacm WG)
Expired & archived
Authors Chris Coffin , Brant Cheikes , Charles Schmidt , Daniel Haynes , Jessica Fitzgerald-McKay , David Waltermire
Last updated 2016-03-25 (Latest revision 2016-01-22)
Replaced by draft-ietf-sacm-vuln-scenario
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Adopted by a WG
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-sacm-vuln-scenario
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document provides a core narrative that walks through an automated enterprise vulnerability assessment scenario. It is aligned with the SACM use cases and begins with an enterprise ingesting vulnerability description data, followed by identifying endpoints on the network and collecting and storing information about them to enable posture assessment, and finally ends with assessing these endpoints against the vulnerability description data to determine which ones are affected. Processes that specifically overlap between this scenario and SACM use cases will be noted where applicable. Specifically, the relationship between this document and the SACM use case building block capabilities and the usage scenarios will be covered.

Authors

Chris Coffin
Brant Cheikes
Charles Schmidt
Daniel Haynes
Jessica Fitzgerald-McKay
David Waltermire

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)