SACM Vulnerability Assessment Scenario
draft-coffin-sacm-vuln-scenario-01
Document | Type |
Replaced Internet-Draft
(sacm WG)
Expired & archived
|
|
---|---|---|---|
Authors | Chris Coffin , Brant Cheikes , Charles Schmidt , Daniel Haynes , Jessica Fitzgerald-McKay , David Waltermire | ||
Last updated | 2016-03-25 (Latest revision 2016-01-22) | ||
Replaced by | draft-ietf-sacm-vuln-scenario | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Adopted by a WG | |
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-ietf-sacm-vuln-scenario | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document provides a core narrative that walks through an automated enterprise vulnerability assessment scenario. It is aligned with the SACM use cases and begins with an enterprise ingesting vulnerability description data, followed by identifying endpoints on the network and collecting and storing information about them to enable posture assessment, and finally ends with assessing these endpoints against the vulnerability description data to determine which ones are affected. Processes that specifically overlap between this scenario and SACM use cases will be noted where applicable. Specifically, the relationship between this document and the SACM use case building block capabilities and the usage scenarios will be covered.
Authors
Chris Coffin
Brant Cheikes
Charles Schmidt
Daniel Haynes
Jessica Fitzgerald-McKay
David Waltermire
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)