SACM Vulnerability Assessment Scenario
draft-coffin-sacm-vuln-scenario-01

Document Type Replaced Internet-Draft (sacm WG)
Last updated 2016-03-25 (latest revision 2016-01-22)
Replaced by draft-ietf-sacm-vuln-scenario
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-sacm-vuln-scenario
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-coffin-sacm-vuln-scenario-01.txt

Abstract

This document provides a core narrative that walks through an automated enterprise vulnerability assessment scenario. It is aligned with the SACM use cases and begins with an enterprise ingesting vulnerability description data, followed by identifying endpoints on the network and collecting and storing information about them to enable posture assessment, and finally ends with assessing these endpoints against the vulnerability description data to determine which ones are affected. Processes that specifically overlap between this scenario and SACM use cases will be noted where applicable. Specifically, the relationship between this document and the SACM use case building block capabilities and the usage scenarios will be covered.

Authors

Chris Coffin (ccoffin@mitre.org)
Brant Cheikes (bcheikes@mitre.org)
Charles Schmidt (cmschmidt@mitre.org)
Daniel Haynes (dhaynes@mitre.org)
Jessica Fitzgerald-McKay (jmfitz2@nsa.gov)
David Waltermire (david.waltermire@nist.gov)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)