SACM Vulnerability Assessment Scenario

Document Type Replaced Internet-Draft (sacm WG)
Authors Chris Coffin  , Brant Cheikes  , Charles Schmidt  , Daniel Haynes  , Jessica Fitzgerald-McKay  , David Waltermire 
Last updated 2016-03-25 (latest revision 2016-01-22)
Replaced by draft-ietf-sacm-vuln-scenario
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Expired & archived
plain text xml pdf htmlized bibtex
Stream WG state Adopted by a WG
Document shepherd No shepherd assigned
IESG IESG state Replaced by draft-ietf-sacm-vuln-scenario
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document provides a core narrative that walks through an automated enterprise vulnerability assessment scenario. It is aligned with the SACM use cases and begins with an enterprise ingesting vulnerability description data, followed by identifying endpoints on the network and collecting and storing information about them to enable posture assessment, and finally ends with assessing these endpoints against the vulnerability description data to determine which ones are affected. Processes that specifically overlap between this scenario and SACM use cases will be noted where applicable. Specifically, the relationship between this document and the SACM use case building block capabilities and the usage scenarios will be covered.


Chris Coffin (
Brant Cheikes (
Charles Schmidt (
Daniel Haynes (
Jessica Fitzgerald-McKay (
David Waltermire (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)