SACM Vulnerability Assessment Scenario
draft-ietf-sacm-vuln-scenario-02
Document | Type |
Expired Internet-Draft
(sacm WG)
Expired & archived
|
|
---|---|---|---|
Authors | Chris Coffin , Brant Cheikes , Charles Schmidt , Daniel Haynes , Jessica Fitzgerald-McKay , David Waltermire | ||
Last updated | 2017-03-13 (Latest revision 2016-09-09) | ||
Replaces | draft-coffin-sacm-vuln-scenario | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Informational | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | Submitted to IESG for Publication | |
Document shepherd | Adam W. Montville | ||
Shepherd write-up | Show Last changed 2016-10-18 | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Kathleen Moriarty | ||
Send notices to | "Adam Montville" <adam.w.montville@gmail.com> |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes an automated enterprise vulnerability assessment scenario aligned with the SACM Use Cases. The scenario assumes the existence of endpoint management capabilities and begins with an enterprise ingesting vulnerability description information. Endpoints are assessed against the vulnerability description information based on a combination of examining known endpoint characterization information and collected endpoint information.
Authors
Chris Coffin
Brant Cheikes
Charles Schmidt
Daniel Haynes
Jessica Fitzgerald-McKay
David Waltermire
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)