Skip to main content

Evolution of Endpoint Security - An Operational Perspective

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Mark McFadden
Last updated 2022-02-17 (Latest revision 2021-08-16)
RFC stream (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This draft discusses the traditional model of security where endpoints in the network are protected by a variety of tools. It proposes a model for endpoints and then argues that the older, traditional approach is no longer sufficient for operational security at the endpoint. A series of operational examples are discussed in an Appendix.


Mark McFadden

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)