Using Security Posture Assessment to Grant Access to Enterprise Network Resources
draft-waltermire-sacm-use-cases-05
Document | Type | Replaced Internet-Draft (individual) | |
---|---|---|---|
Authors | David Waltermire , Adam Montville , David Harrington | ||
Last updated | 2014-01-16 (latest revision 2013-07-15) | ||
Replaced by | RFC 7632 | ||
Stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | WG state | (None) | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Replaced by draft-ietf-sacm-use-cases | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-waltermire-sacm-use-cases-05.txt
Abstract
This memo documents a sampling of use cases for securely aggregating configuration and operational data and assessing that data to determine an organization's security posture. From these operational use cases, we can derive common functional capabilities and requirements to guide development of vendor-neutral, interoperable standards for aggregating and assessing data relevant to security posture.
Authors
David Waltermire
(david.waltermire@nist.gov)
Adam Montville
(amontville@tripwire.com)
David Harrington
(ietfdbh@comcast.net)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)