Using Security Posture Assessment to Grant Access to Enterprise Network Resources
draft-waltermire-sacm-use-cases-05
| Document | Type | Replaced Internet-Draft (individual) | |
|---|---|---|---|
| Authors | David Waltermire , Adam W. Montville , David Harrington | ||
| Last updated | 2014-01-16 (Latest revision 2013-07-15) | ||
| Replaced by | RFC 7632 | ||
| Stream | Internet Engineering Task Force (IETF) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
xml
htmlized
pdfized
bibtex
|
||
| Stream | WG state | (None) | |
| Document shepherd | (None) | ||
| IESG | IESG state | Replaced by draft-ietf-sacm-use-cases | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-waltermire-sacm-use-cases-05.txt
Abstract
This memo documents a sampling of use cases for securely aggregating configuration and operational data and assessing that data to determine an organization's security posture. From these operational use cases, we can derive common functional capabilities and requirements to guide development of vendor-neutral, interoperable standards for aggregating and assessing data relevant to security posture.
Authors
David Waltermire
Adam W. Montville
David Harrington
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)