%% You should probably cite draft-ietf-sacm-use-cases instead of this I-D. @techreport{waltermire-sacm-use-cases-02, number = {draft-waltermire-sacm-use-cases-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-waltermire-sacm-use-cases/02/}, author = {David Waltermire and Adam W. Montville}, title = {{Analysis of Security Automation and Continuous Monitoring (SACM) Use Cases}}, pagetotal = 23, year = 2012, month = sep, day = 7, abstract = {This document identifies foundational use cases, derived functional capabilities and requirements, architectural components, and the supporting standards needed to define an interoperable, automation\textbackslash{}infrastructure required to support timely, accurate and actionable situational awareness over an organization's IT systems. Automation tools implementing a continuous monitoring approach will utilize this infrastructure together with existing and emerging event, incident and network management standards to provide visibility into the state of assets, user activities and network \textbackslash{}behavior. Stakeholders will be able to use these tools to aggregate and analyze relevant security and operational data to understand the organizations security posture, quantify business risk, and make informed decisions that support organizational objectives while protecting critical information. Organizations will be able to use these tools to augment and automate information sharing activities to collaborate with partners to identify and mitigate threats. Other automation tools will be able to integrate with these capabilities to enforce policies based on human decisions to harden systems, prevent misuse and reduce the overall attack surface.}, }