Network Working Group                                 D. Waltermire, Ed.
Internet-Draft                                                      NIST
Intended status: Informational                             July 16, 2012
Expires: January 17, 2013


  Analysis of Security Automation and Continuous Monitoring (SACM) Use
                                 Cases
                   draft-waltermire-sacm-use-cases-01

Abstract

   This document identifies foundational use cases, derived functional
   capabilities and requirements, architectural components, and the
   supporting standards needed to define an interoperable, automation
   infrastructure required to support timely, accurate and actionable
   situational awareness over an organization's IT systems.  Automation
   tools implementing a continuous monitoring approach will utilize this
   infrastructure together with existing and emerging event, incident
   and network management standards to provide visibility into the state
   of assets, user activities and network behavior.  Stakeholders will
   be able to use these tools to aggregate and analyze relevant security
   and operational data to understand the organizations security
   posture, quantify business risk, and make informed decisions that
   support organizational objectives while protecting critical
   information.  Organizations will be able to use these tools to
   augment and automate information sharing activities to collaborate
   with partners to identify and mitigate threats.  Other automation
   tools will be able to integrate with these capabilities to enforce
   policies based on human decisions to harden systems, prevent misuse
   and reduce the overall attack surface.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 17, 2013.



Waltermire              Expires January 17, 2013                [Page 1]


Internet-Draft               SACM Use Cases                    July 2012


Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Requirements Language  . . . . . . . . . . . . . . . . . .  4
   2.  Key Concepts . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Use Cases  . . . . . . . . . . . . . . . . . . . . . . . . . .  4
     3.1.  UC1: Assessment and Enforcement of Acceptable State  . . .  4
     3.2.  UC2: Behavioral Monitoring and Enforcement . . . . . . . .  5
     3.3.  UC3: Security Control Verification and Monitoring  . . . .  6
     3.4.  UC4: Secure Exchange of Risk and Compliance Information  .  6
     3.5.  UC5: Automated Forensics Investigation . . . . . . . . . .  7
   4.  Functional Capabilities  . . . . . . . . . . . . . . . . . . . 10
     4.1.  Functional Capability 1  . . . . . . . . . . . . . . . . . 10
     4.2.  Functional Capability n  . . . . . . . . . . . . . . . . . 10
   5.  Functional Components  . . . . . . . . . . . . . . . . . . . . 10
   6.  Data Exchange Models and Communications Protocols  . . . . . . 11
   7.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 11
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 11
   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 11
   10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     10.1. Normative References . . . . . . . . . . . . . . . . . . . 12
     10.2. Informative References . . . . . . . . . . . . . . . . . . 12
   Appendix A.  Additional Stuff  . . . . . . . . . . . . . . . . . . 13
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 13











Waltermire              Expires January 17, 2013                [Page 2]


Internet-Draft               SACM Use Cases                    July 2012


1.  Introduction

   This document addresses foundational use cases in security
   automation.  Portions of these use cases may be considered when
   establishing a charter for the Security Automation and Continuous
   Monitoring (SACM) working group within the IETF.  This working group
   will address a portion of the standards needed to define an
   interoperable, automation infrastructure required to support timely,
   accurate and actionable situational awareness over an organization's
   IT systems.  This document enumerates use cases and break down
   related concepts that cross many IT security information domains.

   Sections [...] of this document focus on:

      Defining the key concepts and terminology used within the document
      providing a common frame of reference;

      Identifying foundational use cases that represent classes of
      stakeholders, goals, and usage scenarios;

      A set of derived functional capabilities and associated
      requirements that are needed to support the use cases;

      A break down of architectural components that address one or more
      functional capabilities that can be used in various combinations
      to support the use cases; and

      An inventory of existing, emerging, and needed data exchange
      models and communications protocols that are required to support
      interoperability between architectural components.

   The standards identified in this document provide a foundation for
   creating interoperable automation tools and continuous monitoring
   solutions that provide visibility into the state of assets, user
   activities, and network behavior.  Stakeholders will be able to use
   these tools to aggregate and analyze relevant security and
   operational data to understand the organizations security posture,
   quantify business risk, and make informed decisions that support
   organizational objectives while protecting critical information.
   Organizations will be able to use these tools to augment and automate
   information sharing activities to collaborate with partners to
   identify and mitigate threats.  Other automation tools will be able
   to integrate with these capabilities to enforce policies based on
   human decisions to harden systems, prevent misuse and reduce the
   overall attack surface.






Waltermire              Expires January 17, 2013                [Page 3]


Internet-Draft               SACM Use Cases                    July 2012


1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].


2.  Key Concepts

   Define/reference the major concepts included in this document.


3.  Use Cases

   Describe use cases, one per sub-section.

   Things to consider including (but not limited to):

   o  Usage scenarios (e.g.  Security Control Verification, Endpoint
      Enforcement, Incident Detection, Forensic Investigation, etc.)

   o  Information Domains (e.g. configuration, vulnerability, digital
      events, etc.)

   o  Characteristics of the information used (e.g. real-time/periodic,
      static/dynamic, etc.)

3.1.  UC1: Assessment and Enforcement of Acceptable State

   Controlling access to networks and services based on the assessment
   and analysis of host and/or network state based on machine
   processable content.

   Possible "things" that are being measured:

   o  Asset information (e.g., Asset identification, ARF, ASR)

   o  System configuration (e.g., SCAP)

   o  System vulnerabilities (e.g., SCAP)

   o  System weaknesses

   o  Semi-automated human interrogation methods to assess non-
      automatable, technical controls (e.g., OCIL)

   Possible desired outcomes to address:




Waltermire              Expires January 17, 2013                [Page 4]


Internet-Draft               SACM Use Cases                    July 2012


   o  User/system is allowed access to network resources

   o  User/system is denied access to network resources

      *  Potential mitigation actions are taken

   The Network Endpoint Assessment (NEA) protocols (PA-TNC [RFC5792],
   PB-TNC [RFC5793], PT-TLS [I-D.ietf-nea-pt-tls], and PT-EAP
   [I-D.ietf-nea-pt-eap]) may be used to query and transport the things
   to be measured, as well as providing for manual or automated
   remediation and mitigation.  SCAP content (XCCDF, OVAL, OCIL, etc.)
   may be transported over the NEA protocols to indicate which things
   are to be measured and send the results of the measurements.  And
   enforcement may be implemented with RADIUS [RFC2865] or DIAMETER
   [RFC3588].

3.2.  UC2: Behavioral Monitoring and Enforcement

   Controlling access to networks and services based on the detection
   and analysis of host and/or user behavior using automatable
   information from various sources.

   Possible "things" that are being measured:

   o  System configuration

   o  System vulnerabilities

   o  Network events

   o  User/host behavior

   Possible desired outcomes to address:

   o  Change in state is recorded and reported

   o  User/system activity is recorded and reported

   o  User/system access is terminated or altered

   The Trusted Computing Group's [IF-MAP] protocol provides a standard
   way to rapidly share events and updates related to user/device
   behavior and network events, enabling logging or swift response such
   as reduced or terminated access.

   Possible other things to address:





Waltermire              Expires January 17, 2013                [Page 5]


Internet-Draft               SACM Use Cases                    July 2012


   o  Discuss how this could potentially be related to the IP Flow
      Information Export (ipfix) working group.  Basically leveraging
      Netflow to detect network behavior.  This information could be
      received from what the MILE WG is doing with incident response.
      (see UC5 and UC4)

   o  Relevant processes, technologies and techniques.

3.3.  UC3: Security Control Verification and Monitoring

   Continuous assessment of the implementation and effectiveness of
   security controls based on machine processable content.

   Possible "things" that are being measured:

   o  Compliance to organizationally defined/required controls

      *  System configuration

      *  System vulnerabilities

      *  Network events

      *  Semi-automated human interrogation methods to assess non-
         technical controls

   o  Deviations from expected state

   Possible desired outcomes to address:

   o  Compliance or non-compliance is recorded and reported

   This use case extends UC1 to ensure that changes to the things
   measured in UC1 are rapidly detected, reported, and optionally
   responded to with manual or automated remediation and mitigation.

   Possible other things to address:

   o  Relevant processes, technologies and techniques.

3.4.  UC4: Secure Exchange of Risk and Compliance Information

   Sharing security and/or operationally relevant information within and
   across trust boundaries using secure, automated communication
   channels and formats.

   Possible "things" that are being measured:




Waltermire              Expires January 17, 2013                [Page 6]


Internet-Draft               SACM Use Cases                    July 2012


   o  ???

   Possible desired outcomes to address:

   o  Combining results from UC1-UC3, a report to an organizational
      authority is generated, including relevant data pertaining to the
      user activities, potentially along with the aggregated data from
      other user activities.

   o  Aggregate/roll-up reporting of organizational, security-oriented
      information in response to pre-arranged and ad hoc, automated data
      requests.

   o  Potential sharing of risk and/or threat behavioral information
      with partners as well as reference data and content like USGCB,
      NVD, IAVM, and machine-readable US-CERT alerts

   o  Outcome of UC4 informs back through UC1-UC3, such as updates to
      digitial policies, adjusted configurations, new patch data, etc.

   Possible other things to address:

   o  Indicate the relationship of this use case to UC3 and UC5.  This
      use case supports requests for and reporting of information
      generated by UC3 and UC5.

   o  Be sure to incorporate Incident/Security Event Exchange (UC5).

   o  Document how this use case supports methods to combine data sets
      to generate reports that would be shared between parties.  This is
      a touch point with the MILE GRC-Exchange work.  Establish the use
      cases for the exchange.  In the following sections, discuss
      additional work that may be needed to tie these pieces together

   o  Discuss the use of content repositories in support of information
      exchange.

   o  Relevant processes, technologies and techniques.

3.5.  UC5: Automated Forensics Investigation

   Remote and/or local collection of organizational, network, and/or
   host information to generate situational awareness that will serve as
   an input to enhance incident detection, investigation, and response
   activities.

   Possible "things" that are being measured:




Waltermire              Expires January 17, 2013                [Page 7]


Internet-Draft               SACM Use Cases                    July 2012


   o  Scope and impact of security incident

      *  Coverage of situational awareness for the assets monitored
         (trending as improvements are made and new data sources are
         added for each of the above use cases)

      *  Time to detect compliance and security issues/problems from
         increased capabilities to automate continuous monitoring

      *  Time to resolve issues/problems detected from continuous
         monitoring solutions and improvements (trending) to demonstrate
         prevention capability improvements

      *  Number of low, medium, and high level threats to assets
         (considering the criticality of those assets) using the
         combined situational awareness, continuous monitoring, and
         feeds of known vulnerability information, static and over time.

      *  Variations in behavior to enhance detection capabilities
         through increased situational awareness gained from UC1, UC2,
         and UC3

      *  Impact of security incidents trending against improvements in
         situational awareness capabilities

      *  Time to detect, quarantine, and remediate incidents, trending
         over time for each measurement, correlated to improvements in
         situational awareness and continuous monitoring.

      *  Impact of security incidents measured by time, monetary impact,
         reputation and other factors.  The trending of these
         measurements as improvements are made to situational awareness
         and continuous monitoring is a critical key performace
         indicator for the security program.

   Possible desired outcomes to address:

   o  Identify the need for additional data collection from UC1-UC3
      based on gaps in information currently collected

   o  Can be informed by UC4, such as shared risk/threat information

   o  Intersect data and analysis provided from UC1, UC2, and UC3 with
      threat and vulnerability information to enable detection of
      incidents via event information related to the described
      intersection.





Waltermire              Expires January 17, 2013                [Page 8]


Internet-Draft               SACM Use Cases                    July 2012


   o  Alteration to acceptable system state requirements necessary for
      UC1-UC2

   o  Identify the need for additional or altered controls to be
      addressed by UC3

   o  Identify the appropriate techniques and data sources necessary to
      build situational awareness and continuous monitoring solutions
      using standards to provide improved prevention and detection
      capabilities.  This step does not perform the analysis, but
      provides the data and techniques to obtain the data to enable the
      necessary analysis capabilities.

   Possible other things to address:

   o  Relevant processes, technologies and techniques.

   o  Determine standard inputs to create situational awareness, leaving
      analysis out-of-scope to enable innovation.  The relevant
      techniques will be addressed in UC1-UC4.

   o  Determine existing sets of processes, technologies, and techniques
      that may be leveraged specific to increased awareness of incidents
      and current threats through sharing indicators of compromise.
      Examples include, but are not limited to:

      *  RFC5070, Incident Object Description Exchange Format (IODEF)

      *  RFC6545, Real-time Inter-network Defense (RID)

      *  RFC6546, Transport of Real-time Inter-network Defense over
         HTTP/TLS

      *  Extensions to IODEF such as:

         +  RFC5901, Extension to IODEF-Document Class for Reporting
            Phishing

         +  RFC5941, Sharing Transaction Fraud Data

         +  IODEF-extension to support structured cyber security
            information:

            -  http://datatracker.ietf.org/doc/draft-ietf-mile-sci/

         +  Forensics extension





Waltermire              Expires January 17, 2013                [Page 9]


Internet-Draft               SACM Use Cases                    July 2012


         +  Etc.


4.  Functional Capabilities

   Decompose the functional capabilities needed to support the use
   cases, one per sub-section.  Cross reference the use case
   dependencies where they exist.

   Things to consider including (but not limited to):

   o  Information Views/Reports (e.g. security posture, compliance,
      control effectiveness)

   o  Data Collection (e.g. configuration state, software inventory,
      user and network behavior)

   o  Reference Information Formats (e.g. control catalogs,
      configuration baselines, malware characteristics, vulnerability
      data)

4.1.  Functional Capability 1

   Describe the first capability.

4.2.  Functional Capability n

   Describe the n capability.


5.  Functional Components

   Describe the abstract functional components needed to provide the
   capabilities described in the previous section.  Describe any
   relationships between the components and how they can be composed to
   address functional capabilities. (this might be better defined in the
   previous section.)

   Things to consider including (but not limited to):

   o  Topologies

   o  Federation Strategy








Waltermire              Expires January 17, 2013               [Page 10]


Internet-Draft               SACM Use Cases                    July 2012


6.  Data Exchange Models and Communications Protocols

   Document where existing work exists, what is currently defined by
   SDOs, and any gaps that should be addressed.  Point to existing
   event, incident and network management standards when available.
   Describe emerging efforts that may be used for the creation of new
   standards.  For gaps provide insight into what would be a good fit
   for SACM or another IETF working groups.

   This will help us to identify what is needed for SACM to be
   successful.  This section will help determine which of the
   specifications can be normatively referenced and what needs to be
   addressed in the IETF.  This should help us determine any protocol or
   guidance documentation we will need to generate to support the
   described use cases.

   Things to address:

      For IETF related efforts, discuss work in NEA and MILE working
      groups.  Address SNMP, NetConf and other efforts as needed.

      Reference any Security Automation work that is applicable.


7.  IANA Considerations

   This memo includes no request to IANA.

   All drafts are required to have an IANA considerations section (see
   RFC 5226 [RFC5226] for a guide).  If the draft does not require IANA
   to do anything, the section contains an explicit statement that this
   is the case (as above).  If there are no requirements for IANA, the
   section will be removed during conversion into an RFC by the RFC
   Editor.


8.  Security Considerations

   All drafts are required to have a security considerations section.
   See RFC 3552 [RFC3552] for a guide.


9.  Acknowledgements

   The author would like to thank Kathleen Moriarty and Stephen Hanna
   for contributing text to this document.  The author would also like
   to acknowledge the members of the SACM mailing list for thier keen
   and insightful feedback on the concepts and text within this



Waltermire              Expires January 17, 2013               [Page 11]


Internet-Draft               SACM Use Cases                    July 2012


   document.


10.  References

10.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

10.2.  Informative References

   [I-D.ietf-nea-pt-eap]
              Cam-Winget, N. and P. Sangster, "PT-EAP: Posture Transport
              (PT) Protocol For EAP Tunnel Methods",
              draft-ietf-nea-pt-eap-02 (work in progress), May 2012.

   [I-D.ietf-nea-pt-tls]
              Sangster, P., Cam-Winget, N., and J. Salowey, "PT-TLS: A
              TCP-based Posture Transport (PT) Protocol",
              draft-ietf-nea-pt-tls-05 (work in progress), May 2012.

   [RFC2865]  Rigney, C., Willens, S., Rubens, A., and W. Simpson,
              "Remote Authentication Dial In User Service (RADIUS)",
              RFC 2865, June 2000.

   [RFC3552]  Rescorla, E. and B. Korver, "Guidelines for Writing RFC
              Text on Security Considerations", BCP 72, RFC 3552,
              July 2003.

   [RFC3588]  Calhoun, P., Loughney, J., Guttman, E., Zorn, G., and J.
              Arkko, "Diameter Base Protocol", RFC 3588, September 2003.

   [RFC5226]  Narten, T. and H. Alvestrand, "Guidelines for Writing an
              IANA Considerations Section in RFCs", BCP 26, RFC 5226,
              May 2008.

   [RFC5792]  Sangster, P. and K. Narayan, "PA-TNC: A Posture Attribute
              (PA) Protocol Compatible with Trusted Network Connect
              (TNC)", RFC 5792, March 2010.

   [RFC5793]  Sahita, R., Hanna, S., Hurst, R., and K. Narayan, "PB-TNC:
              A Posture Broker (PB) Protocol Compatible with Trusted
              Network Connect (TNC)", RFC 5793, March 2010.







Waltermire              Expires January 17, 2013               [Page 12]


Internet-Draft               SACM Use Cases                    July 2012


Appendix A.  Additional Stuff

   This becomes an Appendix if needed.


Author's Address

   David Waltermire (editor)
   National Institute of Standards and Technology
   100 Bureau Drive
   Gaithersburg, Maryland  20877
   USA

   Phone:
   Email: david.waltermire@nist.gov




































Waltermire              Expires January 17, 2013               [Page 13]