Minutes IETF102: sacm
minutes-102-sacm-00
| Meeting Minutes | Security Automation and Continuous Monitoring (sacm) WG | |
|---|---|---|
| Title | Minutes IETF102: sacm | |
| State | Active | |
| Other versions | plain text | |
| Last updated | 2018-08-20 |
minutes-102-sacm-00
SACM
------------------------------------------------------------------------------------------------------------------
1. Administrative and Agenda Bashing (Chairs, 5 min)
Note Well, Note Takers, Jabber Scribes, Agenda Bashing
Note Well - Check
Agenda Bashing - Stephen to do CoSWID
2. WG Status (Chairs)
SWIMA published RFC-8412 - Congrats to authors
Interop Testing?
In order to advance on standards track, 2 implementations and
interop testing is there a plan for that? Wont advance on the
standards track without interop testing
Andreas - StrongSwan has SWIMA compliance
Carl Heinz - another effort taking place - no timeline
on that at this time
3. Hackathon Update (Munyan/Montville)
YANG models to express collection information, grabbed some system
characteristics, and created a generic collection model. Some questions
remain: Is this work worthwhile to continue? Can NET/RESTCONF work in
the tradiitional device space?
Frank: What kind of endpoint are you collecting posture from? Just
workstations/servers. Why did you choose YANG model? Because, it's more
suitable for use with network devices.
The reason we chose this was so that we could use YANG as a potential
solution.
Is it a good solution? Possibly. The collection mechanism we defined is
a small model, but it could encapsulate the details of
technology-specific YANG models.
Frank is interested in collaborating next time.
4. Terminology (Montville/Birkholz)
https://datatracker.ietf.org/doc/draft-ietf-sacm-terminology/
Adam successfully deflected this to Henk
Branching the document to reconcile issues
Project on GitHub addressing each issue
On deck, in progress, completed, etc
14->15
Culling of terms
How/Why to bring some of them back
Start with a very concise definition/reference,
followed by more explanatory text - how its used,
declarative guidance, relationship to other terms 21
unresolved issues resolved another 20 issues
Issue 84 - Remove "Asset" and "Asset Management"
Proposal is to narrow it down
Prefix it with "IT", active equipment?
requires installation media?
Retain the terms hardware/software management
Adam is in favor of the removal
Consensus in the room?
Issue 80 - Do we need to define "timestamp"
Suggestion is to name our "timestamp" after
4949 data object timestamp
Basically and architectural feature?
Objections to elaborating on timestamps (how
they are vital to a machine defined as a SACM
component) - How it is used and its
relationships to SACM No objections in the room
(henk digressing from the slide)
Endpoint characterization record: identifying target
endpoints that are not under your own control. If an
endpoint attaches to a guest network, for example, its
information can be collected and aggregated in an
endpoint characterization record.
Issue 39 - Attribute and Endpoint Characteristic
(Adam)
Some confusion about attribute being an
attribute/value pair IM has 2 priority
constructs (container and leaf): leaf is an AVP?
Nancy: We've had lots of debate, we just need
to stick to one. Attribute is the atomic, we
were referencing it as an AVP. Can have a
composite-set element ("Subject"), but the AVP
is supposed to be the "atomic one". Would like
us to move on; argued this for many
sessions/meetings.
Adam: If adam is the only person with an issue
on this
Bret Jordan: Too often when we get into this
stuff, we get really pedantic on it, and forget
the higher-level things. Slightly less
pedantic terms that are more generally readable
and understandable by the masses. "bubble it
up".
Dave Kemp (NSA): Want to make things
understandable/intuitive.
Bret Jordan is willing to help
Frank Xia is willing to help
Problems working in GitHub vs working on the list
Adam: GitHub will automatically send messages
to the list from GitHub Bret: Make sure
there's good labeling and intuitive to
understand what's going on for new people
looking at the repo
5. Architecture (Montville/Munyan)
https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/
Adam: Made 1 update since the last IETF
Focus on discovery of the architecture, centered on hackathons
SaCM roles, components, capabilities, etc
Completed appendix mappings to Use Cases
Taxonomy of components right?
Workflows labeled and starting to be defined - Are they right?
Use Case mappings useful?
Adopt the draft?
Henk: We are in dire need of an architecture.
(Roles) Sad to see only very specific roles for components. The
elegance of provider/consumer roles enabled a flexible use of SACM
components. Revive the control-plane concept to discover sacm
components. Apply p/c to both data and control plane? Dont want to
force people to write another RFC just to add a role.
Adam: current draft is very xmpp-centric. MILE working group document
- Section 10: Providers and consumens need shared knowledge of
available topics. We would need to define those capabilities here in
SACM. We want a mechanism that someone can define a new role/topic and
ppl can interact with that.
( Nancy mosies over to the mic :-) )
Nancy: The way nancy interprets this draft is an instantiation of the
parked draft. You've got collectors, evaluators, etc. Not being
explicitly called out in this draft. Would put more context of the
whole intent into this draft.
Adam: Looking to take best specificity from old draft and integrate
into the redux draft Nancy: "How do we begin to do the posture
assessment", "How do we begin to do the posture collection"
You have snippets of it, but not the full picture of "both
sides of the story"
Stephen: Like it, readable. Theres stuff to add, stuff to do, we
could get a lot of value out of it
Question from Chair: Nancy, are you good with moving this into a WG
draft.
Nancy: Current stuff is a lot about SW inventory, now what do we do
with all of that stuff.
What are the other capabilities, workflows. Come up with the taxonomy
for all of these so we dont need new RFCs for new capabilities.
Extensible architectural model
Adopt as a WG document? No objections - Will do a call for adoption on
the list!
5. Endpoint Compliance Profile (Schmidt) (remote)
https://datatracker.ietf.org/doc/draft-ietf-sacm-ecp/
Charles: Subbing for Danny and Jess - Documenting questions probably
not answering
Status:
Fair amount of feedback on and off the list
new version published
updated scope
more stuff on netmod, restconf, yang, etc
took out a bunch of TCG-specific stuff
interactions/capabilities with the NEA stack
more on collection
some evaluation but not as much
Next Steps -
More feedback to integrate.
Still more removal of TCG references
further iterate on NETMOD ECP implementation section
Stephen: Congrats to Charles on RFC publishing
Karen: Whats the rough timeline for the next update?
Frank: Does the NETMOD ECP implementation include some YANG models?
- Not creating a new YANG model for ECP
- Integrating how YANG can be included in the data collection
process - Frank can do some review as well
6. Concise Software Identifiers (Birkholz)
https://datatracker.ietf.org/doc/draft-ietf-sacm-coswid/
Stephen lost this coinflip to Henk - Channeling Dave
Draft 06 posted in July
CDDL improvements - Enums, extension points, etc
Firmware extension improvements
close to WGLC
[Henk moves to the mic]
Henk: Draft basically complete, 3 issues
issue with an "any" attribute in CDDL
3 weeks from now - document complete.
Remove the firmware extension from CoSWID draft and into its own
document, maybe in SUIT
- manifest just a COSE envelope
- CPE concept in SCAP is going away, SWID taking that over
- will require SUIT manifest to use CoSWID
IANA registrations
CDDL cleanup
include example CDDL and verify content against latest
definitions
Chris (Chain Question): How stable is the CDDL specification?
Henk: "very stable". 3 months for WGLC on CDDL. The nits
addressed at the moment have nothing to do with CoSWID stuff.
The CDDL in CoSWID is stable enough...
Jarrett: CPE going away? When?
- Organizationally, NIST will be phasing out CPE over the next
3-5 years - Stephen talk to Jarret offline
7. ROLIE Software Descriptor Extension (Banghart)
draft-ietf-sacm-rolie-softwaredescriptor-02
Stephen:
-03 version published
more readable, clearer requirements
as interoperable as possible
media-type of "SWID" - Talking with ISO to create this media
type - will keep the group informed on progress of adding the
media type ISO in contact with IANA to add the media type and
then we'd standardize on ISO's stuff
Frank:
clarify SWID extension
Inside of the ROLIE entry, there is metadata - There's a link
that points to the SWID tag How to "talk SWID" using ROLIE
Request to do a last call to elicit feedback
8. ROLIE configuration Checklist Extension (Montville/Banghart)
draft-mandm-sacm-rolie-configuration-checklist
Added stephen as 3rd author
formatting and style changes throughout - matches other extensions
some still TODOs in there
updates for next IETF or some interims perhaps
9. Data Model of Network Infrastructure Device (Xia/Lin/Dong/Zheng)
- https://datatracker.ietf.org/doc/draft-lin-sacm-nid-mp-security-baseline/
- https://datatracker.ietf.org/doc/draft-xia-sacm-nid-dp-security-baseline/
- https://datatracker.ietf.org/doc/draft-dong-sacm-nid-infra-security-baseline/
Yue:
Recap of Objectives and Classification
define a minimum set of configuration and status
parameters of security related functions/services on a
network device that can be collected bu SACM collectors
and consumed by evaluator to assess device security
posture
Application, Network and Infrastructure Layers
Updated configuration attributes for VSI broadcast
traffic suppression Naming rule modifications derived
datatypes validated yang modules
[ talking fast, cant keep up as fast as I type ]
Infrastructure Layer:
Updated introduction
optimized data model - deleted redundant parts
integrity measurement updates
delete key store information
delete crypto engine information
Crypto algorithm updates
structural changes - Containers become
groupings
Continue to optimize data model
Complete data-plane baseline blocks
Seek more comments and co-authors
Adam: 3 drafts in total; Makes us think of CIS
benchmarks. Have tree of configuration items, that are
updated frequently.
If they are updated frequently, is there a more
dynamic method of updating without having to
always rev and RFC?
Frank: Good point; Network device configurations are
relatively stable. Most configuration specified in
their documents are relatively stable.
Ben Kaduk: Glad elliptic curve has been added
Adam: How applicable to other devices (Juniper, Cisco,
Barracuda), not just Huawei devices?
Response: Need to think about it; More research
needed
Adam: We have stuff at CIS (benchmarks). How does
this stuff map to SACM configuration baselines Frank:
Internal security baseline for their devices. Welcome
more contribution Nancy: Trying to understand;
Different baselines for different planes; Within each
capability, there are different security capabilities.
How that can become relevant to SACM. Are the
baselines relevant to SACM or I2NSF? Frank: Not a
security FUNCTION model, its a security POLICY model
Nancy: Looking at endpoint posture, services are more
complex Adam: Included network devices as an endpoint.
Network devices have a security configuration.
Posture assessment of a network device treated the same
as any other connected endpoint. See this as being
important in SACM. How are we going to organize what
to collect in an abstract way. This stuff describes
more specific attributes that are collected. Karen:
Time check. From a chair's perspective, its been a
"one-vendor" thing. Want to include other vendors to
ensure applicability. Frank: True - need more vendors
included in the process
Qiushi:
Management Plane baseline
4 submodules
updates to descriptive text in submodules
Administrator Security Policy
password complexity
password security policy
login failed limit
Login Security
controls on different login channels - SSH,
Telnet, etc
AAA
schemes, RADIUS, TACACS+
Admin access stats
Next steps - Update the other 3 submodules
collaboration from other vendors
adapt to YANG push mechanisms
10. Next Steps - (Chairs/WG)
Charter Dates Discussion
Adoption of ROLIE checklist draft
Week of Aug 20/27th
Week of Oct 8/15th
YANG Push - Bundled notification methods
*** HUM for 1 virtual interim in SEPT
FIN.