A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Security Automation and Continuous Monitoring Working Group of the IETF. Title : Using Security Posture Assessment to Grant Access to Enterprise Network Resources Author(s) : David Waltermire David Harrington Filename : draft-ietf-sacm-use-cases-01.txt Pages : 25 Date : 2013-09-11 Abstract: This memo documents a sampling of use cases for securely aggregating configuration and operational data and assessing that data to determine an organization's security posture. From these operational use cases, we can derive common functional capabilities and requirements to guide development of vendor-neutral, interoperable standards for aggregating and assessing data relevant to security posture. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-sacm-use-cases There's also a htmlized version available at: http://tools.ietf.org/html/draft-ietf-sacm-use-cases-01 A diff from the previous version is available at: http://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-use-cases-01 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ I-D-Announce mailing list I-D-Announce@ietf.org https://www.ietf.org/mailman/listinfo/i-d-announce Internet-Draft directories: http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt