Last Call: <draft-ietf-sacm-use-cases-08.txt> (Endpoint Security Posture Assessment - Enterprise Use Cases) to Informational RFC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The IESG has received a request from the Security Automation and
Continuous Monitoring WG (sacm) to consider the following document:
- 'Endpoint Security Posture Assessment - Enterprise Use Cases'
  <draft-ietf-sacm-use-cases-08.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2015-03-16. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This memo documents a sampling of use cases for securely aggregating
   configuration and operational data and evaluating that data to
   determine an organization's security posture.  From these operational
   use cases, we can derive common functional capabilities and
   requirements to guide development of vendor-neutral, interoperable
   standards for aggregating and evaluating data relevant to security
   posture.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-sacm-use-cases/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-sacm-use-cases/ballot/


No IPR declarations have been submitted directly on this I-D.






[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux