Nancy Cam-Winget (ncamwing@cisco.com) June 2015 SACM Requirements Nancy Cam-Winget (ncamwing@cisco.com) June 2015.

Slides:



Advertisements
Similar presentations
© 2006 NEC Corporation - Confidential age 1 November SPEERMINT Security Threats and Suggested Countermeasures draft-ietf-speermint-voipthreats-01.
Advertisements

NEA Working Group IETF meeting Nov 17, 2011 IETF 82 - NEA Meeting1.
SACM Information Model. Current Status First WG draft posted 10/24 Many open issues remain Several comments / suggestions sent to WG for review Today.
Copyright © The Open Group 2011 Your Name Your title 44 Montgomery Street Suite 960 San Francisco, CA USA Tel
WG RAQMON Internet-Drafts RMON MIB WG Meeting Washington, Nov. 11, 2004.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
1 IPFIX Protocol Specifications IPFIX IETF-59 March 3, 2004 Benoit Claise Mark Fullmer Reinaldo Penno Paul Calato Stewart Bryant Ganesh Sadasivan.
July 27, 2009IETF NEA Meeting1 NEA Working Group IETF 75 Co-chairs: Steve Hanna
SACM Requirements Nancy Cam-Winget March 2014.
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
QoS NSLP draft-ietf-nsis-qos-nslp-06.txt Slides: Sven van den Bosch, Georgios Karagiannis, Andrew McDonald.
Terminology and Use Cases Status Report David Harrington IETF 88 – Nov Security Automation and Continuous Monitoring WG.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
NEA Requirements Update -06 version summary. Posture Transport Considerations Issue –Ability of existing protocols used for network access to meet requirements.
Doc.: IEEE /1206r0 Submission Oct 2004 Black, NokiaSlide 1 TGk LB71 Parallel category comment resolution Simon Black (Nokia)
March 2006 CAPWAP Protocol Specification Update March 2006
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
IHE ITI XDStar Volume 3, Section 4 Redocumentation Debrief Gila Pyke Lead Facilitator/Cognaissance.
ITU Liaison on T-MPLS Stewart Bryant
Stephen Banghart Dave Waltermire
Guidance to SDS Implementation
IEEE MEDIA INDEPENDENT HANDOVER DCN:
OGF PGI – EDGI Security Use Case and Requirements
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
XCON WG IETF-64 Meeting XCON Framework Overview & Issues
CTI STIX SC Monthly Meeting
PANA Issues and Resolutions
Interface extensions YANG & VLAN sub-interface YANG Status update
Nov 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Resolution of PAR and 5C Comments for MBAN Study.
The peer review process
Carlos Pignataro Bruno Stevant Jean-Francois Tremblay Bill Storer
Review of Part C of the Code – Applicability
draft-ietf-geopriv-lbyr-requirements-02 status update
Part C State Performance Plan/Annual Performance Report:
Alignment of Part 4B with ISAE 3000
Inducements Mike Ashley – IESBA Member and Task Force Chair
Review of Part C of the Code – Inducements & Applicability
Recommended Draft Policy ARIN : Post-IPv4-Free-Pool-Depletion Transfer Policy Staff Introduction.
draft-ipdvb-sec-01.txt ULE Security Requirements
Working Group Draft for TCPCLv4
Structure–Feedback on Structure ED-2 and Task Force Proposals
WG Document Status Compiled By: Lou Berger, Vishnu Pavan Beeram
Response to Comments Received on the a PAR and CSD
Updates to Draft Specification for DTN TCPCLv4
David Noveck IETF99 at Prague July 20, 2017
Multi-server Namespace in NFSv4.x Previous and Pending Updates
Alignment of Part 4B with ISAE 3000
Inducements Mike Ashley – IESBA Member and Task Force Chair
IEEE MEDIA INDEPENDENT HANDOVER DCN:
TG1 and System Design Document
Comments for Rev PAR – July 2010 Plenary
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Web-based Imaging Management System Working Group - WIMS
TGn PHY Ad Hoc Submission on Selected Comments
Alignment of Part 4B with ISAE 3000
Congestion Control Comments Resolution
Alignment of Part 4B with ISAE 3000
ma to NesCom Bob Heile Chair, IEEE802.15
ma to NesCom Bob Heile Chair, IEEE802.15
BPSec: AD Review Comments and Responses
TGi Draft 1 Clause – 8.5 Comments
IETF Montreal BFD YANG Data Model
Nuclear Safety Standards Committee 35th Meeting 24 – 28 June 2013
Henk Birkholz Jarret Lu Nancy Cam-Winget
Response to PAR/CSD Comments Bob Heile Chair, IEEE
Nancy Cam-Winget July 2017 XMPP-Grid Status Nancy Cam-Winget July 2017.
Presentation transcript:

Nancy Cam-Winget (ncamwing@cisco.com) June 2015 SACM Requirements Nancy Cam-Winget (ncamwing@cisco.com) June 2015

Status Draft v06 published in May 20, 2015 Draft now in WGLC Github issue status: 19 open issues

Remaining Issues for discussion Non-repudiation: Section 5 is only place to mention “non-repudiation as out of scope for SACM”. However, debates on definition of non-repudiation in thread Discussion: Does it need mentioning or just remove line? Do we add new set of terms and definitions in Terminology draft for: integrity, origin of data, confidentiality, authentication and authorization (all of which are SACM requirements of sorts)

Open Issues - 1 Section Note Suggested Actions/Comment 5 Non-repudiation: “non-repudiation as out of scope for SACM”. However, debates and disagreement on definition of non-repudiation in Github thread Does it need mentioning or just remove line? Do we add new set of terms and definitions in Terminology draft for: integrity, origin of data, confidentiality, authentication and authorization (all of which are SACM requirements of sorts) General T-XXX to OP-XXX: suggestion that all Transport requirements be OP requirements Need group consensus as (Nancy) believes either (or both) could provide security;e.g. Operations are distinct from transport 2.4 OP-004: and OP-002 read very similar. Need to have clarification and consistancy with the architecture. Suggestions are needed to address this one. 2.6 T-001: good suggestion to clarify on transport layer requirements Editor totally missed this comment in GitHub and should accept the recommended text.

Open Issues -2 Section Note Suggested Actions/Comment 2.6 Clarification of intent in section as “transport” can be TCP/UDP vs. Data Transport (tho none were cited) vs. general transport ala TLS, DTLS, RSYNC Editor suggests making clarification that intent is for network transport protocols which are TCP, UDP and security mechanisms e.g. TLS, DTLS are more to address the transport requirement. 2.2 Discussion of whether there is only 1 SACM information model vs. many. Consensus was to adopt only 1 information model but many data models. Would like consensus to close this issue or suggestions for required action. 2.4 DM-010: Attribute dictionary is covered in IM-001, suggestion is to remove this or reshape this requirement to clarify that a DM can define additional attributes which are not part of the IM and there are clarity requirements on these new attributes . Would like consensus as to which direction to go. Editor’s not clear that having the allowance of additional attributes and “clarity requirements” are enforceable or the type of guidance needed? If the latter is chosen, please provide text.

Open Issues -3 Section Note Suggested Actions/Comment 2.1 DM-006: - s/(e.g. Provider A)/(e.g. a specific collector or evaluator)/ In DM-011 - Is the data being shared by a provider endpoint, or is the data being shared about the provider endpoint? Editor should accept suggestion. Recent response to Jim, I’ve suggested adding “e.g. in the case the provider is the target endpoint” to clarify that the data is shared by a provider. But the origin could state that the provider is also the target endpoint. G-009: questions on Discovery intent of discovery of schemas vs Endpoint Discovery is of target endpoints. Editor can update Discovery to state “a mechanism for SACM components to discover…” in G-009 and retitle G-010 to “Target Endpoint Discovery” along with matching descriptive text. Where is data integrity provided? We discussed as it can be part of data operation/data transport or network transport. But we didn’t conclude on actions to take.

Open Issues -4 Section Note Suggested Actions/Comment 2.1 Replace “data attribute” with “attribute” Editor missed references in G-005 that need updating. G-003: continued discussion relating to transport. Modifications were made to the Transport section to clarify this. Can the commenter further suggest how to address this comment? Or group suggestions? G-001: future vs non-standard extensions discussions. Modifications were made to remove non-standard extensions as it is covered by “future” extensions. Can we get Jim and Lisa to agree that this comment has been sufficiently satisfied to close? 2 General comment addressed but editorial needs to be resolved: You need to be consistent on the use of period vs colon at the end of the pity paragraph title. Accept editorial edit for consistancy

Resolved issues still open? Section Note Suggested Action 2.5 OP-003: suggested sentence was added: This requirement SHOULD NOT be interpreted as preventing a collector from providing attributes which were not part of the original request. Sentence was added but issue is still open? OP-002: suggestions to retitle was made Collection Separation is now Collection Abstraction per the suggestion. But issue is still open? 2.4 DM-001: suggestions to clarify intent was made parenthetically to state example of the model element. Editor accidentally removed the pithy title (Uniqueness), which should be added. But can Jim Schaad comment on whether the addition satisfies his concern to close issue? 2.1 Reference to data elements removed from this section. Not sure why this is still open? 2 Step 1 from -04 draft was updated to no longer “define the assets” but rather to “map them”. Also asset is defined in the terminology draft.

Next Steps Provide actions and feedback to WGLC Editor can generate new draft based on consensus