Automated XML Content Data Exchange and Management draft-waltermire-content-repository-00

Slides:



Advertisements
Similar presentations
Cultural Heritage in REGional NETworks REGNET. October 2001Project presentation REGNET 2 T1.3. IDENTIFICATION OF STANDARDS TO BE USED 1. OBJECTIVES 2.
Advertisements

EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
Developing a Metadata Exchange Format for Mathematical Literature David Ruddy Project Euclid Cornell University Library DML 2010 Paris 7 July 2010.
Managed Incident Lightweight Exchange (MILE) Overview and Participation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office.
HEP Data Sharing … … and Web Storage services Alberto Pace Information Technology Division.
Achieving Competitive Advantage and ROI with MetaManager  Metadata Management  Content Enhancements  Standardization  Security and more…
B. Davie, L. Peterson et al. draft-davie-cdni-framework-00.txt.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
National Science Digital Library (NSDL) Core Infrastructure Metadata Repository (“union catalog”) Naomi Dushay Cornell University.
All Things to All People Combining Resources to Build an Integrated Digital Repository Preservation and Access for Electronic College and University Records.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
1 SIPREC Recording Metadata format (draft-ram-siprec-metadata-format- 01) IETF-80 SIPREC MEETING R Parthasarathi On behalf of the team Team: Paul Kyzivat,
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
A Model for Exchanging Vulnerability Information draft-booth-sacm-vuln-model-01 David Waltermire.
Metadata Harvesting The Hague, 13 & 14 January 2009 Julie Verleyen Scientific Coordinator, Europeana Office EuropeanaLocal Knowledge Sharing Workshop.
Introduction to MDA (Model Driven Architecture) CYT.
Query Health Operations Workgroup HQMF & QRDA Query Format - Results Format February 9, :00am – 12:00am ET.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
Scalable Systems Software Center Resource Management and Accounting Working Group Face-to-Face Meeting October 10-11, 2002.
HL7 hData Security Elements. Security Considerations hData can be used in a broad variety of situations – EHR systems, line of business applications –
FI-CORE Data Context Media Management Chapter Release 4.1 & Sprint Review.
Sharing Value Sets (SVS Profile) Ana Estelrich GIP-DMP.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
Topic Rathachai Chawuthai Information Management CSIM / AIT Review Draft/Issued document 0.1.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
CDN Interconnection Problem Statement draft-jenkins-cdni-problem-statement-02 Ben Niven-Jenkins Francois Le Faucheur Nabil Bitar.
SACM Requirements Nancy Cam-Winget March 2014.
Terminology and Use Cases Status Report David Harrington IETF 88 – Nov Security Automation and Continuous Monitoring WG.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS Instructor Ms. Arwa Binsaleh.
National Monitoring Network Report Methods and Data Comparability Chapter 5 Outline National Monitoring Council Meeting April 12-14, 2005.
OAI Overview DLESE OAI Workshop April 29-30, 2002 John Weatherley
Any data..! Any where..! Any time..! Linking Process and Content in a Distributed Spatial Production System Pierre Lafond HydraSpace Solutions Inc
Presentation on MDAS API, WD1 ©2001 Farance Inc.1 MDAS API Presentation On WD1 Frank Farance, Farance Inc
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
David Smiley SOA Technology Evangelist Software AG Lead, follow or get out of the way Here Comes SOA.
Sociedad Digital de autores y editores Digital Media Project (DMP) Value Chain Functions, Requirements And Architecture Marc Gauvin Requirements.
Service Oriented Architecture + SOAP -Robin John.
Using WS-I to Build Secure Applications Anthony Nadalin Web Services Interoperability Organization (WS-I) Copyright 2008, WS-I, Inc. All rights reserved.
Acquisitions, Everywhere Modeling an acquisitions data standard to connect a distributed environment Eric Hanson, North Carolina State University Libraries.
Copyright 2010, The World Bank Group. All Rights Reserved. Recommended Tabulations and Dissemination Section B.
Electronic Submission of Medical Documentation (esMD)
ISMS IETF72 David Harrington. Status IETF72 Transport Subsystem for the Simple Network Management Protocol (SNMP) –IETF69: draft-ietf-isms-tmsm-09.txt.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Moving towards an IRS WG Charter Ross Callon IETF 85, Atlanta.
Standards & Interoperability (S&I) Structured Data Capture (SDC) FHIR Profile IG SWG.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
1 SAIC XMSF Update XMSF Workshop & MOVES Open House 4-5 August 2003 Katherine L. Morse, Ph.D., David L. Drake, Ryan.
NVS New Zealand National Vegetation Survey. What is NVS? NVS (National Vegetation Survey) – New Zealand’s largest archive facility for plot-based vegetation.
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
Course on persistent identifiers, Madrid (Spain) Information architecture and the benefits of persistent identifiers Greg Riccardi Director Institute for.
Asset Summary Reporting draft-davidson-sacm-asr-00 David Waltermire
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
SACM Vulnerability Assessment Scenario IETF 95 04/05/2016.
Bing Liu (speaker), Sheng WG, ietf96, July 2016
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
An Overview of Data-PASS Shared Catalog
ServiceNow Implementation Knowledge Management
Project Team kick-off meeting
SUPA Policy-based Management Framework (SUPA: Simplified Use of Policy Abstractions) draft-ietf-supa-policy-based-management-framework-01 Will Liu, John.
Business Process Management
Adding Computational Resources to SURAgrid (the document) September 27, 2007 Mary Trauner SURA Consultant.
Metadata The metadata contains
EOSC-hub Contribution to the EOSC WGs
Presentation transcript:

Automated XML Content Data Exchange and Management draft-waltermire-content-repository-00 David Waltermire

Current State Work has started to standardize the expression of content used to drive security processes – Assessment methods (e.g. OVAL) – Configuration policies (e.g. XCCDF) – Reporting format descriptions (e.g. ASR) – Record-based data feeds (e.g. vulnerability info) Standardization in content enables multiple tools to use the same content Content is broadly distributed using largely ad- hoc methods (e.g. HTTP, sneaker-net, product- bundled)

Content Distribution Issues Lack of interoperability between existing content-based solutions Content is often duplicated during distribution – Poor reuse model: copy-and-paste propagates defects – Complicates tracking/responding to bugfixes and other necessary updates Content is not often reused, even when usage rights allow reuse – Causes duplication of effort – Unnecessary drift in the approach defined within the content Content is packaged/bundled in many different ways, complicating data access (e.g. compression, packaging, composition) Verifying the validity of content can be challenging – Integrity mechanisms are non-standardized Management of dependencies are often handled using ad-hoc methods

Content Repository Requirements Vendor-neutral content access Support for multiple document encoding formats (e.g. XML, JSON) – Support for validation of content conformity when possible Utilize existing transport protocols if possible Retrieval of content by identifier (as a resource?) Support for requesting content revisions Content references should be dereferenceable Provide standardized mechanism(s) for access control – Security authenticating the user at minimum Support mechanism(s) for caching – May limit use of secure transport in some use cases (e.g. TLS)

How does this relate to the IETF? Security Automation and Continuous Monitoring (SACM) Use Case 1: System State Assessment (draft-waltermire- sacm-use-cases-02) Data Collection (4.1.2) – Enables data collection methods defined as automation content to be distributed and used by assessment tools Assessment Result Analysis (4.1.3) – Content records can contain scoring/weighting information and expected state Content management (4.1.4) – Supports the standardized retrieval of various types of content

How does it relate to the IETF? (Cont’d) Security Automation and Continuous Monitoring (SACM) Use Case 3: Security Control Verification and Monitoring (draft-waltermire-sacm-use-cases-02) Tasking and Scheduling (4.3.1) – Enables the identification (and eventual retrieval) of any content needed to perform assessments Data Aggregation and Reporting (4.3.2) – Provide supporting information based on content references that enhance reported data – Use referenced metadata to support data aggregation

How does it relate to the IETF? (Cont’d) Managed Incident Lightweight Exchange (MILE WG) IODEF-extension to support structured cybersecurity information (SCI) (draft-ietf-mile-sci-05) Enables SCI to be included by reference instead of being embedded Different in scope and possibly in concept from draft- field-mile-rolie-00 This effort is focused on assessment content and supporting metadata used for reporting (broad) Rolie is focused on the lightweight exchange of indicator and incident related information (specific)

Future Work / How you can help? Help define a protocol draft describing how content is retrieved Help to refine the requirements Comment on the draft Volunteer to be a co-editor