Network Working Group D.W. Waltermire, Ed.
Internet-Draft NIST
Intended status: Informational July 16, 2012
Expires: January 15, 2013

Analysis of Security Automation and Continuous Monitoring (SACM) Use Cases
draft-waltermire-sacm-use-cases-01

Abstract

This document identifies foundational use cases, derived functional capabilities and requirements, architectural components, and the supporting standards needed to define an interoperable, automation infrastructure required to support timely, accurate and actionable situational awareness over an organization's IT systems. Automation tools implementing a continuous monitoring approach will utilize this infrastructure together with existing and emerging event, incident and network management standards to provide visibility into the state of assets, user activities and network behavior. Stakeholders will be able to use these tools to aggregate and analyze relevant security and operational data to understand the organizations security posture, quantify business risk, and make informed decisions that support organizational objectives while protecting critical information. Organizations will be able to use these tools to augment and automate information sharing activities to collaborate with partners to identify and mitigate threats. Other automation tools will be able to integrate with these capabilities to enforce policies based on human decisions to harden systems, prevent misuse and reduce the overall attack surface.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http:/⁠/⁠datatracker.ietf.org/⁠drafts/⁠current/⁠.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on January 15, 2013.

Copyright Notice

Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http:/⁠/⁠trustee.ietf.org/⁠license-⁠info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Introduction

This document addresses foundational use cases in security automation. Portions of these use cases may be considered when establishing a charter for the Security Automation and Continuous Monitoring (SACM) working group within the IETF. This working group will address a portion of the standards needed to define an interoperable, automation infrastructure required to support timely, accurate and actionable situational awareness over an organization's IT systems. This document enumerates use cases and break down related concepts that cross many IT security information domains.

Sections [...] of this document focus on:

The standards identified in this document provide a foundation for creating interoperable automation tools and continuous monitoring solutions that provide visibility into the state of assets, user activities, and network behavior. Stakeholders will be able to use these tools to aggregate and analyze relevant security and operational data to understand the organizations security posture, quantify business risk, and make informed decisions that support organizational objectives while protecting critical information. Organizations will be able to use these tools to augment and automate information sharing activities to collaborate with partners to identify and mitigate threats. Other automation tools will be able to integrate with these capabilities to enforce policies based on human decisions to harden systems, prevent misuse and reduce the overall attack surface.

1.1. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

2. Key Concepts

Define/reference the major concepts included in this document.

3. Use Cases

Describe use cases, one per sub-section.

Things to consider including (but not limited to):

3.1. UC1: Assessment and Enforcement of Acceptable State

Controlling access to networks and services based on the assessment and analysis of host and/or network state based on machine processable content.

Possible "things" that are being measured:

Possible desired outcomes to address:

The Network Endpoint Assessment (NEA) protocols (PA-TNC [RFC5792], PB-TNC [RFC5793], PT-TLS [I-D.ietf-nea-pt-tls], and PT-EAP [I-D.ietf-nea-pt-eap]) may be used to query and transport the things to be measured, as well as providing for manual or automated remediation and mitigation. SCAP content (XCCDF, OVAL, OCIL, etc.) may be transported over the NEA protocols to indicate which things are to be measured and send the results of the measurements. And enforcement may be implemented with RADIUS [RFC2865] or DIAMETER [RFC3588].

3.2. UC2: Behavioral Monitoring and Enforcement

Controlling access to networks and services based on the detection and analysis of host and/or user behavior using automatable information from various sources.

Possible "things" that are being measured:

Possible desired outcomes to address:

The Trusted Computing Group's [IF-MAP] protocol provides a standard way to rapidly share events and updates related to user/device behavior and network events, enabling logging or swift response such as reduced or terminated access.

Possible other things to address:

3.3. UC3: Security Control Verification and Monitoring

Continuous assessment of the implementation and effectiveness of security controls based on machine processable content.

Possible "things" that are being measured:

Possible desired outcomes to address:

This use case extends UC1 to ensure that changes to the things measured in UC1 are rapidly detected, reported, and optionally responded to with manual or automated remediation and mitigation.

Possible other things to address:

3.4. UC4: Secure Exchange of Risk and Compliance Information

Sharing security and/or operationally relevant information within and across trust boundaries using secure, automated communication channels and formats.

Possible "things" that are being measured:

Possible desired outcomes to address:

Possible other things to address:

3.5. UC5: Automated Forensics Investigation

Remote and/or local collection of organizational, network, and/or host information to generate situational awareness that will serve as an input to enhance incident detection, investigation, and response activities.

Possible "things" that are being measured:

Possible desired outcomes to address:

Possible other things to address:

4. Functional Capabilities

Decompose the functional capabilities needed to support the use cases, one per sub-section. Cross reference the use case dependencies where they exist.

Things to consider including (but not limited to):

4.1. Functional Capability 1

Describe the first capability.

4.2. Functional Capability n

Describe the n capability.

5. Functional Components

Describe the abstract functional components needed to provide the capabilities described in the previous section. Describe any relationships between the components and how they can be composed to address functional capabilities. (this might be better defined in the previous section.)

Things to consider including (but not limited to):

6. Data Exchange Models and Communications Protocols

Document where existing work exists, what is currently defined by SDOs, and any gaps that should be addressed. Point to existing event, incident and network management standards when available. Describe emerging efforts that may be used for the creation of new standards. For gaps provide insight into what would be a good fit for SACM or another IETF working groups.

This will help us to identify what is needed for SACM to be successful. This section will help determine which of the specifications can be normatively referenced and what needs to be addressed in the IETF. This should help us determine any protocol or guidance documentation we will need to generate to support the described use cases.

Things to address:

7. IANA Considerations

This memo includes no request to IANA.

All drafts are required to have an IANA considerations section (see RFC 5226 [RFC5226] for a guide). If the draft does not require IANA to do anything, the section contains an explicit statement that this is the case (as above). If there are no requirements for IANA, the section will be removed during conversion into an RFC by the RFC Editor.

8. Security Considerations

All drafts are required to have a security considerations section. See RFC 3552 [RFC3552] for a guide.

9. Acknowledgements

The author would like to thank Kathleen Moriarty and Stephen Hanna for contributing text to this document. The author would also like to acknowledge the members of the SACM mailing list for thier keen and insightful feedback on the concepts and text within this document.

10. References

10.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.

10.2. Informative References

[RFC2865] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, June 2000.
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC Text on Security Considerations", BCP 72, RFC 3552, July 2003.
[RFC3588] Calhoun, P., Loughney, J., Guttman, E., Zorn, G. and J. Arkko, "Diameter Base Protocol", RFC 3588, September 2003.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May 2008.
[RFC5792] Sangster, P. and K. Narayan, "PA-TNC: A Posture Attribute (PA) Protocol Compatible with Trusted Network Connect (TNC)", RFC 5792, March 2010.
[RFC5793] Sahita, R., Hanna, S., Hurst, R. and K. Narayan, "PB-TNC: A Posture Broker (PB) Protocol Compatible with Trusted Network Connect (TNC)", RFC 5793, March 2010.
[I-D.ietf-nea-pt-eap] Cam-Winget, N and P Sangster, "PT-EAP: Posture Transport (PT) Protocol For EAP Tunnel Methods", Internet-Draft draft-ietf-nea-pt-eap-02, May 2012.
[I-D.ietf-nea-pt-tls] Sangster, P, Cam-Winget, N and J Salowey, "PT-TLS: A TCP-based Posture Transport (PT) Protocol", Internet-Draft draft-ietf-nea-pt-tls-05, May 2012.

Appendix A. Additional Stuff

This becomes an Appendix if needed.

Author's Address

David Waltermire (editor) National Institute of Standards and Technology 100 Bureau Drive Gaithersburg, Maryland 20877 USA EMail: david.waltermire@nist.gov