Internet DRAFT - draft-davidson-sacm-asr
draft-davidson-sacm-asr
INTERNET-DRAFT Mark Davidson
Intended Status: Proposed Standard The MITRE Corporation
David Oliva
Expires: March 28, 2013 September 24, 2012
Asset Summary Reporting
draft-davidson-sacm-asr-00
Abstract
This specification defines the Asset Summary Reporting (ASR), a data
model for expressing the data exchange format of summary information
relative to one or more metrics. ASR reduces the bandwidth
requirement to report information about assets in the aggregate since
it allows for reporting aggregates relative to metrics, as opposed to
reporting data about each individual asset, which can lead to a
bloated data exchange. ASR is vendor neutral and leverages widely
adopted, open specifications; it is flexible, and suited for a wide
variety of reporting applications.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright and License Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
Davidson, Oliva Expires March 28, 2013 [Page 1]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 Purpose and Scope . . . . . . . . . . . . . . . . . . . . . 4
1.2 Audience . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Document Structure . . . . . . . . . . . . . . . . . . . . . 5
1.4 Document Conventions . . . . . . . . . . . . . . . . . . . . 5
2 Terms and Abbreviations . . . . . . . . . . . . . . . . . . . . 6
2.1 Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3 Relationships to Existing Standards and Specifications . . . . . 8
4 Conformance . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.1 Product Conformance . . . . . . . . . . . . . . . . . . . . 9
4.2 Content Conformance . . . . . . . . . . . . . . . . . . . . 9
5 ASR Data Model Overview and Key Concepts . . . . . . . . . . . . 9
5.1 Data Model Overview . . . . . . . . . . . . . . . . . . . . 9
5.1.1 Summary Report . . . . . . . . . . . . . . . . . . . . . 10
5.1.2 Record Set . . . . . . . . . . . . . . . . . . . . . . . 10
5.1.3 Record . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1.4 Data Source . . . . . . . . . . . . . . . . . . . . . . 10
5.1.5 Metadata . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2 Key Concepts . . . . . . . . . . . . . . . . . . . . . . . . 10
5.2.1 Record Attributes . . . . . . . . . . . . . . . . . . . 11
5.2.2 Record Set Type . . . . . . . . . . . . . . . . . . . . 11
5.2.3 Paging . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.2.4 Referencing Assets . . . . . . . . . . . . . . . . . . . 12
6 ASR Data Model Description . . . . . . . . . . . . . . . . . . . 12
6.1 XML Data Model Introduction . . . . . . . . . . . . . . . . 12
6.2 XML Data Model Requirements . . . . . . . . . . . . . . . . 15
7 Defining a Record Set Type . . . . . . . . . . . . . . . . . . . 18
8 IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 19
9 Security Considerations . . . . . . . . . . . . . . . . . . . . 19
10 References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
10.1 Normative References . . . . . . . . . . . . . . . . . . . 20
Davidson, Oliva Expires March 28, 2013 [Page 2]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
10.2 Informative References . . . . . . . . . . . . . . . . . . 21
Appendix A Acknowledgements . . . . . . . . . . . . . . . . . . . 21
Appendix B Use Cases . . . . . . . . . . . . . . . . . . . . . . . 21
A.1 Continuous Monitoring . . . . . . . . . . . . . . . . . . . 21
A.2 Security Automation . . . . . . . . . . . . . . . . . . . . 21
Appendix C Integration with ARF . . . . . . . . . . . . . . . . . 22
Appendix D Record Set Example . . . . . . . . . . . . . . . . . . 23
Appendix E Sample Record Set Type Definitions . . . . . . . . . . 25
F.1 SCAP Attributes . . . . . . . . . . . . . . . . . . . . . . 29
F.3 Statistical Attributes . . . . . . . . . . . . . . . . . . . 29
F.4 Other Attributes . . . . . . . . . . . . . . . . . . . . . . 29
E.2 Finding Attributes . . . . . . . . . . . . . . . . . . . . . 29
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29
Davidson, Oliva Expires March 28, 2013 [Page 3]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
1 Introduction
The Asset Summary Reporting (ASR) format is a data model to express
the transport format of summary information about one or more sets of
assets. The data model facilitates the interchange of aggregated
asset information throughout and between organizations. ASR is vendor
neutral and leverages widely adopted, open specifications; it is
flexible, and suited for a wide variety of reporting applications.
The primary goal of the ASR format is to describe summary information
about one or more arbitrarily large and complex asset-related data
sets in a standardized manner. Second, ASR seeks to allow content
producers the ability to choose an appropriate level of detail
depending on their needs and data set size requirements. Finally, ASR
seeks to reduce the complexity of producing and consuming summary
result documents. For the purposes of this specification, an asset is
considered to be anything that has value to an organization.
Computing devices are one form of asset that many organizations
track. Additional examples are networks, people, and organizations.
This specification, however, does not limit asset summary reporting
to those examples; information about any set of assets may be
summarized. While this specification was developed to support the
immediate needs of the security automation and the continuous
monitoring communities, it is expected that this specification will
be valuable to any process where producing or consuming summary data
is desired.
1.1 Purpose and Scope
The purpose of this report is to define the ASR specification. The
report gives an introduction to ASR version 1.0, defines ASR's data
model, and documents the conformance requirements to comply with ASR.
Other versions of ASR and the associated component specifications,
including emerging specifications and future versions, are not
addressed here. Future versions of ASR will be defined in distinct
revisions of this report, each clearly labeled with a revision number
and the appropriate ASR version number. This report does not describe
the queries, instructions, methods, processes, or data required to
produce an ASR document. This report does not describe how to
transform any specific data model or data set into an ASR document.
This report normatively describes only the ASR format. The appendices
contain additional information about how to use ASR.
1.2 Audience
The intended audience for this specification is product vendors who
are developing applications that either produce or consume aggregated
asset information, particularly those that will interoperate with
other producers or consumers of aggregated asset information.
Davidson, Oliva Expires March 28, 2013 [Page 4]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
1.3 Document Structure
The remainder of this document is organized into the following major
sections:
Section 2 defines the terms used within this specification and
provides a list of common abbreviations.
Section 3 describes how this specification relates to other standards
and specifications.
Section 4 defines the conformance requirements for ASR.
Section 5 provides an overview of the ASR data model constructs and
key concepts.
Section 6 documents the ASR data model.
Section 7 specifies the requirements for defining a record set type.
Appendix A describes use cases for ASR.
Appendix B indicates how to integrate ASR with the Asset Reporting
Format (ARF).
Appendix C provides some ASR examples.
Appendix D provides examples of record set type definitions.
Appendix E lists pre-defined record attributes.
Appendix F documents normative references.
1.4 Document Conventions
Throughout this specification, when referencing a specification
listed in Appendix F, the name will be written between brackets, such
as [XSD].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC 2119].
XML elements [XML] are referred to using qualified names when they
are not in the ASR namespace. Elements with no prefix can be assumed
to be in the ASR namespace, unless otherwise noted. A qualified name
associates a named element with a namespace. The namespace identifies
Davidson, Oliva Expires March 28, 2013 [Page 5]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
the specific XML schema that defines (and consequently may be used to
validate) the syntax of the element instance. A qualified name
declares this schema to element association using the format
'prefix:element-name'. The association of prefix to namespace is
defined in the metadata of an XML document and varies from document
to document. In this specification, the conventional mappings listed
in Table 1-1 are used.
Table 1-1: Conventional XML Mappings
Mappings Prefix Namespace URI Schema
ai http://scap.nist.gov/schema/asset-identification/1.1 Asset
Identification 1.1
arf-
rel http://scap.nist.gov/specifications/arf/vocabulary/relationships/1.0# ARF
1.1 Relationships
asr http://scap.nist.gov/schema/asset-summary-reporting/1.0 ASR 1.0
asr-attr http://scap.nist.gov/schema/asset-summary-
reporting/1.0/attr ASR 1.0 Common Attributes
2 Terms and Abbreviations
This section defines a set of common terms and abbreviations used
within this specification.
2.1 Terms
Asset: Anything that has value to an organization, including, but not
limited to, another organization, person, computing device,
information technology (IT) system, IT network, IT circuit, software
(both an installed instance and a physical instance), virtual
computing platform (common in cloud and virtualized computing), and
related hardware (e.g., locks, cabinets, keyboards).
Asset Identification: The attributes and methods necessary for
uniquely identifying a given asset. A full explanation of asset
identification is provided in [Asset Identification].
Data Source: Represents a source of data that could be used to build
a summary report.
Population: A defined set of assets from which reporting is based.
Record Set: A grouping of related data about a topic, organized into
Davidson, Oliva Expires March 28, 2013 [Page 6]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
records and data elements.
Record Set Type: A description of a record set that defines
requirements for the record set, and the semantics of the data
fields.
Summary Report: A collection of related record sets into a coherent
report, as defined by the report creator. A summary report may be
represented in multiple pages, which would be manifested as multiple
XML documents.
2.2 Acronyms
ARF - Asset Reporting Format
ASR - Asset Summary Reporting Format
CCE - Common Configuration Enumeration
CCSS - Common Configuration Scoring System
CISO - Chief Information Security Officer
CPE - Common Platform Enumeration
CPU - Central Processing Unit
CVE - Common Vulnerabilities and Exposures
CVSS - Common Vulnerability Scoring System
CWE - Common Weakness Enumeration
CWSS - Common Weakness Scoring System
FIPS - Federal Information Processing Standard
IETF - Internet Engineering Task Force
IR - Interagency Report
ISCM - Information Security Continuous Monitoring
IT - Information Technology
ITL - Information Technology Laboratory
NIST - National Institute of Standards and Technology
Davidson, Oliva Expires March 28, 2013 [Page 7]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
OCIL - Open Checklist Interactive Language
OS - Operating System
OVAL - Open Vulnerability and Assessment Language
RACI - Responsible, Accountable, Consult, Inform (Responsibility
Matrix)
RFC - Request for Comment
SCAP - Security Content Automation Protocol
SIEM - Security Information and Event Management
SP - Special Publication
SWID - Software Identification
URI - Universal Resource Identifier
USGCB - United States Government Configuration Baseline
W3C - World Wide Web Consortium
XCCDF - Extensible Configuration Checklist Description Format
XML - Extensible Markup Language
XSD - XML Schema
XSLT - Extensible Stylesheet Language Transformations
3 Relationships to Existing Standards and Specifications
ASR's relationships to other selected specifications are described
below.
1. Asset Identification - ASR leverages [Asset Identification] to
identify assets for the ASR document. Asset Identification is a
useful component of ASR, as it enables the correlation and fusion of
various ASR documents and ASR content. ASR provides a place to
optionally list assets defined using [Asset Identification].
2. Asset Reporting Format (ARF) - ASR may be used as a payload for an
Asset Reporting Format (ARF) document [ARF]. ASR is not required to
be packaged as an ARF payload; however, Appendix B provides guidance
on using ASR in an ARF report.
Davidson, Oliva Expires March 28, 2013 [Page 8]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
4 Conformance
Developers and organizations may want to build products in
conformance with ASR to foster consistency and interoperability of
those products. Users of those products, and consumers of the content
generated by those products, would then know the format of the data
that the product will produce and can consume. In addition, products
that conform to this specification will be better able to
interoperate and exchange reporting information with other products
that conform to ASR. Products may want to claim conformance with this
specification to advertise their interoperability with other ASR
compliant tools, as well as to meet requirements set by other
specifications or organizations. The following sections define the
criteria for content and products to claim conformance with this
specification.
4.1 Product Conformance There are two types of ASR products: report
producers and report consumers. Report producers are products that
generate ASR documents, while report consumers are products that
accept an existing ASR document and process it. Products claiming
conformance with this specification SHALL adhere to the following
requirements: 1. For report producers, generate well-formed content
as defined in Section 4.2. 2. For report consumers, consume and
process well-formed content as defined in Section 4.2. 3. Make an
explicit claim of conformance to this specification in any
documentation provided to end users.
4.2 Content Conformance In order for an ASR report to be considered in
compliance with this specification, the report MUST adhere to the
following requirements: 1. The ASR report SHALL conform to all of the
normative guidance provided in Section 6. 2. Each record set within
an ASR report SHALL conform to the requirements set by its declared
record-set-type, as described in Section 7.
5 ASR Data Model Overview and Key Concepts
This section provides an overview of the ASR data model structure and
design philosophy. The data model defines a format for representing
one or more collections of data. A collection of data about assets is
called a record set. At its simplest, an ASR report is a collection
of record sets. The following sections introduce the key concepts of
the ASR data model.
5.1 Data Model Overview
The following sections provide a high level overview of the main data
model constructs.
Davidson, Oliva Expires March 28, 2013 [Page 9]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
5.1.1 Summary Report
An ASR document (i.e., a "summary report") is composed of one or more
record sets. A summary report is the highest level notion in the ASR
data model. One or more XML documents may compose a summary report,
so the concept of a summary report is not confined to the physical
boundaries of an XML document.
5.1.2 Record Set
A record set is a collection of data organized into individual
records. A record set optionally provides a reference to information
about the source of the data for the records. The context of a record
set is communicated by declaring a "type", known as a record set
type. Section 5.2.2 provides more details regarding the record set
type.
5.1.3 Record
The record construct is the primary mechanism for conveying data in a
summary report. All record data is contained in the attributes of the
record construct. The properties of a record are defined by the
record set type. The record construct may have any number of
properties, as permitted by the record set type. In general,
properties are expected to be qualified XML attributes as described
in Section 5.2.1.
5.1.4 Data Source
In addition to capturing a collection of records, a record set may
capture information about the origin of the data in its records. Data
source information is captured separately from the record set, but
each record set may reference a data source. The same data source may
be referenced by multiple record sets if that is appropriate for the
summary report.
5.1.5 Metadata
A summary report may have metadata about its creation. The metadata
should include the name of the tool or person that generated the
report, the time the report was generated, and any other pertinent
information.
5.2 Key Concepts
The following sections provide an overview of the key concepts in
composing a summary report.
Davidson, Oliva Expires March 28, 2013 [Page 10]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
5.2.1 Record Attributes
Record attributes are the core construct for construing information
in ASR. A record set type defines the allowable and required
attributes on a record in a particular record set. The attributes
must be namespace qualified in order to give context as to the
meaning of the attribute. In XML, attributes that are not namespace
qualified belong to the "no namespace" realm, which does not give
context to the meaning of the attribute. The namespace and local-name
must be defined in the corresponding record set type.
5.2.2 Record Set Type
The concept of a record set is generic in nature, and it is based on
the expectation that a report creator must define a record set type
or adopt an existing record set type. A record set type is a
definition of a record set. The record set type defines all
properties of a record set. In object-oriented programming, a class
is the functional equivalent of a record set type, and an object is
the functional equivalent of a record set instance. The record set
type describes the attributes that "SHOULD", "MUST", and "MAY" be
included in a record in that record set. It also describes the
semantics of each attribute. Section 7 gives specific requirements
for defining a record set type. While a record set type must be
defined, the format of the record set type is not strictly defined. A
record set type definition is an agreement between producer and
consumer. It is anticipated that record set type definitions may take
the form of prose, XML, spoken word, or any other form of
communication capable of conveying the requirements of a record set
type. The authors of this specification have provided a data model
and XML schema for record-set-type-definitions that may be used for
this purpose. The record-settype-definition data model is covered in
Section 7, and that section also provides a pointer to the recordset-
type-definition XML schema.
5.2.3 Paging
Since a summary report can grow too large for available resources
(e.g., network bandwidth, memory, CPU), a summary report may be
divided into multiple pages. A paged summary report means that a
single summary report is represented as two or more separate XML
documents. This allows report creators the flexibility to reduce the
resources required to produce and exchange a single large summary
report by breaking it up into many smaller reports. Paging exists to
support use cases where the amount of data contained in an ASR
exceeds reasonable computing thresholds. Paging can be used to send
multiple, smaller segments of information instead of one large block
of information. Each page of an ASR should be consumable without the
Davidson, Oliva Expires March 28, 2013 [Page 11]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
other pages when possible. All paging information is contained in the
root element of each XML document.
5.2.4 Referencing Assets
A record may be allowed or required to capture an asset list as a
child. If an asset list is captured, there must be a count attribute
in the record that is identified as the "count for the asset list",
as defined in Section 7. That attribute must hold a value equal to
the number of assets listed within the record. The "count for the
asset list" attribute represents the count of assets that meet
certain criteria. The criteria are specified in the description of
the count attribute.
6 ASR Data Model Description
This section describes the requirements for the ASR data model
manifested as Extensible Markup Language (XML). Section 6.1 provides
a conceptual overview of the data model, while Section 6.2 examines
the actual XML data model in detail.
6.1 XML Data Model Introduction
Figure 6-1 provides a logical view of a sample summary report spread
across two pages. For brevity some attributes have been omitted. In
the diagram, each record set claims a type and a data source
description. Those items give additional context to understand the
meaning of the data captured in the record set.
+---------------------+
| summary-report |
|---------------------|
| |
| metadata (0, 1) |
| |
| data-source (0, *) |
| |
| record-set (1, *) |
| |
+---------------------+
The summary-report element is the root element of the ASR data model;
it contains identification and paging information for an ASR
document. One ASR document may be paged into multiple XML documents
as desired, but each record set MUST be completely represented on one
page of a summary report (i.e., a record set may not span multiple
Davidson, Oliva Expires March 28, 2013 [Page 12]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
pages). Summary-report has three attributes: report-id, page-number,
and last-page; it also has three children: metadata, record-set, and
data-source.
The metadata element is a child of the summary-report element.
Metadata contains information related to the generation of an ASR
document. Metadata has two attributes: generator-name and timestamp.
Metadata does not have any defined children, but there is an
extension point where any arbitrary XML is allowed.
The record-set element is a child of the summary-report construct. A
record-set contains summary data, and may appear multiple times in
the same summary-report. Record-set has four attributes: id, data-
source-ref, record-set-type, and comment. Data-source-ref is a
reference to the data-source element that represents the source of
the information used in the record-set, record-set-type indicates the
type of report being represented, and the comment field allows a text
comment, if desired. Record-set has one child: record.
The record element is a child of the record-set construct, and
contains any number of attributes; record may appear multiple times
in the same record-set. Record has two children: asset-references and
identifier-list; only one of the two may be present for a single
report. Both children provide methods to identify and list the assets
that each record describes.
The identifier-list element is used to enumerate assets that relate
to data in the record. In the definition for the record set type, an
attribute that contains a count may be associated with this list.
When that occurs, the identification information captured in this
element is known to enumerate the list of assets that make up the
associated count. Assets are enumerated using this element through a
unique identification scheme defined by capturing the URI for the
schema. Subsequently, each id provided as a child to this element is
understood within the context of the identifier scheme specified.
This solution is optimal when assets are easily identified using a
single string identifier.
The asset-references element is used to enumerate assets that compose
a count in the record. This element is used, instead of identifier-
list, when assets are identified using [Asset Identification]. This
element has a single attribute that accepts a list of identifiers.
Those identifiers must match the identifiers of assets captured in
the data-source element. The assets in the data-source element are
identifiable using either [Asset Identification], or some other
identification scheme. In either case, the identification may be more
robust than is permitted with the identifier-list element.
Davidson, Oliva Expires March 28, 2013 [Page 13]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
The data-source element is a child of the summary-report element. It
has four attributes: id, resource, population-size, and comment. Id
is the identifier of the data-source from which a record set is
generated. Resource is a URI indicating the actual resource that the
data-source element represents. Population-size indicates the number
of assets that the resource has knowledge of. Comment allows a
comment about the data-source. Data-source has four children: scan-
info, extended-info, ai:assets, and asset-list.
The scan-info element is a child of the data-source element. Scan-
info is intended to be used when the data-source is a network,
vulnerability, compliance, or other type of scan. Scan-info has seven
attributes: scan-id, authenticated, execution-location, scan-start,
scan-end, population-applies-to, and population-assessed. Scan-id is
the ID of the scan. Authenticated represents whether the scan was
authenticated or not. Execution-location represents where the scan
took place. Scan-start and scanend represent the start and end date
and time of the scan. Population-applies-to represents the number of
assets that the scan applied to; if a scanner has knowledge of 100
assets, but a particular scan only applies to 50 of them (e.g., a
patch scan for a specific OS), the population-applies-to would be set
to 50. Population-assessed represents the number of assets that were
assessed in the scan. Scan-info has one child, scanner.
The scanner element is a child of scan-info. Scanner has three
attributes: product-name, productversion, and scanner-type. The
product-name contains the name of the scanner that produced this
scan. Product name SHOULD be a CPE name or a SWID, but MAY be any
string. Productversion indicates the version of the scanner. Scanner-
type indicates the type of scanner. Scanner does not have any
children.
The extended-info element is a child of data-source. It is an
extension point of the ASR schema, intended to allow data-source
information that cannot be captured in other data-source constructs.
Extended-info does not have any attributes. Extended-info may have
any XML children. The ai:assets element is a child of data-source. It
is defined in the [Asset Identification] specification, and is used
to list assets. Please see the [Asset Identification] specification
for details of this element.
The asset-list element is a child of data-source. It is used to list
assets when using ai:assets is not feasible or desired. Asset-list
does not have any attributes. Asset-list has one child, asset, which
is used to list individual assets.
The asset element is a child of asset-list. Asset has one attribute,
id. Id is used to uniquely identify a single asset within the scope
Davidson, Oliva Expires March 28, 2013 [Page 14]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
of a data-source. Asset may have any XML children.
6.2 XML Data Model Requirements In order to comply with the ASR data
model,
The user MUST produce an XML asr:summary-report element consistent
with the data model described below.
The XML element produced MUST validate against the XSD for Asset
Summary Format 1.0 listed at
http://scap.nist.gov/specifications/asr/#resource-1.0. In situations
where the XSD does not match the documented model in this
specification, the XSD SHALL take precedence. The following tables
formalize the data model. The data contained in the tables are
requirements and MUST be interpreted as follows:
The "Element Name" field indicates the name for the XML element being
described. Each element name has a namespace prefix indicating the
namespace to which the element belongs. See Table 1-1 for a mapping
of namespace prefixes to namespaces.
The "Definition" field indicates the prose description of the
element. The definition field MAY contain requirement words as
indicated in [RFC 2119].
The "Properties" field is broken into four subfields:
o The "Name" column indicates the name of a property that MAY or MUST
be included in the described element, in accordance with the
cardinality indicated in the "Count" field
o The "Type" column indicates the REQUIRED data type for the value of
the property. There are three categories of types: literal, element,
and special. A literal type will indicate the type of literal as
defined in [XSD]. An element type will reference the name of another
element that ultimately defines that property. A special type is
listed when the type is neither literal nor element. The special type
will indicate the nature of permitted content, such as allowing any
XML to be used.
o The "Count" column indicates the cardinality of the property within
the element. The property MUST be included in the element in
accordance with the cardinality. If a range is given, and "n" is the
upper-bound of the range, then the upper limit is unbounded.
o The "Definition" column defines the property in the context of the
element. The definition MAY contain requirement words as indicated in
[RFC 2119].
Davidson, Oliva Expires March 28, 2013 [Page 15]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
+-------------------------------------------------------------+
| Element name: asr:summary-report |
+------------+------------------------------------------------|
| Definition | An ASR report may need to be expressed through |
| | multiple XML instances. This element is the |
| | root of an ASR XML instance. Each ASR XML |
| | instance SHALL consist of a single root |
| | asr:summary-report element, which encloses a |
| | single page of a summary report. An ASR report |
| | MAY span one or more pages, indicated by the |
| | report-id and page-number properties. |
+------------+------------------------------------------------+
| Properties |
+-------------+-----------------+-------+---------------------+
| Name | Type | Count | Definition |
+-------------+-----------------+-------+---------------------+
| report-id | NCName | 1 | The identifier for |
| | | | the report. This |
| | | | SHOULD be unique on |
| | | | a per-report basis. |
| | | | In the case where |
| | | | one report consists |
| | | | of multiple XML |
| | | | documents, this ID |
| | | | MUST match the ID of|
| | | | the related report |
| | | | documents. |
+-------------+-----------------+-------+---------------------+
| page-number | positive | 1 | Which page of the |
| | integer | | report this XML |
| | | | document represents.|
| | | | If the entire |
| | | | summary report is |
| | | | represented in a |
| | | | single XML document,|
| | | | this attribute MUST |
| | | | be set to "1". If |
| | | | the summary report |
| | | | spans multiple |
| | | | pages, this |
| | | | attribute MUST be |
| | | | set to the positive |
| | | | integer that |
| | | | indicates the page |
| | | | of the current XML |
| | | | document. Each page |
| | | | MUST be numbered |
| | | | sequentially, and |
Davidson, Oliva Expires March 28, 2013 [Page 16]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
| | | | the sequence MUST |
| | | | start with "1". |
+-------------+-----------------+-------+---------------------+
| last-page | boolean | 1 | If this XML document|
| | | | represents the last |
| | | | page of a summary |
| | | | report. last-page |
| | | | MUST be set to |
| | | | "true" when this |
| | | | page is the last |
| | | | page, and MUST be |
| | | | set to "false" |
| | | | otherwise. When a |
| | | | summary report is |
| | | | fully represented on|
| | | | one page, last-page |
| | | | MUST be set to |
| | | | "true". |
+-------------+-----------------+-------+---------------------+
| metadata | asr:metadata | 0-1 | Information about |
| | | | the generation of |
| | | | this |
| | | | asr:summary-report. |
| | | | See Table 6-2. |
+-------------+-----------------+-------+---------------------+
| record-set | asr:record-set | 1-n | Information about |
| | | | the record set. |
| | | | See Table 6-3. |
+-------------+-----------------+-------+---------------------+
| data-source | asr:data-source | 0-n | A source of data for|
| | | | an |
| | | | asr:summary-report. |
| | | | See Table 6-7. |
+-------------+-----------------+-------+---------------------+
Note: I will create Tables 6-2 through 6-12 in similar fashion to 6-1
if table 6-1 looks good. Otherwise, it didn't seem worth the time to
do all the tables before knowing if the format was appropriate for an
RFC.
TODO: Create Table 6-2
TODO: Create Table 6-3
TODO: Create Table 6-4
Davidson, Oliva Expires March 28, 2013 [Page 17]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
TODO: Create Table 6-5
TODO: Create Table 6-6
TODO: Create Table 6-7
TODO: Create Table 6-8
TODO: Create Table 6-9
TODO: Create Table 6-10
TODO: Create Table 6-11
TODO: Create Table 6-12
7 Defining a Record Set Type
A record set type is the definition of a record set; it gives context
to a record set. A record set type is defined separate from a summary
report. It defines the purpose of a record set, the required and
optional attributes for each record, whether an asset list should be
provided (and if so, which attribute it associates with), and any
additional information related to the record set type. This section
documents the requirements for defining a record set type.
A record set type may be defined in any form (e.g., verbal, human
readable, XML). In whatever form the record set type definition
takes, it MUST specify the following information:
A namespace-qualified name, using [XSD Qual] Section 3.2 Qualified
Locals, identifying the record set type. This QName is referenced
from each record set that implements the record set type. The record
set type name is specified in the record-set-type attribute of the
record-set element.
The intended use of the record set type.
The namespace-qualified attributes for each record within the record
set type. Attributes MUST be namespace qualified as defined using
[XSD Qual] Section 3.2 Qualified Locals.
o For each attribute, it MUST indicate if the attribute MUST, MUST
NOT, SHOULD, SHOULD NOT, or MAY be present. For each attribute, it
MUST also specify a description of the attribute.
o If an asset list is permitted or required, a single attribute MUST
be designated as the "countfor-asset-list" attribute. The count-for-
Davidson, Oliva Expires March 28, 2013 [Page 18]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
asset-list attribute MUST have a type that only allows non-negative
integers. A count-for-asset-list attribute SHALL contain an integer
that is equal to the number of assets in the asset list for the
record. The criteria for an asset to be included in the asset list
MUST be specified in the description of the count-for-asset-list
attribute. An attribute SHALL NOT be identified as the 'count-for-
asset-list' attribute when an asset list is prohibited. At most one
attribute on a record set SHALL be specified as the count-for-
assetlist attribute.
Whether an asset list is required, permitted, or prohibited. If an
asset list is required or permitted, it MUST indicate which attribute
it is on the record that the list is associated with.
Whether attributes not explicitly declared in the record set type are
permitted.
In the resources section of the ASR website, located at
http://scap.nist.gov/specifications/asr/#resource- 1.0, an XSD
provides a common XML format for representing a record set type.
Record set types SHOULD be documented in the format defined by the
XSD, though they are not required to be. See the XSD for details on
documenting the record set type in that format.
Additionally, two Extensible Stylesheet Language Transformations
(XSLTs) are provided on the resources section of the ASR website to
support record set types documented in the above referenced XSD
format. The first XSLT document converts record set type XML
documents into a human readable HTML file. The second XSLT accepts
an ASR document as input, along with a record set type as a
parameter. The XSLT analyzes the ASR document against the provided
record set type, and reports any errors that are discovered. Both of
the XSLTs, along with the record set type XSD, are informative and
are intended to assist with adopting ASR.
8 IANA Considerations
<IANA considerations text>
9 Security Considerations
As a data format, Asset Summary Reporting does not have security
concerns that are known at this time. However, as a data format
designed to be stored and transmitted between entities within an
enterprise, the fact of the matter is that it SHOULD be used within a
properly secured environment. Over time, a significant amount of
information valuable to attackers can be gleaned from Asset Summary
Reporting information. Therefore, it is recommended that use of
Davidson, Oliva Expires March 28, 2013 [Page 19]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
Asset Summary Reporting be performed in environments providing
communication security mechanisms supplying the properties of
confidentiality, data integrity, and non- repudiation.
10 References
10.1 Normative References
[ARF] NIST Interagency Report (IR) 7694 - Asset Reporting Format 1.1,
June 2011. See:
http://scap.nist.gov/specifications/arf/index.html
[Asset Identification] NIST Interagency Report (IR) 7693 - Asset
Identification 1.1, May 2011. See:
http://scap.nist.gov/specifications/ai/index.html
[Continuous Monitoring] NIST Special Publication (SP) 800-137 -
Information Security Continuous Monitoring (ISCM) for
Federal Information Systems and Organizations, January
2012. See:
http://csrc.nist.gov/publications/PubsSPs.html#800-137
[CPE-N] NIST Interagency Report (IR) 7695 - Common Platform
Enumeration: Naming Specification 2.3, August 2011. See:
http://scap.nist.gov/specifications/cpe/naming.html#resource-
2.3
[RFC 2119] Internet Engineering Task Force (IETF) Request for Comment
(RFC) 2119: Key words for use in RFCs to Indicate
Requirement Levels, March 1997. See:
http://www.ietf.org/rfc/rfc2119.txt
[XCCDF] NIST Interagency Report (IR) 7275 - Specification for the
Extensible Configuration Checklist Description Format 1.2,
September 2011. See:
http://scap.nist.gov/specifications/xccdf/#resource-1.2
[XML] W3C Recommendation Extensible Markup Language (XML) 1.0 (Fifth
Edition), 26 November 2008. See: http://www.w3.org/TR/REC-
xml/
[XSD] W3C Recommendation XML Schema, 28 October 2004. See:
http://www.w3.org/XML/Schema.html
[XSD Qual] W3C Recommendation XML Schema Part 0: Primer Second
Edition, 28 October 2004. See:
http://www.w3.org/TR/xmlschema-0/
Davidson, Oliva Expires March 28, 2013 [Page 20]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
10.2 Informative References
TODO: Decide which references belong in the
normative/informative sections
Appendix A Acknowledgements
Special thanks go to Mark Davidson, Adam Halbardier, and David
Waltermire, and those others who participated in the definition of
the Asset Summary Reporting version 1.0 [IR7848]
Appendix B Use Cases
This appendix documents some common use cases that were considered
when developing ASR.
A.1 Continuous Monitoring
Information security continuous monitoring (ISCM) is defined as
maintaining ongoing awareness of information security,
vulnerabilities, and threats to support organizational risk
management decisions. Organizational security status is determined
using metrics established by the organization to best convey the
security posture of an organization's information and information
systems, along with organizational resilience given known threat
information. Among other requirements, ISCM tools must provide
reporting with the ability to tailor output and drill down from high-
level, aggregate metrics to systemlevel metrics, and allow for data
consolidation into Security Information and Event Management (SIEM)
tools and dashboard products.
ASR intends to meet the tool needs above by providing a vendor and
technology neutral, and flexible reporting data model. ASR places few
constraints on the type and nature of data that can be transported
using its model, so many types of continuous monitoring data may be
communicated using the model.
A.2 Security Automation
Security automation efforts (e.g. the Security Content Automation
Protocol (SCAP)), are another use case for ASR. An example of a
security automation need is a system administrator who needs to
assess the 15,000 desktops on her network for compliance with the
United States Government Configuration Baseline (USGCB), a government
baseline for security settings. The system administrator runs the
USGCB content against all desktops on her network, and receives one
result file per desktop. Each result file contains, for each security
Davidson, Oliva Expires March 28, 2013 [Page 21]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
check, a pass/fail indication, required setting, and actual setting.
There are over 200 security settings checked per desktop. In order to
avoid manually reviewing each result, the system administrator
decides to use summary reporting. The system administrator creates
three reports, detailed below. A sample record is provided for each
report. Note that attributes with the 'example' prefix are defined
only in the scope of this use case.
A report that shows the overall compliance percentage of desktops on
the network. This summary report is used in a monthly dashboard that
is presented to upper management. <asr:record
example:compliance_pct="73"/>
Percentage compliance scores for each desktop on the network. This
report is used to track perdesktop compliance trends and identify
high-risk desktops. <asr:record example:hostname="desktop1"
example:compliance_score="100"/>
Percentage compliance scores for the compliance of each security
setting across the network. This report is used as a component in
taking a risk-based approach to remediation. A bulletin of the top
five non-compliant settings is generated monthly and sent to all
employees as part of a security awareness campaign. <asr:record asr-
attr:xccdf-benchmark="USGCB: Guidance for Securing Microsoft Windows
7 Systems for IT Professional" asr-attr:xccdf-profile=
"united_states_government_configuration_baseline_version_1.2.0.0"
asr-attr:xccdf-rule="minimum_password_length"
example:compliance_score="75"/> Since the summary reports are in a
standard format, they can be consumed by an application and presented
in a meaningful manner. One meaningful presentation of this data is a
list of security checks sorted from least compliant to most
compliant. The system administrator has used summary reporting to
increase the visibility and transparency of her security operations
to management and end users, improved the accuracy and completeness
of her data, and prioritized her highest value work.
Appendix C Integration with ARF
The Asset Reporting Format (ARF) is a data model for expressing the
exchange format of information about assets and the relationships
between assets and reports. The data model facilitates the reporting,
correlating, and fusing of asset information throughout and between
organizations. The intent of ARF is to provide a uniform foundation
for the expression of reporting results, fostering more widespread
application of sound IT management practices.
ARF has four primary components: assets, reports, report requests,
and relationships. Assets, reports, and report requests exist in
Davidson, Oliva Expires March 28, 2013 [Page 22]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
isolated buckets. The relationships component allows for explicit
relationships between components (assets, report-requests, and
reports) and uses a controlled vocabulary to do so. ASR reports may
be captured as report objects in ARF. When an ASR is captured as an
ARF report payload, a relationship MAY be established between the ASR
report and the report request that caused the ASR to be generated.
ARF 1.1 defines a relationship type arf-rel:createdFor in [ARF] Table
6-1. The arf-rel:createdFor relationship, established with the ASR
report object as the subject and the report request object as the
object, provides a well-defined connection between the request and
response. Additional relationships may be defined between ASR reports
and other reports as needed. Those relationships should be determined
by the report creators and collaborators as needed.
Appendix D Record Set Example
This section shows an example scenario where an ASR report is
created. To illustrate the record set concept, consider a scenario
where the Chief Information Security Officer (CISO) of Example Corp
wants to know the organization's security posture relative to a
recently published CVE (http://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2011-2013). The following ASR document
accurately reports an answer to the CISO's question:
<asr:summary-report xmlns:ex="com.example"
xmlns:asr="http://scap.nist.gov/schema/asset-summary-reporting/1.0"
xmlns:asr-attr="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/attr" page-number="1" last-page="true" report-
id="d1e1"> <asr:metadata timestamp="2011-11-08T14:27:44.97Z"/>
<asr:record-set id="asr:com.example:rset:1" data-source-
ref="asr:com.example:dsrc:1" record-set-type="ex:cve-report-
small"> <asr:record asr-attr:cve-id="CVE-2011-2013" asr-
attr:inventory-finding="EXISTS" asr-attr:count="50"/> <asr:record
asr-attr:cve-id="CVE-2011-2013" asr-attr:inventory-
finding="NOT_EXISTS" asr-attr:count="170"/> <asr:record asr-
attr:cve-id="CVE-2011-2013" asr-attr:inventory-
finding="NOT_APPLICABLE" asr-attr:count="30"/> </asr:record-set>
<asr:data-source id="asr:com.example:dsrc:1"
resource="VulnDb.abc.com" population-size="250"/> </asr:summary-
report>
Notice that the summary report uses attributes defined in the ASR
Common Attributes schema. While record set types may use any XML
attribute, it is preferable to leverage existing attributes defined
in the ASR Common Attributes schema. This is one such example where
existing attributes are useful. Since this vulnerability has a CVSS
score of 10.0 and a rating of 'Critical' has been given to the patch
that fixes this vulnerability, the CISO forwards this information to
Davidson, Oliva Expires March 28, 2013 [Page 23]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
the Windows Support Team. The CISO requests that the Windows Support
Team apply the appropriate patch quickly. In order to honor the
request, the Windows Support Team needs the report broken up by
operating system and physical location, with a list of assets. With
this information, the Windows Support Team will be able to
efficiently deploy their resources for patching. The Windows Support
Team requests the report with those additional details (only for
systems that need to be patched). The following ASR document
accurately reports the needed information. Asset listings have been
truncated for simplicity.
<asr:summary-report xmlns:ex="com.example" xmlns:ex-
attr="com.example.attr"
xmlns:asr="http://scap.nist.gov/schema/asset-summary-reporting/1.0"
xmlns:asr-attr="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/attr" page-number="1" last-page="true" report-
id="d1e2"> <asr:metadata timestamp="2011-11-08T16:33:04.73Z"/>
<asr:record-set id="asr:com.example:rset:2" data-
sourceref="asr:com.example:dsrc:1" record-set-type="ex:cve-report-
informative"> <asr:record asr-attr:cve-id="CVE-2011-2013"
asr-attr:inventory-finding="EXISTS" asr-
attr:count="30" asr-
attr:cpe="cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*"
ex-attr:location="Miami"> <asr:identifier-list identifier-
system="com.example.asset-tag"> <asr:id>111111</asr:id>
<asr:id>222222</asr:id> ... </asr:identifier-list>
</asr:record> <asr:record asr-attr:cve-id="CVE-2011-2013"
asr-attr:inventory-finding="EXISTS" asr-
attr:count="15" asr-
attr:cpe="cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*"
ex-attr:location="Boston"> <asr:identifier-list identifier-
system="com.example.asset-tag"> <asr:id>333333</asr:id>
... </asr:identifier-list> </asr:record> <asr:record asr-
attr:cve-id="CVE-2011-2013" asr-attr:inventory-
finding="EXISTS" asr-attr:count="5"
asr-attr:cpe="cpe:2.3:o:microsoft:windows_2003_server:-
:*:*:*:*:*:*:* " ex-attr:location="Miami">
<asr:identifier-list identifier-system="com.example.asset-tag>
... </asr:identifier-list> </asr:record> <asr:record asr-attr:cve-
id="CVE-2011-2013" asr-attr:inventory-
finding="EXISTS" asr-attr:count="0"
asr-attr:cpe="cpe:2.3:o:microsoft:windows_2003_server:-
:*:*:*:*:*:*:* " asr-attr:location="Boston"/>
</asr:record-set> <asr:data-source id="asr:com.example:dsrc:1"
resource="VulnDb.example.com" population-size="250"/> </asr:summary-
report>
This information can also be represented as a data table: TODO:
Davidson, Oliva Expires March 28, 2013 [Page 24]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
Recreate the table
With the above summary report, the Windows Support Team can deploy
the necessary resources to the appropriate locations. With the asset
list present in the identifier-list element, the resources deployed
to Miami and Boston will be able to accurately and completely
remediate the CVE. The report in this section is described in
Appendix D.
In this report, Example Corp used attributes defined in the ASR
Common Attributes Schema (cve-id, cpe, inventory-finding, and count)
as well as an attribute that Example Corp defined, location.
The record sets used in this example have a record-set-type of 'cve-
report-small' and 'cve-reportinformative', respectively. While this
example uses two record-set-types, it is possible to use a single,
more flexible record-set-type. Record-set-types may be flexible or
restrictive, depending on the requirements of the entity that defines
the record-set-type. Both examples are given in Appendix D
Appendix E Sample Record Set Type Definitions
This section describes an example of creating record set type
definitions for the ASR reports described in Appendix C. Those
reports leverage two record set types: ex:cve-report-small and
ex:cve-reportinformative. The fictitious record set type cve-report-
small is illustrated below. To demonstrate the flexibility of record
set type definitions, a more permissive record set type is included
in this section below the ex:cve-report-small example.
Record Set Type Name: {com.example}cve-report-small Description: To
report on the number of computers affected by a CVE. Attributes
asr-attr:cve-id - MUST include. This is the CVE ID being reported on.
Type: XML schema "string".
asr-attr:inventory-finding - MUST include. This is a status of the
CVE for each asset in the count. Value must be one of "EXISTS",
"NOT_EXISTS", "NOT_APPLICABLE", "NOT_REPORTED", "ERROR", or
"UNKNOWN". Type: XML schema "string".
asr-attr:count - MUST include. Asset list is associated with this
attribute. This count is the number of assets with the CVE related to
the asset via the inventory-finding. Type: XML schema
nonNegativeInteger.
Permit attributes not explicitly described here: no
Davidson, Oliva Expires March 28, 2013 [Page 25]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
Require asset list: not permitted
Require identifier list: not permitted
The record set type documented above may be more formally represented
using the ASR record set type XML definition format:
<record-set-types xmlns="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/record-set-type" xmlns:ex="com.example"
xmlns:asr="http://scap.nist.gov/schema/asset-summary-reporting/1.0"
xmlns:asr-attr="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/attr"> <record-set-type record-set-type-
qname="ex:cve-report-small" permitadditional-attributes="false">
<description> To report on the number of computers affected by a CVE.
</description> <attributes> <attribute attribute-qname="asr-
attr:cve-id" use="MUST" description="This is the CVE ID being
reported on"/> <attribute attribute-qname="asr-attr:inventory-
finding" use="MUST" description="This is a status of the CVE for each
asset in the count. Value must be one of 'EXISTS', 'NOT_EXISTS',
'NOT_APPLICABLE', ' NOT_REPORTED', 'ERROR', or 'UNKNOWN'." />
<attribute attribute-qname="asr-attr:count" use="MUST"
description="Asset list is associated with this attribute. This count
is the number of assets with the CVE related to the asset via the
inventoryfinding."/> </attributes> <asset-listing use-identifier-
list="MUST NOT" use-asset-references="MUST NOT"/> </record-set-type>
</record-set-types>
Given the definition above, the first report in Appendix C is able to
be produced. The description above documents the following:
The record set type name "ex:cve-report-small".
The required attributes for the report. For each attribute, it
specifies that the attribute must be
included. The attribute type is defined outside the record set type
definition.
There are not any attributes permitted in addition to those specified
here.
No form of asset listing is allowed.
The XML representation of the record set type definition (as
described in Section 7) for ex:cve-reportinformative is illustrated
below. <record-set-types xmlns="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/record-set-type" xmlns:ex="com.example"
xmlns:asr="http://scap.nist.gov/schema/asset-summary-reporting/1.0"
Davidson, Oliva Expires March 28, 2013 [Page 26]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
xmlns:asr-attr="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/attr" xmlns:ex-attr="com.example.attr">
<record-set-type record-set-type-qname="ex:cve-report-informative"
permitadditional-attributes="false"> <description> To report on
the number of computers affected by a CVE. </description>
<attributes> <attribute attribute-qname="asr-attr:cve-id"
use="MUST" description="This is the CVE ID being reported
on"/> <attribute attribute-qname="asr-attr:inventory-finding"
use="MUST" description="This is a status of the CVE for each asset in
the count. Value must be one of 'EXISTS', 'NOT_EXISTS',
'NOT_APPLICABLE', ' NOT_REPORTED', 'ERROR', or 'UNKNOWN'." />
<attribute attribute-qname="asr-attr:cpe" use="MUST" description="The
Common Platform Enumeration for the operating system of the
applicable assests." /> <attribute attribute-qname="ex:location"
use="MUST" description="The physical location of the applicable
assests." /> <attribute attribute-qname="asr-attr:count"
use="MUST" description="Asset list is associated with this attribute.
This count is the number of assets with the CVE related to the asset
via the inventoryfinding." count-for-asset-list="true"/>
</attributes> <asset-listing use-identifier-list="MUST" use-asset-
references="MUST NOT"/> </record-set-type> </record-set-types>
The description above documents the following:
The record set type name "ex:cve-report-informative".
The required attributes for the report. For each attribute, it
specifies that the attribute must be included. The attribute type is
defined outside the record set type definition.
There are not any attributes permitted in addition to those specified
here.
Assets must be listed using the identifier-list method. It is
possible for a record set type definition to be flexible enough that
both reports in Appendix C could be produced in compliance with it.
That record set type definition is illustrated below:
<record-set-types xmlns="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/record-set-type" xmlns:ex="com.example"
xmlns:asr="http://scap.nist.gov/schema/asset-summary-reporting/1.0"
xmlns:asr-attr="http://scap.nist.gov/schema/asset-
summaryreporting/1.0/attr"> <record-set-type record-set-type-
qname="ex:cve-report-informative" permitadditional-attributes="true">
<description> To report on the number of computers affected by a
CVE. </description> <attributes> <attribute attribute-
qname="asr-attr:cve-id" use="MUST" description="This is the
CVE ID being reported on"/> <attribute attribute-qname="asr-
Davidson, Oliva Expires March 28, 2013 [Page 27]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
attr:inventory-finding" use="MUST" description="This is a status of
the CVE for each asset in the count. Value must be one of 'EXISTS',
'NOT_EXISTS', 'NOT_APPLICABLE', ' NOT_REPORTED', 'ERROR', or
'UNKNOWN'." /> <attribute attribute-qname="asr-attr:count"
use="MUST" description="Asset list is associated with this attribute.
This count is the number of assets with the CVE related to the asset
via the inventoryfinding." count-for-asset-list="true"/>
</attributes> <asset-listing use-identifier-list="OPTIONAL" use-
asset-references="MUST NOT"/> </record-set-type> </record-set-types>
The description above documents the following:
The record set type name "ex:cve-report-informative".
That attributes beyond those listed in the record set type are
permitted in record sets. Therefore, in the second example in
Appendix C, "asr-attr:cpe" and "ex-attr:location" are permitted. This
is known because of the value of "permit-additional-attributes".
The required attributes for the report. For each cve-id, inventory-
finding, and count, it specifies that the attribute must be included.
The attribute associated with the asset list. In this case, "asr-
attr:count" is the count associated with the asset listing.
The use of asset listings. In this case, the report may optionally
use the identifier list (which the second report in Appendix C does),
but it may not use the asset references element.
All of the information needed to properly format the aforementioned
record sets is included in the record set type definitions given
above.
This section contains a list of XML attributes defined in the ASR
Common Attributes XSD located at
http://scap.nist.gov/specifications/asr/#resource-1.0. These
attributes are defined to provide a core of usable attributes with a
common meaning across multiple areas. Each attribute is accompanied
with a short description that describes what it means. Usage of this
XSD and its associated attributes is RECOMMENDED, but not required.
Some attributes may require additional context in order to make
sense. For example, the statistical 'count' attribute has little
meaning by itself. The context can be provided in the record-set-type
definition through the report's description of the attribute. For
example, if a record-set-type definition had the following text in
Davidson, Oliva Expires March 28, 2013 [Page 28]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
the attribute definition, the count would make sense: "Contains the
count of employees that have completed the annual security awareness
training."
All attributes in this section are defined in the following
namespace: http://scap.nist.gov/schema/assetsummary-
reporting/1.0/attr. Types specified with the prefix "xs:" are XML
schema datatypes as defined in [XSD] Part 2. Unless otherwise
specified, values for all attributes are restricted to xs:string. All
pattern restrictions are XML schema regular expressions as defined in
[XSD] Part 2, Section G
F.1 SCAP Attributes
This section contains SCAP attributes that are intended for use in
reporting scenarios that involve SCAP data.
TODO: Create this table
F.3 Statistical Attributes
This section contains common statistical attributes with well-defined
mathematical meanings.
TODO: Create this table
F.4 Other Attributes
This is a list of attributes that do not fit into another category.
Some of these attributes exist to provide a common name in attempt to
provide interoperability and may be further restricted as reporting
scenarios dictate.
TODO: Create this table
E.2 Finding Attributes
This section contains attributes related to findings. Each finding
attribute has values that allow the state of the finding to be
indicated as well as attributes that allow for the indication of
various non-finding conditions (error, not applicable, etc.)
TODO: Create this table
Authors' Addresses
Mark Davidson
Davidson, Oliva Expires March 28, 2013 [Page 29]
INTERNET DRAFT Asset Summary Reporting September 24, 2012
EMail: mdavidson@mitre.org
David Oliva
EMail: david.oliva@verizon.net
Davidson, Oliva Expires March 28, 2013 [Page 30]