Quantcast
Channel: Internet Drafts: sacm
Browsing all 112 articles
Browse latest View live
↧

"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2013-10-19, rev -01: This memo documents terminology used in the documents produced by the SACM WG (Security Automation and Continuous Monitoring).

View Article


"Endpoint Security Posture Assessment - Enterprise Use Cases" - David...

2013-11-20, rev -05: This memo documents a sampling of use cases for securely aggregating configuration and operational data and evaluating that data to determine an organization's security posture....

View Article


"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2014-01-17, rev -02: This memo documents terminology used in the documents produced by the SACM WG (Security Automation and Continuous Monitoring).

View Article

"Endpoint Security Posture Assessment - Enterprise Use Cases" - David...

2014-03-03, rev -06: This memo documents a sampling of use cases for securely aggregating configuration and operational data and evaluating that data to determine an organization's security posture....

View Article

"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2014-03-21, rev -03: This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).

View Article


"Endpoint Security Posture Assessment - Enterprise Use Cases" - David...

2014-04-28, rev -07: This memo documents a sampling of use cases for securely aggregating configuration and operational data and evaluating that data to determine an organization's security posture....

View Article

"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2014-05-26, rev -04: This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).

View Article

"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2014-08-15, rev -05: This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).

View Article


"Secure Automation and Continuous Monitoring (SACM) Requirements" - Nancy...

2014-09-08, rev -00: This document defines the scope and set of requirements for the Secure Automation and Continuous Monitoring working group. The requirements and scope are based on the agreed upon...

View Article


"Secure Automation and Continuous Monitoring (SACM) Requirements" - Nancy...

2014-10-10, rev -01: This document defines the scope and set of requirements for the Secure Automation and Continuous Monitoring working group. The requirements and scope are based on the agreed upon...

View Article

"Secure Automation and Continuous Monitoring (SACM) Architecture" - Nancy...

2014-10-14, rev -00: This document describes an architecture for standardization of interfaces, protocols and information models related to security automation and continuous monitoring. It describes...

View Article

"SACM Information Model" - David Waltermire, Kim Watson, Clifford Kahn, Lisa...

2014-10-24, rev -00: TODO: reconcile

View Article

"Secure Automation and Continuous Monitoring (SACM) Requirements" - Nancy...

2014-10-25, rev -02: This document defines the scope and set of requirements for the Secure Automation and Continuous Monitoring working group. The requirements and scope are based on the agreed upon...

View Article


"Secure Automation and Continuous Monitoring (SACM) Architecture" - Nancy...

2014-11-19, rev -01: This document describes an architecture for standardization of interfaces, protocols and information models related to security automation and continuous monitoring. It describes...

View Article

"Secure Automation and Continuous Monitoring (SACM) Requirements" - Nancy...

2015-01-03, rev -03: This document defines the scope and set of requirements for the Secure Automation and Continuous Monitoring working group. The requirements and scope are based on the agreed upon...

View Article


"Secure Automation and Continuous Monitoring (SACM) Architecture" - Nancy...

2015-01-03, rev -02: This document defines the SACM reference architecture for standardization of interfaces, protocols and information models related to security automation and continuous monitoring....

View Article

"Terminology for Security Assessment" - David Waltermire, Adam Montville,...

2015-02-11, rev -06: This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).

View Article


"SACM Information Model" - David Waltermire, Kim Watson, Clifford Kahn, Lisa...

2015-02-20, rev -01: This document proposes an information model for SACM.

View Article

"Endpoint Security Posture Assessment - Enterprise Use Cases" - David...

2015-02-26, rev -08: This memo documents a sampling of use cases for securely aggregating configuration and operational data and evaluating that data to determine an organization's security posture....

View Article

"Secure Automation and Continuous Monitoring (SACM) Requirements" - Nancy...

2015-03-08, rev -04: This document defines the scope and set of requirements for the Secure Automation and Continuous Monitoring (SACM) architecture, data model and protocols. The requirements and...

View Article
Browsing all 112 articles
Browse latest View live