Hi OPSAWG experts,
We have a new draft (draft-hu-opsawg-network-element-tsm-yang-00) that focuses 
on threat surface management for network devices. It comes from real problems 
and requirements on the live network. When a device is visible to the outside 
world, that is, open ports, services, and accounts, if these exposed surfaces 
have weak configurations and vulnerabilities, they may be targeted by attackers 
and maliciously exploited, then become attack surfaces. Therefore, network 
administrators need to have comprehensive, accurate, and timely visibility of 
the information. The corresponding technical requirements are to clearly define 
the management objects of the threat surface of the device and the 
corresponding model, and then implement the management, control, and mitigation 
solutions.

This draft is an attempt to define the model of the device threat surface 
(Currently, information about interfaces, services, accounts, versions and 
vulnerabilities is included.) and how to obtain them through the NETCONF/Yang 
mechanism. Previously, the closed Network Endpoint Assessment (NEA) and 
Security Automation and Continuous Monitoring (SACM) working groups of the IETF 
had similar work. There have been some recent MUD extensions (RFC9472 -- MUD 
YANG extension for SBOMs and Vulnerability Information, ietf-opsawg-mud-tls -- 
MUD YANG extension for TLS security posture of IoT devices) with similar goals 
and proposals.

This draft is essentially a specific requirement and solution for security O&M. 
Because it is relatively unique, we submit it to the OPSAWG WG and hope to get 
the helps and comments from experts here.

Thank a lot!

B.R.
Frank

_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to