inch-1----Page:24
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25 

7. Contents Requirements - Continue
7.13 The Incident Report should allow application of (external) mechanisms or assertions to assure its authenticity, integrity and non-repudiation can be verified.
------
Suggested use of the general XML security technology – may be applied to any (set of) part of the document
XML Signature
XML Encryption
SAML (Security Assertion ML) for including AuthN/AuthZ tokens
XML Web Services Security for possible needs to maintain FINE/IODEF Document status (including also security tokens)

PPT Version