idnits 2.17.1 draft-ietf-mile-sci-02.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** There are 5 instances of too long lines in the document, the longest one being 3 characters in excess of 72. ** The abstract seems to contain references ([XCCDF], [OVAL], [CVSS], [CWE], [TM], [CWSS], [CEE], [RFC5070], [OCIL], [CPE], [CAPEC], [CVRF], [CVE]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year -- The document date (Feb 1, 2012) is 4461 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) == Missing Reference: 'TM' is mentioned on line 22, but not defined == Unused Reference: 'CCE' is defined on line 1448, but no explicit reference was found in the text == Unused Reference: 'CCSS' is defined on line 1451, but no explicit reference was found in the text == Unused Reference: 'RFC3339' is defined on line 1489, but no explicit reference was found in the text == Unused Reference: 'RFC3552' is defined on line 1492, but no explicit reference was found in the text == Unused Reference: 'RFC5322' is defined on line 1499, but no explicit reference was found in the text == Unused Reference: 'RFC6116' is defined on line 1502, but no explicit reference was found in the text == Unused Reference: 'SCAP' is defined on line 1507, but no explicit reference was found in the text ** Obsolete normative reference: RFC 5070 (Obsoleted by RFC 7970) ** Obsolete normative reference: RFC 5226 (Obsoleted by RFC 8126) ** Obsolete normative reference: RFC 6045 (Obsoleted by RFC 6545) ** Obsolete normative reference: RFC 6046 (Obsoleted by RFC 6546) -- Possible downref: Non-RFC (?) normative reference: ref. 'XMLschemaPart1' -- Possible downref: Non-RFC (?) normative reference: ref. 'XMLschemaPart2' -- Possible downref: Non-RFC (?) normative reference: ref. 'XMLNames' -- Possible downref: Non-RFC (?) normative reference: ref. 'CAPEC' -- Possible downref: Non-RFC (?) normative reference: ref. 'CCE' -- Possible downref: Non-RFC (?) normative reference: ref. 'CCSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'CEE' -- Possible downref: Non-RFC (?) normative reference: ref. 'CPE' -- Possible downref: Non-RFC (?) normative reference: ref. 'CVE' -- Possible downref: Non-RFC (?) normative reference: ref. 'CVRF' -- Possible downref: Non-RFC (?) normative reference: ref. 'CVSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'CWE' -- Possible downref: Non-RFC (?) normative reference: ref. 'CWSS' -- Possible downref: Non-RFC (?) normative reference: ref. 'OCIL' -- Possible downref: Non-RFC (?) normative reference: ref. 'OVAL' -- Possible downref: Non-RFC (?) normative reference: ref. 'XCCDF' Summary: 6 errors (**), 0 flaws (~~), 9 warnings (==), 17 comments (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 MILE Working Group T. Takahashi 3 Internet-Draft NICT 4 Intended status: Standards Track K. Landfield 5 Expires: August 4, 2012 McAfee 6 T. Millar 7 USCERT 8 Y. Kadobayashi 9 NAIST 10 Feb 1, 2012 12 IODEF-extension to support structured cybersecurity information 13 draft-ietf-mile-sci-02.txt 15 Abstract 17 This document extends the Incident Object Description Exchange Format 18 (IODEF) defined in RFC 5070 [RFC5070] to facilitate enriched 19 cybersecurity information exchange among cybersecurity entities by 20 embedding structured information formatted by specifications, 21 including CAPEC[TM] [CAPEC], CEE[TM] [CEE], CPE[TM] [CPE], CVE(R) 22 [CVE], CVRF [CVRF], CVSS [CVSS], CWE[TM] [CWE], CWSS[TM] [CWSS], OCIL 23 [OCIL], OVAL(R) [OVAL], and XCCDF [XCCDF]. 25 Status of this Memo 27 This Internet-Draft is submitted in full conformance with the 28 provisions of BCP 78 and BCP 79. 30 Internet-Drafts are working documents of the Internet Engineering 31 Task Force (IETF). Note that other groups may also distribute 32 working documents as Internet-Drafts. The list of current Internet- 33 Drafts is at http://datatracker.ietf.org/drafts/current/. 35 Internet-Drafts are draft documents valid for a maximum of six months 36 and may be updated, replaced, or obsoleted by other documents at any 37 time. It is inappropriate to use Internet-Drafts as reference 38 material or to cite them other than as "work in progress." 40 This Internet-Draft will expire on August 4, 2012. 42 Copyright Notice 44 Copyright (c) 2012 IETF Trust and the persons identified as the 45 document authors. All rights reserved. 47 This document is subject to BCP 78 and the IETF Trust's Legal 48 Provisions Relating to IETF Documents 49 (http://trustee.ietf.org/license-info) in effect on the date of 50 publication of this document. Please review these documents 51 carefully, as they describe your rights and restrictions with respect 52 to this document. Code Components extracted from this document must 53 include Simplified BSD License text as described in Section 4.e of 54 the Trust Legal Provisions and are provided without warranty as 55 described in the Simplified BSD License. 57 Table of Contents 59 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 60 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 61 3. Applicability . . . . . . . . . . . . . . . . . . . . . . . . 4 62 4. Extension Definition . . . . . . . . . . . . . . . . . . . . . 5 63 4.1. List of Supported Structured Cybersecurity Information 64 Specifictions . . . . . . . . . . . . . . . . . . . . . . 5 65 4.1.1. CAPEC 1.6 . . . . . . . . . . . . . . . . . . . . . . 6 66 4.1.2. CCE 5.0 . . . . . . . . . . . . . . . . . . . . . . . 6 67 4.1.3. CCSS 1.0 . . . . . . . . . . . . . . . . . . . . . . . 6 68 4.1.4. CEE 0.6 . . . . . . . . . . . . . . . . . . . . . . . 6 69 4.1.5. CPE 2.3 Language . . . . . . . . . . . . . . . . . . . 6 70 4.1.6. CPE 2.3 Dictionary . . . . . . . . . . . . . . . . . . 7 71 4.1.7. CVE 1.0 . . . . . . . . . . . . . . . . . . . . . . . 7 72 4.1.8. CVRF 1.0 . . . . . . . . . . . . . . . . . . . . . . . 7 73 4.1.9. CVSS 2.0 . . . . . . . . . . . . . . . . . . . . . . . 7 74 4.1.10. CWE 5.0 . . . . . . . . . . . . . . . . . . . . . . . 7 75 4.1.11. CWSS 0.8 . . . . . . . . . . . . . . . . . . . . . . . 7 76 4.1.12. MAEC 2.0 . . . . . . . . . . . . . . . . . . . . . . . 8 77 4.1.13. OCIL 2.0 . . . . . . . . . . . . . . . . . . . . . . . 8 78 4.1.14. OVAL 5.10.1 Definitions . . . . . . . . . . . . . . . 8 79 4.1.15. OVAL 5.10.1 Results . . . . . . . . . . . . . . . . . 8 80 4.1.16. OVAL 5.10.1 Common . . . . . . . . . . . . . . . . . . 8 81 4.1.17. XCCDF 1.2 . . . . . . . . . . . . . . . . . . . . . . 8 82 4.2. Extended Data Types . . . . . . . . . . . . . . . . . . . 9 83 4.2.1. XMLDATA . . . . . . . . . . . . . . . . . . . . . . . 9 84 4.3. Extended Classes . . . . . . . . . . . . . . . . . . . . . 9 85 4.3.1. AttackPattern . . . . . . . . . . . . . . . . . . . . 10 86 4.3.2. Platform . . . . . . . . . . . . . . . . . . . . . . . 12 87 4.3.3. Vulnerability . . . . . . . . . . . . . . . . . . . . 13 88 4.3.4. Scoring . . . . . . . . . . . . . . . . . . . . . . . 15 89 4.3.5. Weakness . . . . . . . . . . . . . . . . . . . . . . . 16 90 4.3.6. EventReport . . . . . . . . . . . . . . . . . . . . . 17 91 4.3.7. Verifcation . . . . . . . . . . . . . . . . . . . . . 19 92 4.3.8. Remediation . . . . . . . . . . . . . . . . . . . . . 20 93 5. Security Considerations . . . . . . . . . . . . . . . . . . . 21 94 5.1. Transport-Specific Concerns . . . . . . . . . . . . . . . 22 95 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22 96 7. Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . 24 97 8. Appendix I: XML Schema Definition for Extension . . . . . . . 24 98 9. Appendix II: XML Examples . . . . . . . . . . . . . . . . . . 28 99 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 32 100 10.1. Normative References . . . . . . . . . . . . . . . . . . . 32 101 10.2. Informative References . . . . . . . . . . . . . . . . . . 33 102 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 34 104 1. Introduction 106 Cyber attacks are getting more sophisticated, and their numbers are 107 increasing day by day. To cope with such situation, incident 108 information needs to be reported, exchanged, and shared among 109 organizations. IODEF is one of the tools enabling such exchange, and 110 is already in use. 112 To efficiently run cybersecurity operations, these exchanged 113 information needs to be machine-readable. IODEF provides a 114 structured means to describe the information, but it needs to embed 115 various non-structured such information in order to convey detailed 116 information. Further structure within IODEF increases IODEF 117 documents' machine-readability and thus facilitates streamlining 118 cybersecurity operations. 120 On the other hand, there exist various other activities facilitating 121 detailed and structured description of cybersecurity information, 122 major of which includes CAPEC [CAPEC], CEE [CEE], CPE [CPE], CVE 123 [CVE], CVRF [CVRF], CVSS [CVSS], CWE [CWE], CWSS [CWSS], OCIL [OCIL], 124 OVAL [OVAL], and XCCDF [XCCDF]. Since such structured description 125 facilitates cybersecurity operations, it would be beneficial to embed 126 and convey these information inside IODEF document. 128 To enable that, this document extends the IODEF to embed and convey 129 various structured cybersecurity information, with which 130 cybersecurity operations can be facilitated. Since IODEF defines a 131 flexible and extensible format and supports a granular level of 132 specificity, this document defines an extension to IODEF instead of 133 defining a new report format. For clarity, and to eliminate 134 duplication, only the additional structures necessary for describing 135 the exchange of such structured information are provided. 137 2. Terminology 139 The terminology used in this document follows the one defined in RFC 140 5070 [RFC5070]. 142 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 143 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 144 document are to be interpreted as described in RFC 2119 [RFC2119]. 146 3. Applicability 148 To maintain cybersecurity, organization needs to exchange 149 cybersecurity information, which includes the following information: 151 attack pattern, platform information, vulnerability and weakness, 152 countermeasure instruction, computer event log, and the severity. 154 IODEF provides a scheme to exchange such information among interested 155 parties. However, the detailed common format to describe such 156 information is not defined in the IODEF base document. 158 On the other hand, to describe those information and to facilitate 159 exchange, a structured format for that is already available. Major 160 of them are CAPEC, CEE, CPE, CVE, CVRF, CVSS, CWE, CWSS, OCIL, OVAL, 161 and XCCDF. By embedding them into the IODEF document, the document 162 can convey more detailed contents to the receivers, and the document 163 can be easily reused. Note that interactive communication is needed 164 in some cases, and some of these structured information, e.g., OCIL 165 information, solicits reply from recipients. These reply could be 166 also embedded inside the IODEF document. 168 These structured cybersecurity information facilitates cybersecurity 169 operation at the receiver side. Since the information is machine- 170 readable, the data can be processed by computers. That expedites the 171 automation of cybersecurity operations 173 For instance, an organization wishing to report a security incident 174 wants to describe what vulnerability was exploited. Then the sender 175 can simply use IODEF, where an CAPEC record is embedded instead of 176 describing everything in free format text. Receiver can also 177 identify the needed details of the attack pattern by looking up some 178 of the xml [XML1.0] tags defined by CAPEC. Receiver can accumulate 179 the attack pattern information (CAPEC record) in its database and 180 could distribute it to the interested parties if needed, without 181 needing human interventions. 183 4. Extension Definition 185 This draft extends IODEF to embed structured cybersecurity 186 information by introducing new classes, with which these information 187 can be embedded inside IODEF document as element contents of 188 AdditionalData and RecordItem classes. 190 4.1. List of Supported Structured Cybersecurity Information 191 Specifictions 193 This extension embeds structured cybersecurity information from 194 external specifications. The initial list of supported 195 specifications is listed below. Each entry has namespace [XMLNames], 196 specification name, version, specification URI and applicable classes 197 for each specification. Future assignments are to be managed by IANA 198 using the Expert Review [RFC5226] and Specification Required 199 [RFC5226] allocation policies as further specified in Section 6. 201 4.1.1. CAPEC 1.6 203 Namespace: http://capec.mitre.org/observables 204 Specification Name: Common Attack Pattern Enumeration and Classification 205 Version: 1.6 206 Specification URI: http://capec.mitre.org/ 207 Applicable Classes: AttackPattern 209 4.1.2. CCE 5.0 211 Namespace: http://cce.mitre.org 212 Specification Name: Common Configuration Enumeration 213 Version: 5.0 214 Specification URI: http://cce.mitre.org/ 215 Applicable Classes: Verification 217 4.1.3. CCSS 1.0 219 Namespace: N/A 220 Specification Name: Common Configuration Scoring System 221 Version: 1.0 222 Specification URI: TBD 223 Applicable Classes: Scoring 225 4.1.4. CEE 0.6 227 Namespace: http://cee.mitre.org 228 Specification Name: Common Event Expression 229 Version: 0.6 230 Specification URI: http://cee.mitre.org/ 231 Applicable Classes: EventReport 233 4.1.5. CPE 2.3 Language 235 Namespace: http://cpe.mitre.org/language/2.0 236 Specification Name: Common Platform Enumeration Reference 237 Version: 2.3 238 Specification URI: http://scap.nist.gov/specifications/cpe/ 239 Applicable Classes: Platform 241 4.1.6. CPE 2.3 Dictionary 243 Namespace: http://cpe.mitre.org/dictionary/2.0 244 Specification Name: Common Platform Enumeration Dictionary 245 Version: 2.3 246 Specification URI: http://scap.nist.gov/specifications/cpe/ 247 Applicable Classes: Platform 249 4.1.7. CVE 1.0 251 Namespace: http://cve.mitre.org/cve/downloads/1.0 252 Specification Name: Common Vulnerability and Exposures 253 Version: 1.0 254 Specification URI: http://cve.mitre.org/ 255 Applicable Classes: Vulnerability 257 4.1.8. CVRF 1.0 259 Namespace: http://www.icasi.org/CVRF/schema/cvrf/1.0 260 Specification Name: Common Vulnerability Reporting Format 261 Version: 1.0 262 Specification URI: http://www.icasi.org/cvrf 263 Applicable Classes: Vulnerability 265 4.1.9. CVSS 2.0 267 Namespace: http://scap.nist.gov/schema/cvss-v2/1.0 268 Specification Name: Common Vulnerability Scoring System 269 Version: 2 270 Specification URI: http://www.first.org/cvss 271 Applicable Classes: Scoring 273 4.1.10. CWE 5.0 275 Namespace: N/A 276 Specification Name: Common Weakness Enumeration 277 Version: 5.1 278 Specification URI: http://cwe.mitre.org/ 279 Applicable Classes: Weakness 281 4.1.11. CWSS 0.8 283 Namespace: N/A 284 Specification Name: Common Weakness Scoring System 285 Version: 0.8 286 Specification URI: http://cwe.mitre.org/cwss/ 287 Applicable Classes: Scoring 289 4.1.12. MAEC 2.0 291 Namespace: http://maec.mitre.org/XMLSchema/maec-core-2 292 Specification Name: Malware Attribute Enumeration and Characterization 293 Version: 2.0 294 Specification URI: http://maec.mitre.org/ 295 Applicable Classes: EventReport, AttackPattern 297 4.1.13. OCIL 2.0 299 Namespace: http://scap.nist.gov/schema/ocil/2.0 300 Specification Name: Open Checklist Interactive Language 301 Version: 2.0 302 Specification URI: http://scap.nist.gov/specifications/ocil/ 303 Applicable Classes: Verification 305 4.1.14. OVAL 5.10.1 Definitions 307 Namespace: http://oval.mitre.org/XMLSchema/oval-definitions-5 308 Specification Name: Open Vulnerability and Assessment Language 309 Version: 5.10.1 310 Specification URI: http://oval.mitre.org/ 311 Applicable Classes: Verification 313 4.1.15. OVAL 5.10.1 Results 315 Namespace: http://oval.mitre.org/XMLSchema/oval-results-5 316 Specification Name: Open Vulnerability and Assessment Language 317 Version: 5.10.1 318 Specification URI: TBD 319 Applicable Classes: Verification 321 4.1.16. OVAL 5.10.1 Common 323 Namespace: http://oval.mitre.org/XMLSchema/oval-common-5 324 Specification Name: Open Vulnerability and Assessment Language 325 Version: 5.10.1 326 Specification URI: TBD 327 Applicable Classes: Verification 329 4.1.17. XCCDF 1.2 331 Namespace: http://checklists.nist.gov/xccdf/1.2 332 Specification Name: Extensible Configuration Checklist Description Format 333 Version: 1.2 334 Specification URI: http://scap.nist.gov/specifications/xccdf/ 335 Applicable Classes: Verification 337 4.2. Extended Data Types 339 This extension inherits all of the data types defined in the IODEF 340 model. One data type is added: XMLDATA. 342 4.2.1. XMLDATA 344 An embedded XML data is represented by the XMLDATA data type. This 345 type is defined as the extension to the iodef:ExtensionType 346 [RFC5070], whose dtype attribute is set to "xml." 348 4.3. Extended Classes 350 The IODEF Incident element [RFC5070] is summarized below. It is 351 expressed in Unified Modeling Language (UML) syntax as used in the 352 IODEF specification. The UML representation is for illustrative 353 purposes only; elements are specified in XML as defined in Appendix 354 A. 356 +--------------------+ 357 | Incident | 358 +--------------------+ 359 | ENUM purpose |<>---------[IncidentID] 360 | STRING ext-purpose |<>--{0..1}-[AlternativeID] 361 | ENUM lang |<>--{0..1}-[RelatedActivity] 362 | ENUM restriction |<>--{0..1}-[DetectTime] 363 | |<>--{0..1}-[StartTime] 364 | |<>--{0..1}-[EndTime] 365 | |<>---------[ReportTime] 366 | |<>--{0..*}-[Description] 367 | |<>--{1..*}-[Assessment] 368 | |<>--{0..*}-[Method] 369 | | |<>--[AdditionalData] 370 | | |<>--[AttackPattern] 371 | | |<>--[Vulnerability] 372 | | |<>--[Weakness] 373 | |<>--{1..*}-[Contact] 374 | |<>--{0..*}-[EventData] 375 | | |<>--[Flow] 376 | | | |<>--[System] 377 | | | |<>--[AdditionalData] 378 | | | |<>--[Platform] 379 | | |<>--[Expectation] 380 | | |<>--[Record] 381 | | |<>--[RecordData] 382 | | |<>--[RecordItem] 383 | | |<>--[EventReport] 384 | |<>--{0..1}-[History] 385 | |<>--{0..*}-[AdditionalData] 386 | | |<>--[Verification] 387 | | |<>--[Remediation] 388 +--------------------+ 390 Figure 1: Incident class 392 This extension defines the following seven elements. 394 4.3.1. AttackPattern 396 An AttackPattern consists of an extension to the 397 Incident.Method.AdditionalData element with a dtype of "xml". The 398 extension describes attack patterns of incidents or events. 400 It is recommended that Method class SHOULD contain one or more of the 401 extension elements whenever available. 403 An AttackPattern class is structured as follows. 405 +------------------------+ 406 | AttackPattern | 407 +------------------------+ 408 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 409 | STRING AttackPatternID |<>--(0..*)-[ Reference ] 410 | |<>--(0..*)-[ Platform ] 411 +------------------------+ 413 Figure 2: AttackPattern class 415 This class has the following attributes. 417 SpecificationID: REQUIRED. ENUM. The identifier of the 418 specification specifying the format of the RawData element. The 419 value should be chosen from the namespaces [XMLNames] listed in 420 Section 4.1. Note that the lists in Section 4.1 will be developed 421 further by IANA. In case a RawData or Reference element is 422 provided along with this attribute, writers/senders MUST ensure 423 that this value is consistent with the one provided by the 424 element; if a reader/receiver detects an inconsistency, it SHOULD 425 prefer this attribute's value, and SHOULD log the inconsistency so 426 a human can correct the problem. 428 AttackPatternID: OPTIONAL. STRING. An identifier of an attack 429 pattern to be reported. This attribute SHOULD be used whenever 430 such identifier is available, but could be omitted if no such one 431 is available. In this case, either RawData or Reference elements, 432 or both of them, MUST be provided. In case a RawData or Reference 433 element is provided along with this attribute, writers/senders 434 MUST ensure that this value is consistent with the one provided by 435 the element; if a reader/receiver detects an inconsistency, it 436 SHOULD prefer this attribute's value, and SHOULD log the 437 inconsistency so a human can correct the problem. 439 The AttackPattern class is composed of the following aggregate 440 classes. 442 RawData: Zero or more. XMLDATA. A complete document that is 443 formatted according to the specification and its version 444 identified by the value of the SpecificationID with the 445 Section 4.1. 447 Reference: Zero or more of iodef:Reference [RFC5070]. This element 448 allows an IODEF document to include a link to a structured 449 information instead of directly embedding it into a RawData 450 element. 452 Platform: Zero or more. An identifier of software platform involved 453 in the specific attack pattern, which is elaborated in 454 Section 4.3.2. Some of the structured information embedded in the 455 RawData element may include the identifier within it. In this 456 case, this Platform element SHOULD NOT be used. If a reader/ 457 receiver detects the identifiers in both RawData and Platform 458 elements and their inconsistency, it SHOULD prefer the identifiers 459 derived from the Platform element, and SHOULD log the 460 inconsistency so a human can correct the problem. 462 4.3.2. Platform 464 A Platform identifies a software platform. It is recommended that 465 AttackPattern, Vulnerability, Weakness, and System classes contain 466 this elements whenever available. 468 A Platform element is structured as follows. 470 +----------------------+ 471 | Platform | 472 +----------------------+ 473 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 474 | STRING PlatformID |<>--(0..*)-[ Reference ] 475 +----------------------+ 477 Figure 3: Platform class 479 This class has the following attributes. 481 SpecificationID: REQUIRED. ENUM. The identifier of the 482 specification specifying the format of the RawData element. The 483 value should be chosen from the namespaces [XMLNames] listed in 484 Section 4.1. Note that the lists in Section 4.1 will be developed 485 further by IANA. In case a RawData or Reference element is 486 provided along with this attribute, writers/senders MUST ensure 487 that this value is consistent with the one provided by the 488 element; if a reader/receiver detects an inconsistency, it SHOULD 489 prefer this attribute's value, and SHOULD log the inconsistency so 490 a human can correct the problem. 492 PlatformID: OPTIONAL. STRING. An identifier of a platform to be 493 reported. This attribute SHOULD be used whenever such identifier 494 is available, but could be omitted if no such one is available. 495 In this case, either RawData or Reference elements, or both of 496 them, MUST be provided. In case a RawData or Reference element is 497 provided along with this attribute, writers/senders MUST ensure 498 that this value is consistent with the one provided by the 499 element; if a reader/receiver detects an inconsistency, it SHOULD 500 prefer this attribute's value, and SHOULD log the inconsistency so 501 a human can correct the problem. 503 This class is composed of the following aggregate classes. 505 RawData: Zero or more. XMLDATA. A complete document that is 506 formatted according to the specification and its version 507 identified by the value of the SpecificationID with the 508 Section 4.1. 510 Reference: Zero or more of iodef:Reference [RFC5070]. This element 511 allows an IODEF document to include a link to a structured 512 information instead of directly embedding it into a RawData 513 element. 515 Writers/senders MUST ensure the specification name and version 516 identified by the SpecificationID are consistent with the contents of 517 the ID; if a reader/receiver detects an inconsistency, it SHOULD 518 prefer the specification name and version derived from the content, 519 and SHOULD log the inconsistency so a human can correct the problem. 521 4.3.3. Vulnerability 523 A Vulnerability consists of an extension to the 524 Incident.Method.AdditionalData element with a dtype of "xml". The 525 extension describes the (candidate) vulnerabilities of incidents or 526 events. 528 It is recommended that Method class SHOULD contain one or more of the 529 extension elements whenever available. 531 A Vulnerability element is structured as follows. 533 +------------------------+ 534 | Vulnerability | 535 +------------------------+ 536 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 537 | STRING VulnerabilityID |<>--(0..*)-[ Reference ] 538 | |<>--(0..*)-[ Platform ] 539 | |<>--(0..*)-[ Scoring ] 540 +------------------------+ 542 Figure 4: Vulnerability class 544 This class has the following attributes. 546 SpecificationID: REQUIRED. ENUM. The identifier of the 547 specification specifying the format of the RawData element. The 548 value should be chosen from the namespaces [XMLNames] listed in 549 Section 4.1. Note that the lists in Section 4.1 will be developed 550 further by IANA. In case a RawData or Reference element is 551 provided along with this attribute, writers/senders MUST ensure 552 that this value is consistent with the one provided by the 553 element; if a reader/receiver detects an inconsistency, it SHOULD 554 prefer this attribute's value, and SHOULD log the inconsistency so 555 a human can correct the problem. 557 VulnerabilityID: OPTIONAL. STRING. An identifier of a 558 vulnerability to be reported. This attribute SHOULD be used 559 whenever such identifier is available, but could be omitted if no 560 such one is available. In this case, either RawData or Reference 561 elements, or both of them, MUST be provided. In case a RawData or 562 Reference element is provided along with this attribute, writers/ 563 senders MUST ensure that this value is consistent with the one 564 provided by the element; if a reader/receiver detects an 565 inconsistency, it SHOULD prefer this attribute's value, and SHOULD 566 log the inconsistency so a human can correct the problem. 568 This class is composed of the following aggregate classes. 570 RawData: Zero or one. XMLDATA. A complete document that is 571 formatted according to the specification and its version 572 identified by the value of the SpecificationID with the 573 Section 4.1. 575 Reference: Zero or one of iodef:Reference [RFC5070]. This element 576 allows an IODEF document to include a link to a structured 577 information instead of directly embedding it into a RawData 578 element. 580 Platform: Zero or more. An identifier of software platform affected 581 by the vulnerability, which is elaborated in Section 4.3.2. Some 582 of the structured information embedded in the RawData element may 583 include the identifier within it. In this case, this element 584 SHOULD NOT be used. If a reader/receiver detects the identifiers 585 in both RawData and Platform elements and their inconsistency, it 586 SHOULD prefer the identifiers derived from the Platform element, 587 and SHOULD log the inconsistency so a human can correct the 588 problem. 590 Scoring: Zero or more. An indicator of the severity of the 591 vulnerability, such as CVSS and CCSS scores, which is elaborated 592 in Section 4.3.4. Some of the structured information may include 593 scores within it. In this case, the Scoring element SHOULD NOT be 594 used since the RawData element contains the scores. If a reader/ 595 receiver detects scores in both RawData and Scoring elements and 596 their inconsistency, it SHOULD prefer the scores derived from the 597 RawData element, and SHOULD log the inconsistency so a human can 598 correct the problem. 600 4.3.4. Scoring 602 A Scoring class describes the scores of the severity in terms of 603 security. It is recommended that Vulnerability and Weakness classes 604 contain the elements whenever available. 606 A Scoring class is structured as follows. 608 +----------------------+ 609 | Scoring | 610 +----------------------+ 611 | ENUM SpecificationID |<>---------[ ScoreSet ] 612 +----------------------+ 614 Figure 5: Scoring class 616 This class has two attributes. 618 SpecificationID: REQUIRED. ENUM. The identifier of the 619 specification specifying the format of the RawData element. The 620 value should be chosen from the namespaces [XMLNames] listed in 621 Section 4.1. Note that the lists in Section 4.1 will be developed 622 further by IANA. In case a RawData or Reference element is 623 provided along with this attribute, writers/senders MUST ensure 624 that this namespace is consistent with the one provided by the 625 element; if a reader/receiver detects an inconsistency, it SHOULD 626 prefer the value of this attribute, and SHOULD log the 627 inconsistency so a human can correct the problem. 629 This class is composed of an aggregate class. 631 ScoreSet: One. XMLDATA. A complete document that is formatted 632 according to the specification and its version identified by the 633 value of the SpecificationID with the Section 4.1. This element 634 includes a set of score information. 636 Writers/senders MUST ensure the specification name and version 637 identified by the SpecificationID are consistent with the contents of 638 the Score; if a reader/receiver detects an inconsistency, it SHOULD 639 prefer the specification name and version derived from the content, 640 and SHOULD log the inconsistency so a human can correct the problem. 642 4.3.5. Weakness 644 A Weakness consists of an extension to the 645 Incident.Method.AdditionalData element with a dtype of "xml". The 646 extension describes the weakness types of incidents or events. 648 It is recommended that Method class SHOULD contain one or more of the 649 extension elements whenever available. 651 A Weakness element is structured as follows. 653 +----------------------+ 654 | Weakness | 655 +----------------------+ 656 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 657 | STRING WeaknessID |<>--(0..*)-[ Reference ] 658 | |<>--(0..*)-[ Platform ] 659 | |<>--(0..*)-[ Scoring ] 660 +----------------------+ 662 Figure 6: Weakness class 664 This class has the following attributes. 666 SpecificationID: REQUIRED. ENUM. The identifier of the 667 specification specifying the format of the RawData element. The 668 value should be chosen from the namespaces [XMLNames] listed in 669 Section 4.1. Note that the lists in Section 4.1 will be developed 670 further by IANA. In case a RawData or Reference element is 671 provided along with this attribute, writers/senders MUST ensure 672 that this value is consistent with the one provided by the 673 element; if a reader/receiver detects an inconsistency, it SHOULD 674 prefer this attribute's value, and SHOULD log the inconsistency so 675 a human can correct the problem. 677 WeaknessID: OPTIONAL. STRING. An identifier of a weakness to be 678 reported. This attribute SHOULD be used whenever such identifier 679 is available, but could be omitted if no such one is available. 680 In this case, either RawData or Reference elements, or both of 681 them, MUST be provided. In case a RawData or Reference element is 682 provided along with this attribute, writers/senders MUST ensure 683 that this value is consistent with the one provided by the 684 element; if a reader/receiver detects an inconsistency, it SHOULD 685 prefer this attribute's value, and SHOULD log the inconsistency so 686 a human can correct the problem. 688 This class is composed of the following aggregate classes. 690 RawData: Zero or more. XMLDATA. A complete document that is 691 formatted according to the specification and its version 692 identified by the value of the SpecificationID with the 693 Section 4.1. 695 Reference: Zero or one of iodef:Reference [RFC5070]. This element 696 allows an IODEF document to include a link to a structured 697 information instead of directly embedding it into a RawData 698 element. 700 Platform: Zero or more. An identifier of software platform affected 701 by the weakness, which is elaborated in Section 4.3.2. Some of 702 the structured information embedded in the RawData element may 703 include the identifier within it. In this case, this element 704 SHOULD NOT be used. If a reader/receiver detects the identifiers 705 in both RawData and Platform elements and their inconsistency, it 706 SHOULD prefer the identifiers derived from the Platform element, 707 and SHOULD log the inconsistency so a human can correct the 708 problem. 710 Scoring: Zero or more. An indicator of the severity of the 711 weakness, such as CWSS score, which is elaborated in 712 Section 4.3.4. Some of the structured information may include 713 scores within it. In this case, the Scoring element SHOULD NOT be 714 used since the RawData element contains the scores. If a reader/ 715 receiver detects scores in both RawData and Scoring elements and 716 their inconsistency, it SHOULD prefer the scores derived from the 717 RawData element, and SHOULD log the inconsistency so a human can 718 correct the problem. 720 4.3.6. EventReport 722 An EventReport consists of an extension to the 723 Incident.EventData.Record.RecordData.RecordItem element with a dtype 724 of "xml". The extension embeds structured event reports. 726 It is recommended that RecordItem class SHOULD contain one or more of 727 the extension elements whenever available. 729 An EventReport element is structured as follows. 731 +----------------------+ 732 | EventReport | 733 +----------------------+ 734 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 735 | STRING EventID |<>--(0..*)-[ Reference ] 736 +----------------------+ 737 Figure 7: EventReport class 739 This class has the following attributes. 741 SpecificationID: REQUIRED. ENUM. The identifier of the 742 specification specifying the format of the RawData element. The 743 value should be chosen from the namespaces [XMLNames] listed in 744 Section 4.1. Note that the lists in Section 4.1 will be developed 745 further by IANA. In case a RawData or Reference element is 746 provided along with this attribute, writers/senders MUST ensure 747 that this value is consistent with the one provided by the 748 element; if a reader/receiver detects an inconsistency, it SHOULD 749 prefer this attribute's value, and SHOULD log the inconsistency so 750 a human can correct the problem. 752 EventID: OPTIONAL. STRING. An identifier of an event to be 753 reported. This attribute SHOULD be used whenever such identifier 754 is available, but could be omitted if no such one is available. 755 In this case, either RawData or Reference elements, or both of 756 them, MUST be provided. In case a RawData or Reference element is 757 provided along with this attribute, writers/senders MUST ensure 758 that this value is consistent with the one provided by the 759 element; if a reader/receiver detects an inconsistency, it SHOULD 760 prefer this attribute's value, and SHOULD log the inconsistency so 761 a human can correct the problem. 763 This class is composed of three aggregate classes. 765 RawData: Zero or one. XMLDATA. A complete document that is 766 formatted according to the specification and its version 767 identified by the value of the SpecificationID with the 768 Section 4.1. 770 Reference: Zero or one of iodef:Reference [RFC5070]. This element 771 allows an IODEF document to include a link to a structured 772 information instead of directly embedding it into a RawData 773 element. 775 This class MUST contain at least one of RawData or Reference 776 elements. Writers/senders MUST ensure the specification name and 777 version identified by the SpecificationID are consistent with the 778 contents of the RawData; if a reader/receiver detects an 779 inconsistency, it SHOULD prefer the specification name and version 780 derived from the content, and SHOULD log the inconsistency so a human 781 can correct the problem. 783 4.3.7. Verifcation 785 A Verification consists of an extension to the 786 Incident.AdditionalData element with a dtype of "xml". The extension 787 elements describes incident on vefifying incidents. 789 A Verification class is structured as follows. 791 +----------------------+ 792 | Verification | 793 +----------------------+ 794 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 795 | STRING VerificationID|<>--(0..*)-[ Reference ] 796 +----------------------+ 798 Figure 8: Verification class 800 This class has the following attributes. 802 SpecificationID: REQUIRED. ENUM. The identifier of the 803 specification specifying the format of the RawData element. The 804 value should be chosen from the namespaces [XMLNames] listed in 805 Section 4.1. Note that the lists in Section 4.1 will be developed 806 further by IANA. In case a RawData or Reference element is 807 provided along with this attribute, writers/senders MUST ensure 808 that this value is consistent with the one provided by the 809 element; if a reader/receiver detects an inconsistency, it SHOULD 810 prefer this attribute's value, and SHOULD log the inconsistency so 811 a human can correct the problem. 813 VerificationID: OPTIONAL. STRING. An identifier of an check item 814 to be reported. This attribute SHOULD be used whenever such 815 identifier is available, but could be omitted if no such one is 816 available. In this case, either RawData or Reference elements, or 817 both of them, MUST be provided. In case a RawData or Reference 818 element is provided along with this attribute, writers/senders 819 MUST ensure that this value is consistent with the one provided by 820 the element; if a reader/receiver detects an inconsistency, it 821 SHOULD prefer this attribute's value, and SHOULD log the 822 inconsistency so a human can correct the problem. 824 This class is composed of two aggregate classes. 826 RawData: Zero or one. XMLDATA. A complete document that is 827 formatted according to the specification and its version 828 identified by the value of the SpecificationID with the 829 Section 4.1. 831 Reference: Zero or one of iodef:Reference [RFC5070]. This element 832 allows an IODEF document to include a link to a structured 833 information instead of directly embedding it into a RawData 834 element. 836 This class MUST contain at least either of RawData and Reference 837 elements. Writers/senders MUST ensure the specification name and 838 version identified by the SpecificationID are consistent with the 839 contents of the RawData; if a reader/receiver detects an 840 inconsistency, it SHOULD prefer the specification name and version 841 derived from the content, and SHOULD log the inconsistency so a human 842 can correct the problem. 844 4.3.8. Remediation 846 A Remediation consists of an extension to the Incident.AdditionalData 847 element with a dtype of "xml". The extension elements describes 848 incident remediation information including instructions. 850 It is recommended that Incident class SHOULD contain one or more of 851 this extension elements whenever available. 853 A Remediation class is structured as follows. 855 +----------------------+ 856 | Remediation | 857 +----------------------+ 858 | ENUM SpecificationID |<>--(0..*)-[ RawData ] 859 | String RemediationID |<>--(0..*)-[ Reference ] 860 +----------------------+ 862 Figure 9: Remediation class 864 This class has the following attributes. 866 SpecificationID: REQUIRED. ENUM. The identifier of the 867 specification specifying the format of the RawData element. The 868 value should be chosen from the namespaces [XMLNames] listed in 869 Section 4.1. Note that the lists in Section 4.1 will be developed 870 further by IANA. In case a RawData or Reference element is 871 provided along with this attribute, writers/senders MUST ensure 872 that this value is consistent with the one provided by the 873 element; if a reader/receiver detects an inconsistency, it SHOULD 874 prefer this attribute's value, and SHOULD log the inconsistency so 875 a human can correct the problem. 877 RemediationID: OPTIONAL. STRING. An identifier of a remediation 878 information to be reported. This attribute SHOULD be used 879 whenever such identifier is available, but could be omitted if no 880 such one is available. In this case, either RawData or Reference 881 elements, or both of them, MUST be provided. In case a RawData or 882 Reference element is provided along with this attribute, writers/ 883 senders MUST ensure that this value is consistent with the one 884 provided by the element; if a reader/receiver detects an 885 inconsistency, it SHOULD prefer this attribute's value, and SHOULD 886 log the inconsistency so a human can correct the problem. 888 This class is composed of two aggregate classes. 890 RawData: Zero or one. XMLDATA. A complete document that is 891 formatted according to the specification and its version 892 identified by the value of the SpecificationID with the 893 Section 4.1. 895 Reference: Zero or one of iodef:Reference [RFC5070]. This element 896 allows an IODEF document to include a link to a structured 897 information instead of directly embedding it into a RawData 898 element. 900 This class MUST contain at least either of RawData and Reference 901 elements. Writers/senders MUST ensure the specification name and 902 version identified by the SpecificationID are consistent with the 903 contents of the RawData; if a reader/receiver detects an 904 inconsistency, it SHOULD prefer the specification name and version 905 derived from the content, and SHOULD log the inconsistency so a human 906 can correct the problem. 908 5. Security Considerations 910 This document specifies a format for encoding a particular class of 911 security incidents appropriate for exchange across organizations. As 912 merely a data representation, it does not directly introduce security 913 issues. However, it is guaranteed that parties exchanging instances 914 of this specification will have certain concerns. For this reason, 915 the underlying message format and transport protocol used MUST ensure 916 the appropriate degree of confidentiality, integrity, and 917 authenticity for the specific environment. 919 Organizations that exchange data using this document are URGED to 920 develop operating procedures that document the following areas of 921 concern. 923 5.1. Transport-Specific Concerns 925 The underlying messaging format and protocol used to exchange 926 instances of the IODEF MUST provide appropriate guarantees of 927 confidentiality, integrity, and authenticity. The use of a 928 standardized security protocol is encouraged. The Real-time Inter- 929 network Defense (RID) protocol [RFC6045] and its associated transport 930 binding [RFC6046] provide such security. 932 The critical security concerns are that these structured information 933 may be falsified or they may become corrupt during transit. In areas 934 where transmission security or secrecy is questionable, the 935 application of a digital signature and/or message encryption on each 936 report will counteract both of these concerns. We expect that each 937 exchanging organization will determine the need, and mechanism, for 938 transport protection. 940 6. IANA Considerations 942 This document uses URNs to describe XML namespaces and XML 943 schemata[XMLschemaPart1][XMLschemaPart2] conforming to a registry 944 mechanism described in [RFC3688]. 946 Registration request for the IODEF structured cybersecurity 947 information extension namespace: 949 URI: urn:ietf:params:xml:ns:iodef-sci-1.0 951 Registrant Contact: Refer here to the authors' addresses section 952 of the document. 954 XML: None 956 Registration request for the IODEF structured cybersecurity 957 information extension XML schema: 959 URI: urn:ietf:params:xml:schema:iodef-sci-1.0 961 Registrant Contact: Refer here to the authors' addresses section 962 of the document. 964 XML: Refer here to the XML Schema in the appendix of the document. 966 This memo creates the following registry for IANA to manage: 968 Name of the registry: "IODEF Structured Cyber Security Information 969 Specifications" 971 Namespace details: A registry entry for a Structured Cyber 972 Security Information Specification (SCI specification) consists 973 of: 975 Namespace: A URI [RFC3986] that is the XML namespace name used 976 by the registered SCI specification. 978 Specification Name: A string containing the spelled-out name of 979 the SCI specification in human-readable form. 981 Specification URI: A list of one or more of the URIs [RFC3986] 982 from which the registered specification can be obtained. The 983 registered specification MUST be readily and publicly available 984 from that URI. 986 Applicable Classes: A list of one or more of the Extended 987 Classes specified in Section 4.3 of this document. The 988 registered SCI specification MUST only be used with the 989 Extended Classes in the registry entry. 991 Information that must be provided to assign a new value: The above 992 list of information. 994 Fields to record in the registry: Namespace/Specification Name/ 995 Version/Applicable Classes. 997 Initial registry contents: See sections from Section 4.1.1 through 998 Section 4.1.17 above. 1000 Allocation Policy: Expert Review [RFC5226] and Specification 1001 Required [RFC5226]. 1003 The Designated Expert is expected to consult with the mile (Managed 1004 Incident Lightweight Exchange) working group or its successor if any 1005 such WG exists (e.g., via email to the working group's mailing list). 1006 The Designated Expert is expected to retrieve the SCI specification 1007 from the provided URI in order to check the public availability of 1008 the specification and verify the correctness of the URI. An 1009 important responsibility of the Designated Expert is to ensure that 1010 the registered Applicable Classes are appropriate for the registered 1011 SCI specification. 1013 7. Acknowledgment 1015 We would like to acknowledge Mr. David Black from EMC, who kindly 1016 provided generous support, especially on the IANA registry issues. 1017 We also would like to thank Paul Cichonski from NIST, Robert Martin 1018 from MITRE, Kathleen Moriarty from EMC, Lagadec Philippe from NATO, 1019 Shuhei Yamaguchi from NICT, Anthony Rutkowski from Yaana Technology, 1020 and Brian Trammel from CERT/NetSA for their sincere discussion and 1021 feedback on this document. 1023 8. Appendix I: XML Schema Definition for Extension 1025 The XML Schema describing the elements defined in the Extension 1026 Definition section is given here. Each of the examples in Section 9 1027 should be verified to validate against this schema by automated 1028 tools. 1030 1032 1038 1041 1045 1049 1050 1051 1052 1053 1055 1056 1058 1059 1060 1061 1062 1063 1064 1066 1070 1071 1072 1073 1075 1076 1078 1079 1081 1085 1086 1087 1088 1090 1092 1094 1095 1097 1099 1100 1102 1106 1107 1108 1109 1111 1113 1115 1117 1118 1120 1122 1123 1125 1129 1130 1131 1132 1134 1136 1138 1140 1141 1143 1145 1146 1148 1152 1153 1154 1155 1157 1159 1160 1162 1164 1165 1167 1171 1172 1173 1174 1175 1176 1177 1178 1179 1181 1183 1184 1186 1190 1191 1192 1193 1194 1195 1196 1197 1198 1200 1202 1204 1206 1210 1211 1212 1213 1214 1215 1216 1217 1218 1220 1222 1223 1225 1227 9. Appendix II: XML Examples 1229 This section provides an example of an incident encoded in the IODEF. 1230 This do not necessarily represent the only way to encode a particular 1231 incident. Below is an example of a CSIRT reporting an attack. 1233 1234 1239 1240 189493 1241 2001-09-13T23:19:24+00:00 1242 Incident report in company xx 1243 1244 1245 1246 1247 Structured information on attack pattern, exploited 1248 vulnerability, and weakness 1249 1250 1252 1253 1259 ..... 1260 1261 1262 1263 Link to Capec-14 1264 http://capec.mitre.org/data/definitions/14.html 1265 1266 1267 1269 1270 1274 1275 ... 1276 1277 1278 1279 1281 1282 1283 1284 9.3 1285 NETWORK 1286 MEDIUM 1287 NONE 1288 COMPLETE 1289 COMPLETE 1290 COMPLETE 1291 http://nvd.nist.gov 1292 2012-01-11T09:55:00.000-05:00 1293 1294 1295 1296 1297 1298 1300 1301 1307 ..... 1308 1309 1310 1311 1312 1313 1314 Example.com CSIRT 1315 example-com 1316 contact@csirt.example.com 1317 1318 1319 1320 1321 1322
192.0.2.200
1323 57 1324
1325
1326 1327 1328
192.0.2.16/28
1329
1330 1331 80 1332 1333 1334 1336 1337
1338
1339 1340 1341 1342 1343 1344 2001-09-13T18:11:21+02:00 1345 a Web-server event record 1346 1347 1348 1349 1350 ..... 1351 1352 1353 1354 1355 1356 1357
1358 1359 1360 1361 2001-09-14T08:19:01+00:00 1362 Notification sent to 1363 constituency-contact@192.0.2.200 1364 1365 1366 1367 1368 1369 1381 ..... 1382 1383 1384 1385 1386 1387 1392 ..... 1393 1394 1396 1397 1398
1399
1401 10. References 1403 10.1. Normative References 1405 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 1406 Requirement Levels", BCP 14, RFC 2119, March 1997. 1408 [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform 1409 Resource Identifier (URI): Generic Syntax", STD 66, 1410 RFC 3986, January 2005. 1412 [RFC5070] Danyliw, R., Meijer, J., and Y. Demchenko, "The Incident 1413 Object Description Exchange Format", RFC 5070, 1414 December 2007. 1416 [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an 1417 IANA Considerations Section in RFCs", BCP 26, RFC 5226, 1418 May 2008. 1420 [RFC6045] Moriarty, K., "Real-time Inter-network Defense (RID)", 1421 RFC 6045, November 2010. 1423 [RFC6046] Moriarty, K. and B. Trammell, "Transport of Real-time 1424 Inter-network Defense (RID) Messages", RFC 6046, 1425 November 2010. 1427 [XML1.0] Bray, T., Maler, E., Paoli, J., Sperberg-McQueen, C., and 1428 F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth 1429 Edition)", W3C Recommendation, November 2008. 1431 [XMLschemaPart1] 1432 Thompson, H., Beech, D., Maloney, M., and N. Mendelsohn, 1433 "XML Schema Part 1: Structures Second Edition", 1434 W3C Recommendation, October 2004. 1436 [XMLschemaPart2] 1437 Biron, P. and A. Malhotra, "XML Schema Part 2: Datatypes 1438 Second Edition", W3C Recommendation, October 2004. 1440 [XMLNames] 1441 Bray, T., Hollander, D., Layman, A., Tobin, R., and H. 1442 Thomson, ""Namespaces in XML (Third Edition)", 1443 W3C Recommendation, December 2009. 1445 [CAPEC] The MITRE Corporation, "Common Attack Pattern Enumeration 1446 and Classification (CAPEC)". 1448 [CCE] The MITRE Corporation, "Common Configuration Enumeration 1449 (CCE)". 1451 [CCSS] Scarfone, K. and P. Mell, "The Common Configuration 1452 Scoring System (CCSS)", NIST Interagency Report 7502, 1453 December 2010. 1455 [CEE] The MITRE Corporation, "Common Event Expression (CEE)". 1457 [CPE] National Institute of Standards and Technology, "Common 1458 Platform Enumeration", June 2011. 1460 [CVE] The MITRE Corporation, "Common Vulnerability and Exposures 1461 (CVE)". 1463 [CVRF] ICASI, "Common Vulnerability Reporting Framework (CVRF)". 1465 [CVSS] Peter Mell, Karen Scarfone, and Sasha Romanosky, "The 1466 Common Vulnerability Scoring System (CVSS) and Its 1467 Applicability to Federal Agency Systems". 1469 [CWE] The MITRE Corporation, "Common Weakness Enumeration 1470 (CWE)". 1472 [CWSS] The MITRE Corporation, "Common Weakness Scoring System 1473 (CWSS)". 1475 [OCIL] David Waltermire and Karen Scarfone and Maria Casipe, "The 1476 Open Checklist Interactive Language (OCIL) Version 2.0", 1477 April 2011. 1479 [OVAL] The MITRE Corporation, "Open Vulnerability and Assessment 1480 Language (OVAL)". 1482 [XCCDF] David Waltermire and Charles Schmidt and Karen Scarfone 1483 and Neal Ziring, "Specification for the Extensible 1484 Configuration Checklist Description Format (XCCDF) version 1485 1.2 (DRAFT)", July 2011. 1487 10.2. Informative References 1489 [RFC3339] Klyne, G., Ed. and C. Newman, "Date and Time on the 1490 Internet: Timestamps", RFC 3339, July 2002. 1492 [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC 1493 Text on Security Considerations", BCP 72, RFC 3552, 1494 July 2003. 1496 [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, 1497 January 2004. 1499 [RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322, 1500 October 2008. 1502 [RFC6116] Bradner, S., Conroy, L., and K. Fujiwara, "The E.164 to 1503 Uniform Resource Identifiers (URI) Dynamic Delegation 1504 Discovery System (DDDS) Application (ENUM)", RFC 6116, 1505 March 2011. 1507 [SCAP] Waltermire, D., Quinn, S., Scarfone, K., and A. 1508 Halbardier, "The Technical Specification for the Security 1509 Content Automation Protocol (SCAP): SCAP Version 1.2", 1510 NIST Special Publication 800-126 Revision 2, 1511 September 2011. 1513 Authors' Addresses 1515 Takeshi Takahashi 1516 National Institute of Information and Communications Technology 1517 4-2-1 Nukui-Kitamachi Koganei 1518 184-8795 Tokyo 1519 Japan 1521 Phone: +80 423 27 5862 1522 Email: takeshi_takahashi@nict.go.jp 1524 Kent Landfield 1525 McAfee, Inc 1526 5000 Headquarters Drive 1527 Plano, TX 75024 1528 USA 1530 Email: Kent_Landfield@McAfee.com 1531 Thomas Millar 1532 US Department of Homeland Security, NPPD/CS&C/NCSD/US-CERT 1533 245 Murray Lane SW, Building 410, MS #732 1534 Washington, DC 20598 1535 USA 1537 Phone: +1 888 282 0870 1538 Email: thomas.millar@us-cert.gov 1540 Youki Kadobayashi 1541 Nara Institute of Science and Technology 1542 8916-5 Takayama, Ikoma 1543 630-0192 Nara 1544 Japan 1546 Email: youki-k@is.aist-nara.ac.jp