Proposed SACM Architecture Ad-hoc SACM Arch team July 2014.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

Contextual Linking Architecture Christophe Blanchi June Corporation for National Research Initiatives Approved for.
Geoscience Information Network Stephen M Richard Arizona Geological Survey National Geothermal Data System.
MgmtSecurity QOS Transport Packaging Extensions Wire Inspection Discovery Publication Registry Description Business Level Agreements Service Level Agreements.
XP Processor Intermediary XP Processor Intermediary XP Processor Application Message (Application Headers+ Application Bodies) XP Layer Entity XP Layer.
MgmtSecurity QOS Transport Packaging Extensions Wire Inspection Discovery Publication Registry Description Business Level Agreements Service Level Agreements.
Multi-level SLA Management for Service-Oriented Infrastructures Wolfgang Theilmann, Ramin Yahyapour, Joe Butler, Patrik Spiess consortium / SAP.
1 UDDI Jong-Ha Jung 07/28. 2 INDEX INDEX What is UDDI? What is UDDI? Appearance of UDDI Appearance of UDDI Why UDDI? Why UDDI? Analogy with Telephone.
Desktop Profile Web Profile Mobile Profile Communications Profile Communications Profile Service Framework Abstraction Identity Management Policy Life.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
1 Richard White Design decisions: architecture 1 July 2005 BiodiversityWorld Grid Workshop NeSC, Edinburgh, 30 June - 1 July 2005 Design decisions: architecture.
IETF NEA WG (NEA = Network Endpoint Assessment) Chairs:Steve Hanna, Susan Thomson,
Web Services Seppo Heikkinen MITA seminar/TUT
Trns*port Data Model Unification Joe Pugh Virginia Department of Transportation Peggy Leight Info Tech Inc 11/06/05.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Automated XML Content Data Exchange and Management draft-waltermire-content-repository-00
Collaborative Direct-- Status Update December 6, 2013 Don Jorgenson Inpriva, Inc.
Initial slides for Layered Service Architecture
SACM Information Model. Current Status First WG draft posted 10/24 Many open issues remain Several comments / suggestions sent to WG for review Today.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Page rd IETF – Minneapolis, MN, November 2008 A Framework for the Control and Measurement of Wavelength Switched Optical Networks (WSON) with Impairments.
July 27, 2009IETF NEA Meeting1 NEA Working Group IETF 75 Co-chairs: Steve Hanna
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
SACM Requirements Nancy Cam-Winget March 2014.
Terminology and Use Cases Status Report David Harrington IETF 88 – Nov Security Automation and Continuous Monitoring WG.
OOI CyberInfrastructure: Data Management Architecture Specification Workshop June 30-July 1, 2008 Matthew Arrott, Ingolf Krueger, Claudiu Farcas, Emilia.
SACM Scope Discussion IETF-92 Meeting March 23, 2015 Dave Waltermire Adam Montville.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
NIST BIG DATA WG Reference Architecture Subgroup Agenda for the Subgroup Call Co-chairs: Orit Levin (Microsoft) James Ketner (AT&T) Don Krapohl (Augmented.
Service Component Registry and Repository (SCRR) April 26, 2007 Lico Galindo 2007 Exchange Network National Meeting.
Coordination Artifacts in Multi-Agent Systems April 19, 2005 IEEE KIMAS 2005 Sarah Siracuse, John Zinky, Richard Shapiro
Create Content Capture Content Review Content Edit Content Version Content Version Content Translate Content Translate Content Format Content Transform.
Kemal Baykal Rasim Ismayilov
NEA Working Group IETF meeting July 27, Co-chairs: Steve Hanna
ICOM TC Charter TC’s Scope –Specify the normative standards for collaboration objects, along with their attributes, relationships, constraints, and behavior,
NSDL & Access Management David Millman Columbia University Jan ‘02.
1 Requirement Specification for IoT API layer Company:Tata Consultancy Services Author(s):Avik Ghose Contact
July 28, 2004WSRF Technical Committee F2F meeting1 WSRP leveraging WSRF Use case for Portlets as WS-Resources.
Lecture VI: SOAP-based Web Service CS 4593 Cloud-Oriented Big Data and Software Engineering.
NEA Working Group IETF meeting July 27, 2011 Jul 27, 2011IETF 81 - NEA Meeting1.
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
CLASS Metadata and Remote Sensing Extensions CLASS Data Provider’s Conference September 2005 Anna Milan, Ted.Habermann,
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Software architecture is the high- level structure of a software system. It has no concrete definition but can be best described as an organizational.
Briefing and Planning meeting on INSPIRE validator implementation – Discussion 16/12/2015.
© Copyright IBM Corporation 2016 Diagram Template IBM Cloud Architecture Center Using the Diagram Template This template is for use in creating a visual.
UBC IT Integrated Reporting Working Committee October 26 th, 2011.
Franco Travostino and Admela Jukan jukan at uiuc.edu June 30, 2005 GGF 14, Chicago Grid Network Services Architecture (GNSA) draft-ggf-ghpn-netserv-2.
RepNet/RSP “Supporting and Engancing your Repository” Workshop BSC - London 21 th January, 2013 Pablo de Castro
Advanced Technical Writing 2005 Session #8. For P2, you will… 1. Analyze the content strategy of a real organization - the MSU library 2. Investigate.
H2020 ProjectProject Number: DASSH USECASE DAN LEAR, ABRAHAM NIEVA DE LA HIDALGA, ALEX HARDISTY 1.
Continuous Assessment Protocols for SACM draft-hanna-sacm-assessment-protocols-00.txt November 5, 20121IETF 85 - SACM Meeting.
SACM Vulnerability Assessment Scenario IETF 95 04/05/2016.
04/11/08 Copyright (C) Wellfleet Software Corporation, All Rights Reserved 1 ebXML RegRep 4.0 Overview Farrukh Najmi, Wellfleet Software September 17,
EOSC MODEL Pasquale Pagano CNR - ISTI
Proposed SACM Architecture
The OpenAIRE infrastructure
Security Working Group
Nancy Cam-Winget June 2015 SACM Requirements Nancy Cam-Winget June 2015.
Introduction to Cisco Identity Services Engine (ISE)
draft-fitzgeraldmckay-sacm-endpointcompliance-00
CIMI Enterprise Architecture Proposal
EOSC Overall Architecture Donatella Castelli CNR-ISTI
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
PPT and video are due no later than February 15, 2019
Engine Part ID Part 1.
Engine Part ID Part 2.
Engine Part ID Part 2.
Henk Birkholz Jarret Lu Nancy Cam-Winget
Presentation transcript:

Proposed SACM Architecture Ad-hoc SACM Arch team July 2014

Proposed SACM Architecture Draft-camwinget-sacm-architecture-00 posted in June 2014 Architecture defines the components or “actors” that communicate or interface with each other The interfaces define the means by which Posture Information (e.g. data model) is sent or received The means by which a provider or requestor can provide its metadata and address security access controls is defined through a “control plane”

Why a Control Plane? Control Plane is an abstraction layer to facilitate: – Secure communications between a requestor and a publisher of Posture Information – Registration of new data models and transport – Discovery of existing/supported data models transport

SACM Architecture - Conceptual Posture Assessment Information Requestor Broker/Proxy/Repository: authZ, directory, metadata/capability Posture Assessment Information Requestor Posture Assessment Information Provider An individual actor (such as a posture assessment validator) may act as both an information requestor and an information provider. Different types of information providers may offer different types / levels of information (e.g. metadata or data profile) Control Plane Data Plane

Posture Assessment Information Provider Posture Assessment Information Provider Posture Assessment Information Provider Posture Assessment Information Provider Conceptual architecture based on Use Cases Posture Collector Posture Validator Posture Assessment Information Provider Posture Assessment Information Provider Posture Aggregator Application Driven thru a single Information Model /Taxonomy Posture Assessment (Info) Requestor Admin Posture Assessment (Info) Requestor Sensor Posture Assessment (Info) Requestor Other

SACM Architecture - Example Sensor [P] Posture Aggregator [RP] IDS [P] Posture Collector [P] Posture Validator [RP] Analytics Engine [R] Other [R] Endpoint Assessment [P] AAA [RP] Dashboard [R] Physical Security [RP] Response [RP] Control Plane Broker Proxy Repository [P]=Posture Assessment Information Provider [R] = Posture Assessment Information Requestor Analysis [RP] Vulnerability Scanner [RP] SIM / SEM [RP] Other [P] CMDB [RP]

Next steps Comments provided by David Waltemire: – More text required to define “roles”: consumer/producer and entities that can behave as both – More text to fit in the different Posture functions (e.g. Collector, Validator) – More text to distinguish operations employed in the control plane vs. data plane More feedback please!

Q & A