120 likes | 247 Vues
This document outlines the refined requirements for CSIRT Incident Report Databases based on a review of RFC3067 discussed at IETF-55 in Atlanta, November 2002. Key aspects include the importance of clear semantics for data exchange across regions, structured formats, and extensibility of incident reports. It emphasizes integrity, authenticity, and global uniqueness in identification. Additionally, it presents communication protocols that ensure no impact on data integrity, along with guidelines for uniform incident description and localization support.
E N D
INCH Requirements Glenn Mansfield Keeni Cyber Solutions Inc (glenn@cysols.com) Hiroyuki Ohno Wide Project (hohno@wide.ad.jp) IETF-55 Atlanta, November, 2002
Based on a review of RFC3067 CERT Processes IDWG requirements
CSIRT Incident Report Database Other CSIRTs Operational Model
CSIRT Incident Report Database Other CSIRTs Alerts, Reports Statistics Operational Model-2
Human Sensor Cryptic (codes etc.) Descriptive May contain Alerts Manager & Humans Standard based app. Standard ? Incident Report Handling Requirements:Changes from RFC3067 Alerts Incident Reports
Intent of the IR Data Model controlled exchange and sharing clear and unambiguous semantics even across regional/national boundaries (as far as possible) well defined syntax (atleast for parts of it) enable categorization and statistical analysis ensure integrity and the authenticity
Requirements: General Format Communication Contents Process
IR Format Requirements: Internationalization & Localization Structured Well defined semantics for the components Unambiguous and reducible time references Record of time development Access control (who will have to access what ) different components, users Globally unique identification (for IR ) Extensibility
IR Communication Requirements: Must have no effect on integrity, authenticity
IR Content Requirements: Various facets of the entities involved Not only network related information Various naming rules for the entities Globally unique identifier(components) Classification scheme (enumerated) Several classifications Originator, Owner, Contacts, History, Reference to advisories Description of the incident
IR Content Requirements: Multiple versions (in different languages) Indication of “original” vs “translated copies” IDMEF Alerts Logs, Dumps Additional references/pointers Impact (Guidelines for uniform description) Actions taken Authenticity, Integrity verification info
IR Process Requirements: Must be deployed real soon !