{"draft":"draft-ietf-sacm-use-cases-10","doc_id":"RFC7632","title":"Endpoint Security Posture Assessment: Enterprise Use Cases","authors":["D. Waltermire","D. Harrington"],"format":["ASCII","HTML"],"page_count":"23","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Security Automation and Continuous Monitoring","abstract":"This memo documents a sampling of use cases for securely aggregating\r\nconfiguration and operational data and evaluating that data to\r\ndetermine an organization's security posture. From these operational\r\nuse cases, we can derive common functional capabilities and\r\nrequirements to guide development of vendor-neutral, interoperable\r\nstandards for aggregating and evaluating data relevant to security\r\nposture.","pub_date":"September 2015","keywords":["security automation","continuous monitoring","endpoint","posture assessment","use case","asset management","configuration management","vulnerability management","content management"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7632","errata_url":null}