{"draft":"draft-ietf-sacm-requirements-18","doc_id":"RFC8248","title":"Security Automation and Continuous Monitoring (SACM) Requirements","authors":["N. Cam-Winget","L. Lorenzin"],"format":["ASCII","HTML"],"page_count":"20","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Security Automation and Continuous Monitoring","abstract":"This document defines the scope and set of requirements for the\r\nSecurity Automation and Continuous Monitoring (SACM) architecture,\r\ndata model, and transfer protocols. The requirements and scope are\r\nbased on the agreed-upon use cases described in RFC 7632.","pub_date":"September 2017","keywords":["posture assessment","posture validation","software integrity","network authorization","software compliance"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8248","errata_url":null}