02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

According to <strong>the</strong> INCH WG Charter and Scope, “The purpose <strong>of</strong> <strong>the</strong> <strong>Incident</strong> Handling<br />

Working Group is to define data formats for communication between<br />

• a CSIRT and its constituency (e.g., users, customers, trusted reporters) which reports system<br />

misuse;<br />

• a CSIRT and parties involved in an incident investigation (e.g., law enforcement, attacking<br />

site); and<br />

• collaborating CSIRTs sharing information” [INCH 02].<br />

Deliverables and outputs from <strong>the</strong> working group include:<br />

• “A document describing <strong>the</strong> high-level functional requirements <strong>of</strong> a data format for collaboration<br />

between CSIRTs and parties involved when handling computer security incidents.<br />

• A specification <strong>of</strong> <strong>the</strong> extensible, incident data language that describes <strong>the</strong> data formats<br />

that satisfy <strong>the</strong> requirements.<br />

• Guidelines for implementing <strong>the</strong> WG data format (Output #2 <strong>of</strong> <strong>the</strong> WG).<br />

• A set <strong>of</strong> sample incident reports and <strong>the</strong>ir associate representation in <strong>the</strong> incident data<br />

language” [INCH 02].<br />

For more information see:<br />

http://www.ietf.org/html.charters/inch-charter.html<br />

3.10.2.2 IETF Intrusion Detection Working Group (IDWG)<br />

According to <strong>the</strong> charter <strong>of</strong> this working group, “The purpose <strong>of</strong> <strong>the</strong> Intrusion Detection<br />

Working Group is to define data formats and exchange procedures for sharing information <strong>of</strong><br />

interest to intrusion detection and response systems, and to management systems which may<br />

need to interact with <strong>the</strong>m” [IDMEF 02].<br />

The IDMEF data model and XML data definition document can be read at:<br />

http://www.ietf.org/internet-drafts/draft-ietf-idwg-requirements-10.txt<br />

For more information see:<br />

http://www.ietf.org/html.charters/idwg-charter.html<br />

3.10.2.3 Common Advisory Interchange Format (CAIF)<br />

The purpose <strong>of</strong> this project is to design a standardized structure and format for creating and<br />

exchanging security advisories [CAIF 02]. A subscriber mailing list and a description <strong>of</strong> <strong>the</strong><br />

CAIF requirements are available from <strong>the</strong> project’s web site.<br />

CMU/SEI-2003-TR-001 123

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!