OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti] CTI TC Adoption and Interoperability SCs


That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI.

-
Jason Keirstead
Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security | www.securityintelligence.com

Without data, all you are is just another person with an opinion - Unknown


Inactive hide details for Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX ProfilTrey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som

From: Trey Darley <trey@soltra.com>
To: Eric Burger <Eric.Burger@georgetown.edu>, "cti@lists.oasis-open.org" <cti@lists.oasis-open.org>
Date: 2015/07/13 06:40 AM
Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
Sent by: <cti@lists.oasis-open.org>





What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?

Cheers,
Trey
--
Trey Darley
Senior Security Engineer
Soltra | An FS-ISAC & DTCC Company
www.soltra.com




From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> on behalf of Eric Burger <Eric.Burger@georgetown.edu>
Sent:
Monday, July 13, 2015 11:25
To:
cti@lists.oasis-open.org
Subject:
Re: [cti] CTI TC Adoption and Interoperability SCs

We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.

One of the great features of STIX and CybOX is they do everything. The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything.

Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S.

A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed.

Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo.





[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]