|No, I was referring to a clearing house TAXII server, like an ISAC or ISAO. Say BankA produces the Indicator and ships it to FS-ISAC. Would we need or want any type of chain. If not, then that is okay. I just wanted to ask.|
Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
Do you mean – how did I get this STIX thingee – via email, TAXII, UPS? No, I’m not talking about that kind of source – I don’t know if that information is or should be captured. No – the source of the information in the STIX thingee….
Would the delivery service, portal, or broker be in that list?
Director of Security Architecture and Standards | Office of the CTO PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." There are many different concepts of “sources” that we seem to be talking about: · The creator of the STIX/CybOX object o An individual/organization (created manually via something like Soltra Edge), probably represented by an Identity object o Software, that creates STIX/CybOX objects automatically – no manual input · A similar object from outside the STIX model (used to be external_ID in STIX 1.2) – NOT a CTI ID · A reference, like in a bibliography, which might be accessible via a URL – NOT a CTI object · An association to another type of STIX object – like CVE (assuming we represent Vulnerability as a STIX TLO)
The original object could be the source of a translated object, but that seem better handled separately (as discussed in the recent I18N email threat).