Hi,

I am reiterating a request that I made at IETF 94 in the OPSAWG meeting, and 
also sent to the mail lists of opsec and opsawg. The SACM WG is considering a 
document https://datatracker.ietf.org/doc/draft-coffin-sacm-vuln-scenario/ that 
describes the operational practice of vulnerability reports, which we believe 
is an important use case in the security assessment life cycle. We are 
requiring feedback from operators about the scenario describe in this document 
- does it make sense? Is it similar with what you do in operational real life? 
Are you using similar or different methods for vulnerability assessment in your 
networks? A quick reading and short feedback would be greatly appreciated.

Thanks and Regards,

Dan

_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to