Hi OPSEC,

Please see below for details of our new draft on Indicators of Compromise 
(IoCs), updated based on previous comments. We think it might be suitable for 
OPSEC, but we'd like to hear your comments, discussion or feedback on this 
draft - please get in touch!

Kirsty & Ollie

________________________________
From: [email protected] <[email protected]>
Sent: 13 January 2021 17:44
To: Kirsty P <[email protected]>; Kirsty P <[email protected]>; Ollie 
Whitehouse <[email protected]>
Subject: New Version Notification for 
draft-paine-smart-indicators-of-compromise-02.txt


A new version of I-D, draft-paine-smart-indicators-of-compromise-02.txt
has been successfully submitted by Kirsty Paine and posted to the
IETF repository.

Name:           draft-paine-smart-indicators-of-compromise
Revision:       02
Title:          Indicators of Compromise (IoCs) and Their Role in Attack Defence
Document date:  2021-01-13
Group:          Individual Submission
Pages:          18
URL:            
https://www.ietf.org/archive/id/draft-paine-smart-indicators-of-compromise-02.txt
Status:         
https://datatracker.ietf.org/doc/draft-paine-smart-indicators-of-compromise/
Htmlized:       
https://datatracker.ietf.org/doc/html/draft-paine-smart-indicators-of-compromise
Htmlized:       
https://tools.ietf.org/html/draft-paine-smart-indicators-of-compromise-02
Diff:           
https://www.ietf.org/rfcdiff?url2=draft-paine-smart-indicators-of-compromise-02

Abstract:
   Indicators of Compromise (IoCs) are an important technique in attack
   defence (often called cyber defence).  This document outlines the
   different types of IoC, their associated benefits and limitations,
   and discusses their effective use.  It also contextualises the role
   of IoCs in defending against attacks through describing a recent case
   study.  This draft does not pre-suppose where IoCs can be found or
   should be detected - as they can be discovered and deployed in
   networks, endpoints or elsewhere - rather, engineers should be aware
   that they need to be detectable (either by endpoints, security
   appliances or network-based defences, or ideally all) to be
   effective.  The purpose of this draft is to document both the
   operational issues, but also the best practices associated with use
   of IoCs today.  This draft provides a foundation for proposals for
   new approaches to operational challenges in network security.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat
This information is exempt under the Freedom of Information Act 2000 (FOIA) and 
may be exempt under other UK information legislation. Refer any FOIA queries to 
[email protected]. All material is UK Crown Copyright ©
_______________________________________________
OPSEC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsec

Reply via email to