draft-ietf-opsec-efforts-10.txt | draft-ietf-opsec-efforts-11.txt | |||
---|---|---|---|---|
Network Working Group C. Lonvick | Network Working Group C. Lonvick | |||
Internet-Draft D. Spak | Internet-Draft D. Spak | |||
Expires: October 15, 2009 Cisco Systems | Expires: May 19, 2010 Cisco Systems | |||
April 13, 2009 | November 15, 2009 | |||
Security Best Practices Efforts and Documents | Security Best Practices Efforts and Documents | |||
draft-ietf-opsec-efforts-10.txt | draft-ietf-opsec-efforts-11.txt | |||
Abstract | ||||
This document provides a snapshot of the current efforts to define or | ||||
apply security requirements in various Standards Developing | ||||
Organizations (SDO). | ||||
Status of this Memo | Status of this Memo | |||
This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
Drafts. | Drafts. | |||
skipping to change at page 1, line 32 | skipping to change at page 1, line 38 | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This Internet-Draft will expire on October 15, 2009. | This Internet-Draft will expire on May 19, 2010. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2009 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents | |||
publication of this document (http://trustee.ietf.org/license-info). | (http://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | ||||
Abstract | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | ||||
This document provides a snapshot of the current efforts to define or | described in the BSD License. | |||
apply security requirements in various Standards Developing | ||||
Organizations (SDO). | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
2. Format of this Document . . . . . . . . . . . . . . . . . . . 7 | 2. Format of this Document . . . . . . . . . . . . . . . . . . . 7 | |||
3. Online Security Glossaries . . . . . . . . . . . . . . . . . . 8 | 3. Online Security Glossaries . . . . . . . . . . . . . . . . . . 8 | |||
3.1. ATIS Telecom Glossary 2000 . . . . . . . . . . . . . . . . 8 | 3.1. ATIS Telecom Glossary 2000 . . . . . . . . . . . . . . . . 8 | |||
3.2. Internet Security Glossary - RFC 4949 . . . . . . . . . . 8 | 3.2. Internet Security Glossary - RFC 4949 . . . . . . . . . . 8 | |||
3.3. Compendium of Approved ITU-T Security Definitions . . . . 8 | 3.3. Compendium of Approved ITU-T Security Definitions . . . . 8 | |||
3.4. Microsoft Solutions for Security Glossary . . . . . . . . 8 | 3.4. Microsoft Solutions for Security Glossary . . . . . . . . 8 | |||
skipping to change at page 34, line 16 | skipping to change at page 34, line 16 | |||
-09 : Nineth revision of the WG ID. | -09 : Nineth revision of the WG ID. | |||
Updated the date. | Updated the date. | |||
-10 : Tenth revision of the WG ID. | -10 : Tenth revision of the WG ID. | |||
Added references to NIST documents, recommended by Steve Wolff. | Added references to NIST documents, recommended by Steve Wolff. | |||
Updated the date. | Updated the date. | |||
-11 : Eleventh revision of the WG ID. | ||||
Updated the date. | ||||
Note: This section will be removed before publication as an RFC. | Note: This section will be removed before publication as an RFC. | |||
Authors' Addresses | Authors' Addresses | |||
Chris Lonvick | Chris Lonvick | |||
Cisco Systems | Cisco Systems | |||
12515 Research Blvd. | 12515 Research Blvd. | |||
Austin, Texas 78759 | Austin, Texas 78759 | |||
US | US | |||
End of changes. 5 change blocks. | ||||
14 lines changed or deleted | 22 lines changed or added | |||
This html diff was produced by rfcdiff 1.37a. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |