OASIS Cyber Threat Intelligence (CTI) TC

Expand all | Collapse all

Re: [cti] CTI TC Adoption and Interoperability SCs

  • 1.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 09:26
    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner. (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., Indicator Characterization/Sharing Host-based Indicator Sharing STIX Level 1: Basic Context Level 2: Level 1 + Supports Sightings CybOX Level 1: Supports File Object File_Path field Hashes field Level 2: Level 1 + Supports Windows Registry Key Object Network Indicator Sharing TTP/Malware Characterization Sharing Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 2.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 09:40




    What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? 





    Cheers,
    Trey
    --
    Trey Darley

    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com








    From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> on behalf of Eric Burger <Eric.Burger@georgetown.edu>
    Sent: Monday, July 13, 2015 11:25
    To: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
     

    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.


    One of the great features of STIX and CybOX is they do
    everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do
    everything .


    Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information,
    that is the phishing application that runs on STIX and CybOX with features A, R, and S.


    A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations
    offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed.


    Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo.



    On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:



    I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information,
    and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product
    class, and the product class will likely never support any more as a result.

    This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products.

    * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer
    products not being able to support the full set of all possible CybOX objects and their operators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox

    From: Mark Clancy < mclancy@soltra.com >
    To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu >
    Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date: 2015/07/09 01:38 PM
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by: < cti@lists.oasis-open.org >





    Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do?
    Does it consume specific data, does it publish specific data, or does it aggregate/link all data ?

    The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined
    in the profile may well be the maximum content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry
    keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity
    curve.

    The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that
    another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure.

    So what the heck should we do?

    We need to put life into the STIX profiles.
    We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.


    For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation
    by their suppliers.

    -Mark

    Mark Clancy
    Chief Executive Officer
    SOLTRA
    An FS-ISAC and DTCC Company
    +1.813.470.2400 office
    +1.610.659.6671 US
    mobile ?
    +44 7823 626 535
    UK mobile
    mclancy@soltra.com

    soltra.com

    One organization's incident becomes everyone's defense.

    ?




    From:
    cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com >
    Sent: Wednesday, July 8, 2015 8:26 PM
    To: Eric Burger
    Cc:
    cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs


    Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.


    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu >
    wrote:

    I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No
    matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes
    the product more attractive to customers.

    We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what
    people want to build.

    So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which
    of the optional components of the CTI suite a product needs to have to meaningfully address the use case.




    On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org >
    wrote:

    +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues.

    sean

    From: Patrick Maroney < Pmaroney@Specere.org >
    Date: Wednesday, July 8, 2015 at 12:45 PM
    To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve
    Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse,
    Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I may be missing something here and have been hesitating throwing in my usual advocacy for
    STIX Profiles [Plus]
    as a method to help manage complexity, interoperability, different world views, use cases, etc.,


    We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard"
    STIX Profiles and then use these and iterate over them to revise or create new Community "Standard" STIX Profiles.

    Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase:

    (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner.


    (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways.

    I have always agreed with these objectives.


    However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what
    I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).


    Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX
    Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough
    I might quip that Einstein was quite legitimately seeking similar unification ;-).

    Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.
    this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.
    This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing,
    (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:
    You only describe what you need and nothing more.


    Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration :

    Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her
    horizons, we can eventually remove the Training Wheels.


    I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions
    on complexity, interoperability, maturity levels, impediments, to adoption, etc.

    Patrick Maroney
    Office: (856)983-0001
    Cell:: (609)841-5104
    Email: pmaroney@specere.org

    From: < cti@lists.oasis-open.org >
    on behalf of Sean Barnum < sbarnum@mitre.org >
    Date: Wednesday, July 8, 2015 at 10:15 AM
    To: "Kirillov, Ivan A." < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard
    Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    +!
    I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading.

    sean

    From: <Kirillov>, Steve Cell < ikirillov@mitre.org >
    Date: Wednesday, July 8, 2015 at 8:35 AM
    To: Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse,
    Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one
    has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have
    to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).


    Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined
    independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g.,


    Indicator Characterization/Sharing


    Host-based Indicator Sharing


    STIX


    Level 1: Basic Context Level 2: Level 1 + Supports Sightings

    CybOX


    Level 1: Supports File Object


    File_Path field Hashes field

    Level 2: Level 1 + Supports Windows Registry Key Object



    Network Indicator Sharing

    TTP/Malware Characterization Sharing


    Basic TTP/Malware Characterization



    Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity
    levels, I’d recommend limiting the number of levels to 3 to keep things sane:


    Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets


    Regards,
    Ivan

    From: Terry MacDonald < terry.macdonald@threatloop.com >
    Date: Tuesday, July 7, 2015 at 7:26 PM
    To: Bret Jordan < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard
    Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I agree. I like the way this is headed.

    I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align
    as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX
    compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently.

    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com >
    wrote:
    The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.


    I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?"


    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us >
    wrote:

    Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.


    More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example)
    as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to.

    Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables)
    Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc.
    Level 3: In addition to level 2, adds support for Sightings
    Level 4: In addition to level 3, adds all STIX and CybOx object types.
    Level 5: In addition to level 4, adds support for STIX object updates and Revocation


    Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.



    Dave


    ________________________________________
    From: cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV >
    Sent: Monday, July 6, 2015 1:09 PM
    To: Eric Burger; cti@lists.oasis-open.org
    Subject: RE: [cti] CTI TC Adoption and Interoperability SCs

    I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would
    need to tackle.




  • 3.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 09:47
    That would be reasonable, as long as it is publicly available and does not move around (e.g., mitre.org  -> oasis.org ). Could be IANA if we really wanted it to stick around. On Jul 13, 2015, at 5:39 AM, Trey Darley < trey@soltra.com > wrote: What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?  Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From:   cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent:   Monday, July 13, 2015 11:25 To:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do   everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.   This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From:   Mark Clancy < mclancy@soltra.com > To:   Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc:   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/09 01:38 PM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.   The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.   For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA     An FS-ISAC and DTCC Company +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44 7823 626 535   UK   mobile mclancy@soltra.com     soltra.com One organization's incident becomes everyone's defense. ? From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent:   Wednesday, July 8, 2015 8:26 PM To:   Eric Burger Cc:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.   Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.   We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case.   On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From:   Patrick Maroney < Pmaroney@Specere.org > Date:   Wednesday, July 8, 2015 at 12:45 PM To:   Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as a method to help manage complexity, interoperability, different world views, use cases, etc.,   We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner.   (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives.   However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).   Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:   You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email:   pmaroney@specere.org From:   < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date:   Wednesday, July 8, 2015 at 10:15 AM To:   Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From:   <Kirillov>, Steve Cell < ikirillov@mitre.org > Date:   Wednesday, July 8, 2015 at 8:35 AM To:   Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).   Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., Indicator Characterization/Sharing   Host-based Indicator Sharing   STIX   Level 1: Basic Context Level 2: Level 1 + Supports Sightings CybOX   Level 1: Supports File Object   File_Path field Hashes field Level 2: Level 1 + Supports Windows Registry Key Object Network Indicator Sharing TTP/Malware Characterization Sharing   Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets Regards, Ivan From:   Terry MacDonald < terry.macdonald@threatloop.com > Date:   Tuesday, July 7, 2015 at 7:26 PM To:   Bret Jordan < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed.   I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.   I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.   More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings   Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.   Dave ________________________________________ From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger;   cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 4.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 09:52




    I'm not sure we want to involve IANA, hard to see this fitting into their bailiwick.  But I completely agree that it should be public and stable.


    As much work as it is moving everything to OASIS (not knocking them, it just _is_), I hope to $deity I'm retired before the standards move anywhere else.






    Cheers,
    Trey
    --
    Trey Darley

    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com








    From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> on behalf of Eric Burger <Eric.Burger@georgetown.edu>
    Sent: Monday, July 13, 2015 11:47
    To: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
     

    That would be reasonable, as long as it is publicly available and does not move around (e.g.,
    mitre.org  ->
    oasis.org ). Could be IANA if we really wanted it to stick around.



    On Jul 13, 2015, at 5:39 AM, Trey Darley < trey@soltra.com > wrote:



    What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? 





    Cheers,
    Trey
    --
    Trey Darley

    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com








    From:   cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Eric Burger < Eric.Burger@georgetown.edu >
    Sent:   Monday, July 13, 2015 11:25
    To:   cti@lists.oasis-open.org
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs
     

    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.


    One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the
    list, is they do   everything .


    Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information,
    that is the phishing application that runs on STIX and CybOX with features A, R, and S.


    A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations
    offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed.


    Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo.



    On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:



    I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols
    that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles
    may not be in any way relevant to that product class, and the product class will likely never support any more as a result.  

    This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products.

    * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer
    products not being able to support the full set of all possible CybOX objects and their operators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security     www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown  


    <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox

    From:   Mark Clancy < mclancy@soltra.com >
    To:   Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu >
    Cc:   " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date:   2015/07/09 01:38 PM
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by:   < cti@lists.oasis-open.org >





    Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do?
    Does it consume specific data, does it publish specific data, or does it aggregate/link all data ?

    The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined
    in the profile may well be the maximum content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry
    keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity
    curve.  

    The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that
    another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure.

    So what the heck should we do?

    We need to put life into the STIX profiles.
    We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.  

    For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation
    by their suppliers.

    -Mark

    Mark Clancy
    Chief Executive Officer
    SOLTRA     An FS-ISAC
    and DTCC Company
    +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44
    7823 626 535   UK   mobile
    mclancy@soltra.com     soltra.com

    One organization's incident becomes everyone's defense.

    ?




    From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org >
    on behalf of Terry MacDonald < terry.macdonald@threatloop.com >
    Sent:   Wednesday, July 8, 2015 8:26 PM
    To:   Eric Burger
    Cc:   cti@lists.oasis-open.org
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs  

    Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.  

    Cheers

    Terry MacDonald   STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E:   terry.macdonald@threatloop.com
    W:   www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu >
    wrote:

    I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No
    matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes
    the product more attractive to customers.  

    We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what
    people want to build.

    So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which
    of the optional components of the CTI suite a product needs to have to meaningfully address the use case.  



    On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org >
    wrote:

    +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues.

    sean

    From:   Patrick Maroney < Pmaroney@Specere.org >
    Date:   Wednesday, July 8, 2015 at 12:45 PM
    To:   "Barnum, Sean D." < sbarnum@mitre.org >,
    Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as
    a method to help manage complexity, interoperability, different world views, use cases, etc.,  

    We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard"
    STIX Profiles and then use these and iterate over them to revise or create new Community "Standard" STIX Profiles.

    Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase:

    (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner.  

    (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways.

    I have always agreed with these objectives.  

    However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what
    I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).  

    Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX
    Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough
    I might quip that Einstein was quite legitimately seeking similar unification ;-).

    Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this
    proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions
    to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away
    here is:   You only describe what you need and nothing more.


    Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration :

    Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her
    horizons, we can eventually remove the Training Wheels.


    I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions
    on complexity, interoperability, maturity levels, impediments, to adoption, etc.

    Patrick Maroney
    Office: (856)983-0001
    Cell:: (609)841-5104
    Email:   pmaroney@specere.org

    From:   < cti@lists.oasis-open.org >
    on behalf of Sean Barnum < sbarnum@mitre.org >
    Date:   Wednesday, July 8, 2015 at 10:15 AM
    To:   "Kirillov, Ivan A." < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    +!
    I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading.

    sean

    From:   <Kirillov>, Steve Cell < ikirillov@mitre.org >
    Date:   Wednesday, July 8, 2015 at 8:35 AM
    To:   Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one
    has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have
    to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).  

    Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined
    independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g.,


    Indicator Characterization/Sharing  


    Host-based Indicator Sharing  


    STIX  


    Level 1: Basic Context Level 2: Level 1 + Supports Sightings

    CybOX  


    Level 1: Supports File Object  


    File_Path field Hashes field

    Level 2: Level 1 + Supports Windows Registry Key Object



    Network Indicator Sharing

    TTP/Malware Characterization Sharing  


    Basic TTP/Malware Characterization



    Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity
    levels, I’d recommend limiting the number of levels to 3 to keep things sane:


    Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets


    Regards,
    Ivan

    From:   Terry MacDonald < terry.macdonald@threatloop.com >
    Date:   Tuesday, July 7, 2015 at 7:26 PM
    To:   Bret Jordan < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    I agree. I like the way this is headed.  

    I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align
    as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX
    compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently.

    Cheers

    Terry MacDonald   STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E:   terry.macdonald@threatloop.com
    W:   www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com >
    wrote:
    The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.  

    I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?"


    Thanks,

    Bret



    Bret Jordan CISSP  
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."  


    On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us >
    wrote:

    Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.  

    More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example)
    as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to.

    Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables)
    Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc.
    Level 3: In addition to level 2, adds support for Sightings  
    Level 4: In addition to level 3, adds all STIX and CybOx object types.
    Level 5: In addition to level 4, adds support for STIX object updates and Revocation


    Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.  


    Dave


    ________________________________________
    From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org >
    on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV >
    Sent: Monday, July 6, 2015 1:09 PM
    To: Eric Burger;   cti@lists.oasis-open.org
    Subject: RE: [cti] CTI TC Adoption and Interoperability SCs

    I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would
    need to tackle.




  • 5.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 12:29
    That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From: Trey Darley <trey@soltra.com> To: Eric Burger <Eric.Burger@georgetown.edu>, "cti@lists.oasis-open.org" <cti@lists.oasis-open.org> Date: 2015/07/13 06:40 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: <cti@lists.oasis-open.org> What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> on behalf of Eric Burger <Eric.Burger@georgetown.edu> Sent: Monday, July 13, 2015 11:25 To: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and iterate over them to revise or create new Community "Standard" STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner. (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: "Kirillov, Ivan A." < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., Indicator Characterization/Sharing Host-based Indicator Sharing STIX Level 1: Basic Context Level 2: Level 1 + Supports Sightings CybOX Level 1: Supports File Object File_Path field Hashes field Level 2: Level 1 + Supports Windows Registry Key Object Network Indicator Sharing TTP/Malware Characterization Sharing Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?" Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 6.  RE: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 13:04




    I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify
    a STIX Profile.
     
    That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer
    the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty
    close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).
     
    Thank you.
    -Mark
     


    From: cti@lists.oasis-open.org [mailto:cti@lists.oasis-open.org]
    On Behalf Of Jason Keirstead
    Sent: Monday, July 13, 2015 8:27 AM
    To: Trey Darley
    Cc: Eric Burger; cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs


     
    That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    Trey
    Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som

    From: Trey Darley < trey@soltra.com >
    To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date: 2015/07/13 06:40 AM
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by: < cti@lists.oasis-open.org >







    What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?


    Cheers,
    Trey
    --
    Trey Darley
    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com






    From:
    cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu >
    Sent: Monday, July 13, 2015 11:25
    To: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs


    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.


    One of the great features of STIX and CybOX is they do
    everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do
    everything .

    Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B,
    D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S.

    A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A,
    T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side
    barfed.

    Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities
    in terms of DDoS, phishing, and foo.
    On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com >
    wrote:

    I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust
    protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other
    profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.


    This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products.

    * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer
    products not being able to support the full set of all possible CybOX objects and their operators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox

    From: Mark Clancy < mclancy@soltra.com >
    To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu >
    Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date: 2015/07/09 01:38 PM
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by: < cti@lists.oasis-open.org >







    Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do?
    Does it consume specific data, does it publish specific data, or does it aggregate/link all data ?

    The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum
    content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the
    other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.


    The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it
    left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure.

    So what the heck should we do?

    We need to put life into the STIX profiles.
    We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.


    For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers.

    -Mark

    Mark Clancy
    Chief Executive Officer
    SOLTRA
    An FS-ISAC and DTCC Company
    +1.813.470.2400 office

    +1.610.659.6671 US
    mobile
    ?
    +44 7823 626 535
    UK mobile
    mclancy@soltra.com

    soltra.com

    One organization's incident becomes everyone's defense.

    ?






    From:
    cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Terry MacDonald < terry.macdonald@threatloop.com >
    Sent: Wednesday, July 8, 2015 8:26 PM
    To: Eric Burger
    Cc: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs


    Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.


    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu >
    wrote:

    I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product
    manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled
    products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.


    We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build.

    So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite
    a product needs to have to meaningfully address the use case.
    On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org >
    wrote:

    +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues.

    sean

    From: Patrick Maroney < Pmaroney@Specere.org >
    Date: Wednesday, July 8, 2015 at 12:45 PM
    To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard"
    < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I may be missing something here and have been hesitating throwing in my usual advocacy for
    STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc.,


    We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and
    iterate over them to revise or create new Community "Standard" STIX Profiles.

    Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase:
    (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this
    manner.

    (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways.

    I have always agreed with these objectives.

    However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex),
    and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).


    Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be
    established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein was quite legitimately seeking
    similar unification ;-).

    Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.
    this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.
    This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package,
    (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more.


    Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration :
    Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things,
    makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels.

    I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity
    levels, impediments, to adoption, etc.

    Patrick Maroney
    Office: (856)983-0001
    Cell:: (609)841-5104
    Email: pmaroney@specere.org

    From: < cti@lists.oasis-open.org > on behalf of Sean
    Barnum < sbarnum@mitre.org >
    Date: Wednesday, July 8, 2015 at 10:15 AM
    To: "Kirillov, Ivan A." < ikirillov@mitre.org >, Terry MacDonald
    < terry.macdonald@threatloop.com >, "Jordan, Bret"
    < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    +!
    I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading.

    sean

    From: <Kirillov>, Steve Cell < ikirillov@mitre.org >
    Date: Wednesday, July 8, 2015 at 8:35 AM
    To: Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard"
    < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold
    with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object?
    Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).


    Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or
    CybOX as appropriate ). I could envision this as a taxonomy, e.g.,

    ·         
    Indicator Characterization/Sharing


    ·         
    Host-based Indicator Sharing


    ·         
    STIX


    ·         
    Level 1: Basic Context

    ·         
    Level 2: Level 1 + Supports Sightings

    ·         
    CybOX


    ·         
    Level 1: Supports File Object


    ·         
    File_Path field

    ·         
    Hashes field

    ·         
    Level 2: Level 1 + Supports Windows Registry Key Object

    ·         
    Network Indicator Sharing

    ·         
    TTP/Malware Characterization Sharing


    ·         
    Basic TTP/Malware Characterization
    Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they
    need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane:


    ·         
    Level 1: minimal support – very basic, incomplete support

    ·         
    Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case)

    ·         
    Level 3: full support – fully supports the use case, in all facets

    Regards,
    Ivan

    From: Terry MacDonald < terry.macdonald@threatloop.com >
    Date: Tuesday, July 7, 2015 at 7:26 PM
    To: Bret Jordan < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I agree. I like the way this is headed.

    I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with
    the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all
    CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently.

    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com >
    wrote:
    The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.


    I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?"


    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

    On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us >
    wrote:

    Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.


    More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example)
    as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to.

    Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables)
    Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc.
    Level 3: In addition to level 2, adds support for Sightings
    Level 4: In addition to level 3, adds all STIX and CybOx object types.
    Level 5: In addition to level 4, adds support for STIX object updates and Revocation


    Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.



    Dave


    ________________________________________
    From: cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV >
    Sent: Monday, July 6, 2015 1:09 PM
    To: Eric Burger; cti@lists.oasis-open.org
    Subject: RE: [cti] CTI TC Adoption and Interoperability SCs

    I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would
    need to tackle.




  • 7.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 14:42
    I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol.  Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it.  In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are harmful  as a protocol mechanism. * Notice that profiles only tell folks what optional  (SHOULD, MAY) features need to be there. Of course, all mandatory  features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile.   That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).   Thank you. -Mark   From: cti@lists.oasis-open.org [ mailto:cti@lists.oasis-open.org ] On Behalf Of Jason Keirstead Sent: Monday, July 13, 2015 8:27 AM To: Trey Darley Cc: Eric Burger; cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs   That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From: Trey Darley < trey@soltra.com > To: Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/13 06:40 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent: Monday, July 13, 2015 11:25 To: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner. (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., ·          Indicator Characterization/Sharing ·          Host-based Indicator Sharing ·          STIX ·          Level 1: Basic Context ·          Level 2: Level 1 + Supports Sightings ·          CybOX ·          Level 1: Supports File Object ·          File_Path field ·          Hashes field ·          Level 2: Level 1 + Supports Windows Registry Key Object ·          Network Indicator Sharing ·          TTP/Malware Characterization Sharing ·          Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: ·          Level 1: minimal support – very basic, incomplete support ·          Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) ·          Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 8.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 15:58
    Eric - I hear what you are saying below, but the major problem I see with this approach is as follows: If profiles are only used for product branding/marketing/certification purposes and not by the protocol itself, then there is no guarantee that a solution is implementing a profile as advertised. Whereas, if profile negotiation is part of TAXII, then I can be assured that someone advertising they support Profile A actually supports it, as it is actually part of the protocol. Unless you foresee some certification body tasked with certifying that someone who advertises Profile A implements all the objects required for that profile? This seems like it would be something that would fall outside OASIS scope. Without such a certification process, then having profiles exist without being part of the protocol is a recipe for a real interoperability mess where Vendor A and B both claim to support the profile, even though they can not communicate. This is the type of thing that for example classically made UPNP AV profiles so problematic... two vendors claimed to support a profile yet the profiles had incompatible implementations so the devices could not talk to eachother. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Eric Burger ---2015/07/13 11:41:56 AM---I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the From: Eric Burger <Eric.Burger@georgetown.edu> To: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org> Date: 2015/07/13 11:41 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: <cti@lists.oasis-open.org> I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol. Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it. In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are harmful as a protocol mechanism. * Notice that profiles only tell folks what optional (SHOULD, MAY) features need to be there. Of course, all mandatory features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile. That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this). Thank you. -Mark From: cti@lists.oasis-open.org [ mailto:cti@lists.oasis-open.org ] On Behalf Of Jason Keirstead Sent: Monday, July 13, 2015 8:27 AM To: Trey Darley Cc: Eric Burger; cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From: Trey Darley < trey@soltra.com > To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/13 06:40 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent: Monday, July 13, 2015 11:25 To: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and iterate over them to revise or create new Community "Standard" STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner. (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: "Kirillov, Ivan A." < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., · Indicator Characterization/Sharing · Host-based Indicator Sharing · STIX · Level 1: Basic Context · Level 2: Level 1 + Supports Sightings · CybOX · Level 1: Supports File Object · File_Path field · Hashes field · Level 2: Level 1 + Supports Windows Registry Key Object · Network Indicator Sharing · TTP/Malware Characterization Sharing · Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: · Level 1: minimal support – very basic, incomplete support · Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) · Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?" Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 9.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 16:22
    I would offer the scenario described below is something the market should fix, not OASIS. Companies will quickly enough learn either the importance of interoperability or, if they grab enough market share, they can ignore interoperability because at that point people will code to the dominant implementation anyway. I would rather setup the governance of the technology in such a way that the technology meets yesterday’s and, with cooperation, today’s needs, not the needs of three years prior.  We could always contract with folks to setup testing labs. What comes to mind is Telcordia and NEBS. That was a very effective way for the RBOCs to know their telephone switching equipment would interoperate and meet stringent safety and security standards. More important, NEBS was an extremely effective way for the large network equipment manufacturers to quash innovation and make the market inaccessible for new entrants. The interoperability goal failed. Even with NEBS certification, multivendor switching equipment networks did not interoperate without a few months hacking the the RBOCs labs. But it did succeed for a while in keeping out pesky small innovators. On Jul 13, 2015, at 11:54 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: Eric - I hear what you are saying below, but the major problem I see with this approach is as follows: If profiles are only used for product branding/marketing/certification purposes and not by the protocol itself, then there is no guarantee that a solution is implementing a profile as advertised. Whereas, if profile negotiation is part of TAXII, then I can be assured that someone advertising they support Profile A actually supports it, as it is actually part of the protocol. Unless you foresee some certification body tasked with certifying that someone who advertises Profile A implements all the objects required for that profile? This seems like it would be something that would fall outside OASIS scope. Without such a certification process, then having profiles exist without being part of the protocol is a recipe for a real interoperability mess where Vendor A and B both claim to support the profile, even though they can not communicate. This is the type of thing that for example classically made UPNP AV profiles so problematic... two vendors claimed to support a profile yet the profiles had incompatible implementations so the devices could not talk to eachother. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Eric Burger ---2015/07/13 11:41:56 AM---I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the From: Eric Burger < Eric.Burger@georgetown.edu > To: cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/13 11:41 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol. Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it. In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are harmful as a protocol mechanism. * Notice that profiles only tell folks what optional (SHOULD, MAY) features need to be there. Of course, all mandatory features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile. That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this). Thank you. -Mark From: cti@lists.oasis-open.org [ mailto:cti@lists.oasis-open.org ] On Behalf Of Jason Keirstead Sent: Monday, July 13, 2015 8:27 AM To: Trey Darley Cc: Eric Burger; cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From: Trey Darley < trey@soltra.com > To: Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/13 06:40 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent: Monday, July 13, 2015 11:25 To: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner. (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., · Indicator Characterization/Sharing · Host-based Indicator Sharing · STIX · Level 1: Basic Context · Level 2: Level 1 + Supports Sightings · CybOX · Level 1: Supports File Object · File_Path field · Hashes field · Level 2: Level 1 + Supports Windows Registry Key Object · Network Indicator Sharing · TTP/Malware Characterization Sharing · Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: · Level 1: minimal support – very basic, incomplete support · Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) · Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 10.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 16:19
    Wow we have gotten off in to the weeds quickly.  Might I suggest that before we build the Autobahn and the Golden Gate Bridge, that we first learn how to ride a horse? All I would like to see for Phase 1 of this is high level compatibly statements .  Something like---- For STIX: Does your product support: 1) Data marking / handing 2) Information source integrity 3) The required fields from a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables 4) Do you have a UI for STIX generation 5) Do you support STIX Profile processing at all For TAXII: Does your product support: 1) Discovery Services 2) Collection Services 3) Subscription Services 4) Poll Services 5) Inbox Services 6) Data Feeds 7) Data Collections 8) Authentication  9) Two-factor Authentication 10) Delete Requests Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 08:41, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol.  Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it.  In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are   harmful  as a protocol mechanism. * Notice that profiles only tell folks what   optional  (SHOULD, MAY) features need to be there. Of course, all   mandatory  features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile.   That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).   Thank you. -Mark   From:   cti@lists.oasis-open.org   [ mailto:cti@lists.oasis-open.org ]   On Behalf Of   Jason Keirstead Sent:   Monday, July 13, 2015 8:27 AM To:   Trey Darley Cc:   Eric Burger;   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From:   Trey Darley < trey@soltra.com > To:   Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/13 06:40 AM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?   Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent:   Monday, July 13, 2015 11:25 To:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.   One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do   everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.   This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From:   Mark Clancy < mclancy@soltra.com > To:   Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc:   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/09 01:38 PM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.   The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.   For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA     An FS-ISAC and DTCC Company +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44 7823 626 535   UK   mobile mclancy@soltra.com     soltra.com One organization's incident becomes everyone's defense. ? From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent:   Wednesday, July 8, 2015 8:26 PM To:   Eric Burger Cc:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.   Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.   We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case.   On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From:   Patrick Maroney < Pmaroney@Specere.org > Date:   Wednesday, July 8, 2015 at 12:45 PM To:   Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as a method to help manage complexity, interoperability, different world views, use cases, etc.,   We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner.   (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives.   However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).   Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:   You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email:   pmaroney@specere.org From:   < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date:   Wednesday, July 8, 2015 at 10:15 AM To:   Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From:   <Kirillov>, Steve Cell < ikirillov@mitre.org > Date:   Wednesday, July 8, 2015 at 8:35 AM To:   Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).   Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., ·            Indicator Characterization/Sharing ·            Host-based Indicator Sharing ·            STIX ·            Level 1: Basic Context ·            Level 2: Level 1 + Supports Sightings ·            CybOX ·            Level 1: Supports File Object ·            File_Path field ·            Hashes field ·            Level 2: Level 1 + Supports Windows Registry Key Object ·            Network Indicator Sharing ·            TTP/Malware Characterization Sharing ·            Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: ·            Level 1: minimal support – very basic, incomplete support ·            Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) ·            Level 3: full support – fully supports the use case, in all facets Regards, Ivan From:   Terry MacDonald < terry.macdonald@threatloop.com > Date:   Tuesday, July 7, 2015 at 7:26 PM To:   Bret Jordan < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed.   I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.   I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.   More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings   Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.   Dave ________________________________________ From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger;   cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 11.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 16:35
    Agreed. It will also be telling if people are not implementing the required fields. Either that means the fields really are not required, we are not being clear enough on why (or what) they are required, or the implementation is simply “not CTI”. On the STIX side, see below. On Jul 13, 2015, at 12:18 PM, Jordan, Bret < bret.jordan@bluecoat.com > wrote: Wow we have gotten off in to the weeds quickly.  Might I suggest that before we build the Autobahn and the Golden Gate Bridge, that we first learn how to ride a horse? All I would like to see for Phase 1 of this is high level compatibly statements .  Something like---- For STIX: Does your product support: 1) Data marking / handing 2) Information source integrity 3) The required fields from a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables 4) Do you have a UI for STIX generation If all I do is receive and correlate STIX, then I can be fully compliant yet not do the fancy GUI.  5) Do you support STIX Profile processing at all Since we do not have profiles (yet), one would be hard pressed to say one does “profile processing.” Likewise, what would profile processing look like? I would offer the relevant question is “can you {process, generate} STIX Profile A, B, C, … For TAXII: Does your product support: 1) Discovery Services 2) Collection Services 3) Subscription Services 4) Poll Services 5) Inbox Services 6) Data Feeds 7) Data Collections 8) Authentication  9) Two-factor Authentication 10) Delete Requests Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 08:41, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol.  Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it.  In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are   harmful  as a protocol mechanism. * Notice that profiles only tell folks what   optional  (SHOULD, MAY) features need to be there. Of course, all   mandatory  features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile.   That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).   Thank you. -Mark   From:   cti@lists.oasis-open.org   [ mailto:cti@lists.oasis-open.org ]   On Behalf Of   Jason Keirstead Sent:   Monday, July 13, 2015 8:27 AM To:   Trey Darley Cc:   Eric Burger;   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From:   Trey Darley < trey@soltra.com > To:   Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/13 06:40 AM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?   Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent:   Monday, July 13, 2015 11:25 To:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.   One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do   everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.   This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From:   Mark Clancy < mclancy@soltra.com > To:   Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc:   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/09 01:38 PM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.   The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.   For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA     An FS-ISAC and DTCC Company +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44 7823 626 535   UK   mobile mclancy@soltra.com     soltra.com One organization's incident becomes everyone's defense. ? From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent:   Wednesday, July 8, 2015 8:26 PM To:   Eric Burger Cc:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.   Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.   We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case.   On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From:   Patrick Maroney < Pmaroney@Specere.org > Date:   Wednesday, July 8, 2015 at 12:45 PM To:   Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as a method to help manage complexity, interoperability, different world views, use cases, etc.,   We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner.   (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives.   However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).   Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:   You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email:   pmaroney@specere.org From:   < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date:   Wednesday, July 8, 2015 at 10:15 AM To:   Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From:   <Kirillov>, Steve Cell < ikirillov@mitre.org > Date:   Wednesday, July 8, 2015 at 8:35 AM To:   Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).   Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., ·            Indicator Characterization/Sharing ·            Host-based Indicator Sharing ·            STIX ·            Level 1: Basic Context ·            Level 2: Level 1 + Supports Sightings ·            CybOX ·            Level 1: Supports File Object ·            File_Path field ·            Hashes field ·            Level 2: Level 1 + Supports Windows Registry Key Object ·            Network Indicator Sharing ·            TTP/Malware Characterization Sharing ·            Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: ·            Level 1: minimal support – very basic, incomplete support ·            Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) ·            Level 3: full support – fully supports the use case, in all facets Regards, Ivan From:   Terry MacDonald < terry.macdonald@threatloop.com > Date:   Tuesday, July 7, 2015 at 7:26 PM To:   Bret Jordan < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed.   I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.   I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.   More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings   Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.   Dave ________________________________________ From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger;   cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 12.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 16:38
    Great points Eric, and I agree with your changes / modifications to my statements.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 10:34, Eric Burger < Eric.Burger@georgetown.edu > wrote: Agreed. It will also be telling if people are not implementing the required fields. Either that means the fields really are not required, we are not being clear enough on why (or what) they are required, or the implementation is simply “not CTI”. On the STIX side, see below. On Jul 13, 2015, at 12:18 PM, Jordan, Bret < bret.jordan@bluecoat.com > wrote: Wow we have gotten off in to the weeds quickly.  Might I suggest that before we build the Autobahn and the Golden Gate Bridge, that we first learn how to ride a horse? All I would like to see for Phase 1 of this is high level compatibly statements .  Something like---- For STIX: Does your product support: 1) Data marking / handing 2) Information source integrity 3) The required fields from a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables 4) Do you have a UI for STIX generation If all I do is receive and correlate STIX, then I can be fully compliant yet not do the fancy GUI.  5) Do you support STIX Profile processing at all Since we do not have profiles (yet), one would be hard pressed to say one does “profile processing.” Likewise, what would profile processing look like? I would offer the relevant question is “can you {process, generate} STIX Profile A, B, C, … For TAXII: Does your product support: 1) Discovery Services 2) Collection Services 3) Subscription Services 4) Poll Services 5) Inbox Services 6) Data Feeds 7) Data Collections 8) Authentication  9) Two-factor Authentication 10) Delete Requests Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 08:41, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol.  Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it.  In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are   harmful  as a protocol mechanism. * Notice that profiles only tell folks what   optional  (SHOULD, MAY) features need to be there. Of course, all   mandatory  features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile.   That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).   Thank you. -Mark   From:   cti@lists.oasis-open.org   [ mailto:cti@lists.oasis-open.org ]   On Behalf Of   Jason Keirstead Sent:   Monday, July 13, 2015 8:27 AM To:   Trey Darley Cc:   Eric Burger;   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From:   Trey Darley < trey@soltra.com > To:   Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/13 06:40 AM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?   Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent:   Monday, July 13, 2015 11:25 To:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.   One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do   everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a maturity scale - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.   This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to know what to expect when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From:   Mark Clancy < mclancy@soltra.com > To:   Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc:   cti@lists.oasis-open.org < cti@lists.oasis-open.org > Date:   2015/07/09 01:38 PM Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Sent by:   < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of X is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.   The downside of a maturity scale is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.   For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA     An FS-ISAC and DTCC Company +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44 7823 626 535   UK   mobile mclancy@soltra.com     soltra.com One organization's incident becomes everyone's defense. ? From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent:   Wednesday, July 8, 2015 8:26 PM To:   Eric Burger Cc:   cti@lists.oasis-open.org Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs   Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.   Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.   We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case.   On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From:   Patrick Maroney < Pmaroney@Specere.org > Date:   Wednesday, July 8, 2015 at 12:45 PM To:   Barnum, Sean D. < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,     cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as a method to help manage complexity, interoperability, different world views, use cases, etc.,   We've had almost identical conversations when defining the two initial Standard STIX Profiles (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven Standard STIX Profiles and then use these and iterate over them to revise or create new Community Standard STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given thing and similarly precise in how one interprets things expressed in this manner.   (2) The language should (must?) limit the ability to represent a given thing in multiple ways. I have always agreed with these objectives.   However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).   Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge One Ring to Rule Them All . Understand there are also those quite legitimately seeking a unified STIX package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:   You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our Little CTI out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email:   pmaroney@specere.org From:   < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date:   Wednesday, July 8, 2015 at 10:15 AM To:   Kirillov, Ivan A. < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From:   <Kirillov>, Steve Cell < ikirillov@mitre.org > Date:   Wednesday, July 8, 2015 at 8:35 AM To:   Terry MacDonald < terry.macdonald@threatloop.com >, Jordan, Bret < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Struse, Richard < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >,     cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).   Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., ·            Indicator Characterization/Sharing ·            Host-based Indicator Sharing ·            STIX ·            Level 1: Basic Context ·            Level 2: Level 1 + Supports Sightings ·            CybOX ·            Level 1: Supports File Object ·            File_Path field ·            Hashes field ·            Level 2: Level 1 + Supports Windows Registry Key Object ·            Network Indicator Sharing ·            TTP/Malware Characterization Sharing ·            Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: ·            Level 1: minimal support – very basic, incomplete support ·            Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) ·            Level 3: full support – fully supports the use case, in all facets Regards, Ivan From:   Terry MacDonald < terry.macdonald@threatloop.com > Date:   Tuesday, July 7, 2015 at 7:26 PM To:   Bret Jordan < bret.jordan@bluecoat.com > Cc:   David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis-open.org < cti@lists.oasis-open.org > Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed.   I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald   STIX, TAXII, CybOX Consultant M: +61-407-203-026 E:   terry.macdonald@threatloop.com W:   www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.   I often get asked by many a vendor, how much of STIX / TAXII do I need to implement to do XYZ? Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.   More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more qualitative aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings   Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.   Dave ________________________________________ From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger;   cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight suites of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 13.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:25



    Hi Eric,


    Just to clarify something mentioned below. "Since we do not have profiles (yet), one would be hard pressed to say one does “profile processing.”"
    We do currently have profiles and we do currently have “profile processing”. Many community members (including sharing communities that are CTI community members) are currently leveraging profiles. They specify them, share them and design their processes
    around them.


    There is a difference between:

    having the capability to specify, understand and leverage a profile 
    and 

    having a catalog/registry of officially blessed profiles and shared tooling implementations to process them


    The second is a great goal but is not required for using profiles.


    Does that make sense?


    sean






    From: Eric Burger < Eric.Burger@georgetown.edu >
    Date: Monday, July 13, 2015 at 12:34 PM
    To: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs





    Agreed. It will also be telling if people are not implementing the required fields. Either that means the fields really are not required, we are not being clear enough on why (or what) they are required, or the implementation is simply “not CTI”.


    On the STIX side, see below.






    On Jul 13, 2015, at 12:18 PM, Jordan, Bret < bret.jordan@bluecoat.com > wrote:



    Wow we have gotten off in to the weeds quickly.  Might I suggest that before we build the Autobahn and the Golden Gate Bridge, that we first learn how to ride a horse?


    All I would like to see for Phase 1 of this is "high level compatibly statements".  Something like----


    For STIX:


    Does your product support:
    1) Data marking / handing
    2) Information source integrity
    3) The required fields from
    a) Indicators
    b) Incidents
    c) Threat Actors
    d) Campaigns
    e) TTPs
    f) Course of Actions
    g) Exploit Targets
    h) Observables
    4) Do you have a UI for STIX generation





    If all I do is receive and correlate STIX, then I can be fully compliant yet not do the fancy GUI. 




    5) Do you support STIX Profile processing at all





    Since we do not have profiles (yet), one would be hard pressed to say one does “profile processing.” Likewise, what would profile processing look like? I would offer the relevant question is “can you {process, generate} STIX Profile A, B, C, …"








    For TAXII:


    Does your product support:
    1) Discovery Services
    2) Collection Services
    3) Subscription Services
    4) Poll Services
    5) Inbox Services
    6) Data Feeds
    7) Data Collections
    8) Authentication 
    9) Two-factor Authentication
    10) Delete Requests














    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Jul 13, 2015, at 08:41, Eric Burger < Eric.Burger@georgetown.edu > wrote:

    I
    am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol. 




    Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known,
    are in the registry, and are broadly implemented.




    Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4.




    If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power
    of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off.




    Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant
    six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it. 




    In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant.




    Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate
    for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an
    APT that targets the SBLM MIRV fire control system. Bad day for the world.




    All because we decided to negotiate profiles and not capabilities.




    Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to
    let them know what to build. However, profiles are   harmful  as a protocol mechanism.







    * Notice that profiles only tell folks what   optional  (SHOULD, MAY) features need to be there. Of course, all   mandatory  features are there.
    Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX.




    On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote:





    I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify
    a STIX Profile.

     

    That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer
    the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty
    close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this).

     

    Thank you.

    -Mark

     



    From:   cti@lists.oasis-open.org   [ mailto:cti@lists.oasis-open.org ]   On
    Behalf Of   Jason Keirstead
    Sent:   Monday, July 13, 2015 8:27 AM
    To:   Trey Darley
    Cc:   Eric Burger;   cti@lists.oasis-open.org
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs



     

    That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security     www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown  


    <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases,
    som

    From:   Trey Darley < trey@soltra.com >
    To:   Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date:   2015/07/13 06:40 AM
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by:   < cti@lists.oasis-open.org >







    What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?  

    Cheers,
    Trey
    --
    Trey Darley
    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com







    From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org >
    on behalf of Eric Burger < Eric.Burger@georgetown.edu >
    Sent:   Monday, July 13, 2015 11:25
    To:   cti@lists.oasis-open.org
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs  

    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.  

    One of the great features of STIX and CybOX is they do   everything . The biggest downside of STIX and CybOX, as evidenced by
    a number of the IETF references that have flown about on the list, is they do   everything .

    Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features
    A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S.

    A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses
    features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the
    other side barfed.

    Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated
    capabilities in terms of DDoS, phishing, and foo.

    On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com >
    wrote:

    I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are
    very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information
    in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result.  

    This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products.

    * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer
    products not being able to support the full set of all possible CybOX objects and their operators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security     www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown  


    <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox

    From:   Mark Clancy < mclancy@soltra.com >
    To:   Terry MacDonald < terry.macdonald@threatloop.com >,
    Eric Burger < Eric.Burger@georgetown.edu >
    Cc:   " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Date:   2015/07/09 01:38 PM
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by:   < cti@lists.oasis-open.org >







    Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do?
    Does it consume specific data, does it publish specific data, or does it aggregate/link all data ?

    The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum
    content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the
    other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.  

    The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it
    left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure.

    So what the heck should we do?

    We need to put life into the STIX profiles.
    We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.  

    For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers.

    -Mark

    Mark Clancy
    Chief Executive Officer
    SOLTRA     An
    FS-ISAC and DTCC Company
    +1.813.470.2400   office     +1.610.659.6671   US   mobile   ?   +44
    7823 626 535   UK   mobile
    mclancy@soltra.com     soltra.com

    One organization's incident becomes everyone's defense.

    ?







    From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org >
    on behalf of Terry MacDonald < terry.macdonald@threatloop.com >
    Sent:   Wednesday, July 8, 2015 8:26 PM
    To:   Eric Burger
    Cc:   cti@lists.oasis-open.org
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs  

    Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.  

    Cheers

    Terry MacDonald   STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E:   terry.macdonald@threatloop.com
    W:   www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu >
    wrote:

    I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying
    STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your
    products will seamlessly fit into the ecosystem, which makes the product more attractive to customers.  

    We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build.

    So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite
    a product needs to have to meaningfully address the use case.  

    On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org >
    wrote:

    +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues.

    sean

    From:   Patrick Maroney < Pmaroney@Specere.org >
    Date:   Wednesday, July 8, 2015 at 12:45 PM
    To:   "Barnum, Sean D." < sbarnum@mitre.org >,
    Steve Cell < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >,  
    " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    I may be missing something here and have been hesitating throwing in my usual advocacy for   STIX Profiles [Plus]   as a method to help manage complexity, interoperability,
    different world views, use cases, etc.,  

    We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and
    iterate over them to revise or create new Community "Standard" STIX Profiles.

    Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase:

    (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner.  

    (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways.


    I have always agreed with these objectives.  

    However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex),
    and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).  

    Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be
    established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein was quite legitimately
    seeking similar unification ;-).

    Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.   this proposed form of STIX Profile can
    be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.   This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e.,
    My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:   You
    only describe what you need and nothing more.


    Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration :

    Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue
    to expand her horizons, we can eventually remove the Training Wheels.


    I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity
    levels, impediments, to adoption, etc.

    Patrick Maroney
    Office: (856)983-0001
    Cell:: (609)841-5104
    Email:   pmaroney@specere.org

    From:   < cti@lists.oasis-open.org >
    on behalf of Sean Barnum < sbarnum@mitre.org >
    Date:   Wednesday, July 8, 2015 at 10:15 AM
    To:   "Kirillov, Ivan A." < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    +!
    I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading.

    sean

    From:   <Kirillov>, Steve Cell < ikirillov@mitre.org >
    Date:   Wednesday, July 8, 2015 at 8:35 AM
    To:   Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >,  
    " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold
    with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object?
    Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).  

    Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or
    CybOX as appropriate ). I could envision this as a taxonomy, e.g.,

    ·            Indicator
    Characterization/Sharing

    ·            Host-based
    Indicator Sharing

    ·            STIX

    ·            Level
    1: Basic Context

    ·            Level
    2: Level 1 + Supports Sightings

    ·            CybOX

    ·            Level
    1: Supports File Object

    ·            File_Path
    field

    ·            Hashes
    field

    ·            Level
    2: Level 1 + Supports Windows Registry Key Object

    ·            Network
    Indicator Sharing

    ·            TTP/Malware
    Characterization Sharing

    ·            Basic
    TTP/Malware Characterization

    Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go
    down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane:

    ·            Level
    1: minimal support – very basic, incomplete support

    ·            Level
    2: partial support – typical/average support (with what is commonly expected with regards to the use case)

    ·            Level
    3: full support – fully supports the use case, in all facets


    Regards,
    Ivan

    From:   Terry MacDonald < terry.macdonald@threatloop.com >
    Date:   Tuesday, July 7, 2015 at 7:26 PM
    To:   Bret Jordan < bret.jordan@bluecoat.com >
    Cc:   David Eilken < deilken@fsisac.us >,
    Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >,
    " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject:   Re: [cti] CTI TC Adoption and Interoperability SCs

    I agree. I like the way this is headed.  

    I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with
    the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all
    CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently.

    Cheers

    Terry MacDonald   STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E:   terry.macdonald@threatloop.com
    W:   www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com >
    wrote:
    The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.  

    I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?"


    Thanks,

    Bret



    Bret Jordan CISSP  
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

    On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us >
    wrote:

    Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.  

    More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example)
    as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to.

    Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables)
    Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc.
    Level 3: In addition to level 2, adds support for Sightings  
    Level 4: In addition to level 3, adds all STIX and CybOx object types.
    Level 5: In addition to level 4, adds support for STIX object updates and Revocation


    Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.  


    Dave


    ________________________________________
    From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org >
    on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV >
    Sent: Monday, July 6, 2015 1:09 PM
    To: Eric Burger;   cti@lists.oasis-open.org
    Subject: RE: [cti] CTI TC Adoption and Interoperability SCs

    I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would
    need to tackle.




  • 14.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:30
    Agreed. So everyone has it handy, visit  http://stixproject.github.io/documentation/profiles/ I was thinking of profiles as a protocol construct. What we have today is fine. On Jul 14, 2015, at 10:24 AM, Barnum, Sean D. < sbarnum@mitre.org > wrote: Hi Eric, Just to clarify something mentioned below. Since we do not have profiles (yet), one would be hard pressed to say one does “profile processing.” We do currently have profiles and we do currently have “profile processing”. Many community members (including sharing communities that are CTI community members) are currently leveraging profiles. They specify them, share them and design their processes around them. There is a difference between: having the capability to specify, understand and leverage a profile  and  having a catalog/registry of officially blessed profiles and shared tooling implementations to process them The second is a great goal but is not required for using profiles. Does that make sense? sean [snip] Attachment: smime.p7s Description: S/MIME cryptographic signature


  • 15.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:32
    I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say "my client supports this profile" and have the server say "OK that is supported by me, we will proceed" and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <cti@lists.oasis-open.org> wrote on 2015/07/14 11:24:37 AM: > From: "Barnum, Sean D." <sbarnum@mitre.org> > To: Eric Burger <Eric.Burger@georgetown.edu>, "cti@lists.oasis- > open.org" <cti@lists.oasis-open.org> > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: <cti@lists.oasis-open.org> > > Hi Eric, > > Just to clarify something mentioned below. "Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.”" > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them.




  • 16.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:44
    This is something that we will need to add to TAXII 2.0...  Eric / Jason, please give a detailed dump of what this should look and feel like on the CTI TAXII list so we can get working on this for TAXII 2.0 Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 14, 2015, at 08:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say my client supports this profile and have the server say OK that is supported by me, we will proceed and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: Barnum, Sean D. < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis - > open.org < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.” > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them. Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 17.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:49
    Will do, but not today. Looking at the end of next week for a proposal. On Jul 14, 2015, at 10:43 AM, Jordan, Bret < bret.jordan@bluecoat.com > wrote: This is something that we will need to add to TAXII 2.0...  Eric / Jason, please give a detailed dump of what this should look and feel like on the CTI TAXII list so we can get working on this for TAXII 2.0 Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 14, 2015, at 08:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say my client supports this profile and have the server say OK that is supported by me, we will proceed and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: Barnum, Sean D. < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis - > open.org < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.” > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them. Attachment: smime.p7s Description: S/MIME cryptographic signature


  • 18.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:48
    Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, but not to negotiate profiles. Let’s take a concrete example, both of what would be good and what would be bad. I will use the Simple Indicator Sharing Profile (SISP) as an example. It would be good for TAXII to say, “I require you to understand Indicator, Observable, and TTP,” as these are required elements in SISP. Depending on how we build the protocol, if the other side does not support those elements, it can either say, “Sorry, I don’t understand Indicator” or “Sorry, I cannot handle your request.” For the reasons I enumerated in earlier messages, it would be really bad for TAXII to say, “I require you to understand the Simple Indicator Sharing Profile.” Here is another reason I do not like profiles. The SISP says an Exploit Target is prohibited. What happens if I receive a nicely formatted, useful STIX object that has an Indicator, and Observable, a TTP, and an Exploit Target? If we are in profile land, the recipient rejects the perfectly good STIX document saying it does not match SISP. If this is the behavior we want, what we are saying is that profiles are not profiles of STIX. Rather, profiles are protocols that are different than STIX . There is no such thing as a STIX-compliant server. There are only profile-compliant servers. This would be a very bad thing for STIX - for all practical purposes it means that STIX does what it does today, and will be quickly ignored. The other reason I do not like profiles is if a developer only needs SISP support, they are highly likely to take what might appear to be sensible shortcuts and not bother implementing or looking for Exploit Target objects. They are building a SISP machine, not a STIX machine. Then, when that server goes into the real world and receives a real STIX document, it core dumps. Not the best behavior for a security related product. I know, no one on this list would ever  take that shortcut. However, we cannot control what the broader market (including other divisions of your company) will implement. Let us not boldly go where we know we will stub our toe! On Jul 14, 2015, at 10:30 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say my client supports this profile and have the server say OK that is supported by me, we will proceed and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: Barnum, Sean D. < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, cti@lists.oasis - > open.org < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.” > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them. Attachment: smime.p7s Description: S/MIME cryptographic signature


  • 19.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 14:59
    At this point, I am open to any form of negotiation, either at the profile level or as Eric prefers the object level... as long as there is some way to do it. I am not sure the current excel spreadsheet mechanism will translate to TAXII very well (maybe it will?) As Bret suggested though we should probably move this to the TAXII mailing list - maybe this is a good topic for the first TAXII subcommittee meeting, whenever that occurs. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Eric Burger ---2015/07/14 11:48:06 AM---Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, bu From: Eric Burger <Eric.Burger@georgetown.edu> To: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org> Date: 2015/07/14 11:48 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: <cti@lists.oasis-open.org> Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, but not to negotiate profiles. Let’s take a concrete example, both of what would be good and what would be bad. I will use the Simple Indicator Sharing Profile (SISP) as an example. It would be good for TAXII to say, “I require you to understand Indicator, Observable, and TTP,” as these are required elements in SISP. Depending on how we build the protocol, if the other side does not support those elements, it can either say, “Sorry, I don’t understand Indicator” or “Sorry, I cannot handle your request.” For the reasons I enumerated in earlier messages, it would be really bad for TAXII to say, “I require you to understand the Simple Indicator Sharing Profile.” Here is another reason I do not like profiles. The SISP says an Exploit Target is prohibited. What happens if I receive a nicely formatted, useful STIX object that has an Indicator, and Observable, a TTP, and an Exploit Target? If we are in profile land, the recipient rejects the perfectly good STIX document saying it does not match SISP. If this is the behavior we want, what we are saying is that profiles are not profiles of STIX. Rather, profiles are protocols that are different than STIX . There is no such thing as a STIX-compliant server. There are only profile-compliant servers. This would be a very bad thing for STIX - for all practical purposes it means that STIX does what it does today, and will be quickly ignored. The other reason I do not like profiles is if a developer only needs SISP support, they are highly likely to take what might appear to be sensible shortcuts and not bother implementing or looking for Exploit Target objects. They are building a SISP machine, not a STIX machine. Then, when that server goes into the real world and receives a real STIX document, it core dumps. Not the best behavior for a security related product. I know, no one on this list would ever take that shortcut. However, we cannot control what the broader market (including other divisions of your company) will implement. Let us not boldly go where we know we will stub our toe!
    On Jul 14, 2015, at 10:30 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say "my client supports this profile" and have the server say "OK that is supported by me, we will proceed" and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: "Barnum, Sean D." < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis - > open.org " < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. "Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.”" > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them.





  • 20.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 16:25
    Great discourse folks.  In my advocacy for extension and application of STIX Profiles as a method for addressing a number of challenges under discussion, it was not my intent that they needed to be integrated into TAXII.  Original intent was that STIX Profiles would be defined/exchanged/negotiated as part of the Information Sharing Partnership Agreements. (tabling any discussion on the CISPA concept for now). However,  To the extent that we can envision implementation specific details like a library of Community Consensus STIX Profiles that Consumers, Vendors, and Service Providers could leverage,  then definition of  STIX Profile Queries and inter-exchange methods within the normative standards makes sense.  For example a specific STIX Profile (or list of available profiles) could be something a subscriber would request from a provider via TAXII and perhaps referenced in a subscription (hadn't thought this through to this extent yet).  Note: none of these musings are intended as assertions. Patrick Maroney Office:  (856)983-0001 Cell::     (609)841-5104 Email:   pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Jason Keirstead < Jason.Keirstead@ca.ibm.com > Date: Tuesday, July 14, 2015 at 10:57 AM To: Eric Burger < Eric.Burger@georgetown.edu > Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs At this point, I am open to any form of negotiation, either at the profile level or as Eric prefers the object level... as long as there is some way to do it. I am not sure the current excel spreadsheet mechanism will translate to TAXII very well (maybe it will?) As Bret suggested though we should probably move this to the TAXII mailing list - maybe this is a good topic for the first TAXII subcommittee meeting, whenever that occurs. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Eric Burger ---2015/07/14 11:48:06 AM---Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, bu From: Eric Burger < Eric.Burger@georgetown.edu > To: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/14 11:48 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, but not to negotiate profiles. Let’s take a concrete example, both of what would be good and what would be bad. I will use the Simple Indicator Sharing Profile (SISP) as an example. It would be good for TAXII to say, “I require you to understand Indicator, Observable, and TTP,” as these are required elements in SISP. Depending on how we build the protocol, if the other side does not support those elements, it can either say, “Sorry, I don’t understand Indicator” or “Sorry, I cannot handle your request.” For the reasons I enumerated in earlier messages, it would be really bad for TAXII to say, “I require you to understand the Simple Indicator Sharing Profile.” Here is another reason I do not like profiles. The SISP says an Exploit Target is prohibited. What happens if I receive a nicely formatted, useful STIX object that has an Indicator, and Observable, a TTP, and an Exploit Target? If we are in profile land, the recipient rejects the perfectly good STIX document saying it does not match SISP. If this is the behavior we want, what we are saying is that profiles are not profiles of STIX. Rather, profiles are protocols that are different than STIX . There is no such thing as a STIX-compliant server. There are only profile-compliant servers. This would be a very bad thing for STIX - for all practical purposes it means that STIX does what it does today, and will be quickly ignored. The other reason I do not like profiles is if a developer only needs SISP support, they are highly likely to take what might appear to be sensible shortcuts and not bother implementing or looking for Exploit Target objects. They are building a SISP machine, not a STIX machine. Then, when that server goes into the real world and receives a real STIX document, it core dumps. Not the best behavior for a security related product. I know, no one on this list would ever take that shortcut. However, we cannot control what the broader market (including other divisions of your company) will implement. Let us not boldly go where we know we will stub our toe! On Jul 14, 2015, at 10:30 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say "my client supports this profile" and have the server say "OK that is supported by me, we will proceed" and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: "Barnum, Sean D." < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis - > open.org " < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. "Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.”" > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them.


  • 21.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-20-2015 04:10
    Here is a brief reference to a methodology that we've discussed before in the community (Apache Avro).  Hopefully it's relevancy to our current discourse on several related items is self evident (STIX Profiles, Protocol Buffers, maximizing effective information transfer while minimizing loading of the and delays over the transmission channels, etc.). https://avro.apache.org/docs/current/ Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org On Tue, Jul 14, 2015 at 9:25 AM -0700, "Patrick Maroney" < Pmaroney@Specere.org > wrote: Great discourse folks.  In my advocacy for extension and application of STIX Profiles as a method for addressing a number of challenges under discussion, it was not my intent that they needed to be integrated into TAXII.  Original intent was that STIX Profiles would be defined/exchanged/negotiated as part of the Information Sharing Partnership Agreements. (tabling any discussion on the CISPA concept for now). However,  To the extent that we can envision implementation specific details like a library of Community Consensus STIX Profiles that Consumers, Vendors, and Service Providers could leverage,  then definition of  STIX Profile Queries and inter-exchange methods within the normative standards makes sense.  For example a specific STIX Profile (or list of available profiles) could be something a subscriber would request from a provider via TAXII and perhaps referenced in a subscription (hadn't thought this through to this extent yet).  Note: none of these musings are intended as assertions. Patrick Maroney Office:  (856)983-0001 Cell::     (609)841-5104 Email:   pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Jason Keirstead < Jason.Keirstead@ca.ibm.com > Date: Tuesday, July 14, 2015 at 10:57 AM To: Eric Burger < Eric.Burger@georgetown.edu > Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs At this point, I am open to any form of negotiation, either at the profile level or as Eric prefers the object level... as long as there is some way to do it. I am not sure the current excel spreadsheet mechanism will translate to TAXII very well (maybe it will?) As Bret suggested though we should probably move this to the TAXII mailing list - maybe this is a good topic for the first TAXII subcommittee meeting, whenever that occurs. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Eric Burger ---2015/07/14 11:48:06 AM---Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, bu From: Eric Burger < Eric.Burger@georgetown.edu > To: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/14 11:48 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Reiterating, it would be great for TAXII to negotiate the elements enumerated in the spreadsheet, but not to negotiate profiles. Let’s take a concrete example, both of what would be good and what would be bad. I will use the Simple Indicator Sharing Profile (SISP) as an example. It would be good for TAXII to say, “I require you to understand Indicator, Observable, and TTP,” as these are required elements in SISP. Depending on how we build the protocol, if the other side does not support those elements, it can either say, “Sorry, I don’t understand Indicator” or “Sorry, I cannot handle your request.” For the reasons I enumerated in earlier messages, it would be really bad for TAXII to say, “I require you to understand the Simple Indicator Sharing Profile.” Here is another reason I do not like profiles. The SISP says an Exploit Target is prohibited. What happens if I receive a nicely formatted, useful STIX object that has an Indicator, and Observable, a TTP, and an Exploit Target? If we are in profile land, the recipient rejects the perfectly good STIX document saying it does not match SISP. If this is the behavior we want, what we are saying is that profiles are not profiles of STIX. Rather, profiles are protocols that are different than STIX . There is no such thing as a STIX-compliant server. There are only profile-compliant servers. This would be a very bad thing for STIX - for all practical purposes it means that STIX does what it does today, and will be quickly ignored. The other reason I do not like profiles is if a developer only needs SISP support, they are highly likely to take what might appear to be sensible shortcuts and not bother implementing or looking for Exploit Target objects. They are building a SISP machine, not a STIX machine. Then, when that server goes into the real world and receives a real STIX document, it core dumps. Not the best behavior for a security related product. I know, no one on this list would ever take that shortcut. However, we cannot control what the broader market (including other divisions of your company) will implement. Let us not boldly go where we know we will stub our toe! On Jul 14, 2015, at 10:30 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I presume what Eric means is, while we have support for profiles in STIX, ( http://stixproject.github.io/documentation/profiles/ ), because they are not part of TAXII, they are not actually negotiated at all. I can not write a client that talks to a generic TAXII server and say "my client supports this profile" and have the server say "OK that is supported by me, we will proceed" and the client then start sending / receiving data. If there is some way to do this, that people are leveraging, whereby the profile spreadsheet files can be negotiated using TAXII.. it is unclear to me (and it would be great to be shared...!) - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown < cti@lists.oasis-open.org > wrote on 2015/07/14 11:24:37 AM: > From: "Barnum, Sean D." < sbarnum@mitre.org > > To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis - > open.org " < cti@lists.oasis-open.org > > Date: 2015/07/14 11:24 AM > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs > Sent by: < cti@lists.oasis-open.org > > > Hi Eric, > > Just to clarify something mentioned below. "Since we do not have > profiles (yet), one would be hard pressed to say one does “profile > processing.”" > We do currently have profiles and we do currently have “profile > processing”. Many community members (including sharing communities > that are CTI community members) are currently leveraging profiles. > They specify them, share them and design their processes around them.


  • 22.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 18:29
    RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported. RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jordan, Bret" ---2015/07/13 01:18:43 PM---Wow we have gotten off in to the weeds quickly. Might I suggest that before we build the Autobahn a From: "Jordan, Bret" <bret.jordan@bluecoat.com> To: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org> Date: 2015/07/13 01:18 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: <cti@lists.oasis-open.org> Wow we have gotten off in to the weeds quickly. Might I suggest that before we build the Autobahn and the Golden Gate Bridge, that we first learn how to ride a horse? All I would like to see for Phase 1 of this is "high level compatibly statements". Something like---- For STIX: Does your product support: 1) Data marking / handing 2) Information source integrity 3) The required fields from a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables 4) Do you have a UI for STIX generation 5) Do you support STIX Profile processing at all For TAXII: Does your product support: 1) Discovery Services 2) Collection Services 3) Subscription Services 4) Poll Services 5) Inbox Services 6) Data Feeds 7) Data Collections 8) Authentication 9) Two-factor Authentication 10) Delete Requests Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Jul 13, 2015, at 08:41, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am (clearly) all for profiles. However, negotiating at the profile level would be very bad for the future of the protocol. Let us say we have Profile A that uses STIX optional* features S1, S2, and S3 as well as CybOX objects O1, O2, and O3. Then we have Profile B that uses STIX optional features S2, S3, and S4 as well as CybOX objects O1, O3, and O4. Profile A and B are well-known, are in the registry, and are broadly implemented. Tomorrow, my buddies and I (e.g., trading partners) come up with a new use case. Let us call it Use Case C. Use Case C uses STIX features S1, S3, and S4 and CybOX object O1, O2, and O4. If we negotiate at the STIX and CybOX level, my new use case just works. As it happens, everybody implements S1, S3, S4, O1, O2, and O4. Life is good. We just quashed a major attack from a real baddie through the wonders of information sharing and the power of TAXII, STIX, and CybOX. Thank you DHS, MITRE, and the community for all of our hard work. It paid off. Now let us imagine what happens if we negotiate at the Profile level. Again, my buddies and I come up with Use Case C. However, before we can use it, we have to bring it to OASIS. Now, OASIS works (today) a lot faster than the ITU-T or the IETF. So, in a scant six months, we publish Profile C. Then, the vendors start to pick it up. Within two years, everybody that cares about Use Case C can negotiate support for it. In the intervening three years, bank accounts are drained, the power grid got shut off, and child pornography runs rampant. Worse yet, enterprises who cared about Profile A and Profile B did not think care about Profile C. So, they chose not to pay their vendors megabucks for the Profile C ‘upgrade.’ It is a real upgrade, in that the systems need to know about Profile C to negotiate for it. However, it is an upgrade in quotes, because no new STIX or CybOX support needed to be implemented. Of course, you know what comes next. Those enterprises succumb to Use Case C attacks. Now, Armageddon was launched as Use Case C turns out to be an APT that targets the SBLM MIRV fire control system. Bad day for the world. All because we decided to negotiate profiles and not capabilities. Please , keep negotiation at the building block level, not the profile level. Profiles are incredibly useful to let purchasers of CTI systems know what they are buying and likewise they are incredibly useful to manufacturers of CTI systems to let them know what to build. However, profiles are harmful as a protocol mechanism. * Notice that profiles only tell folks what optional (SHOULD, MAY) features need to be there. Of course, all mandatory features are there. Otherwise, you should not call your product an implementation of TAXII, STIX, and CybOX. On Jul 13, 2015, at 9:03 AM, Davidson II, Mark S < mdavidson@MITRE.ORG > wrote: I’ll note, shortly, that TAXII 1.1 has the ability to negotiate STIX Profiles using the Content Type / Subtype mechanism, where the Subtype is used to specify a STIX Profile. That said, I’m not sure the heart of the discussion has much to do with TAXII’s current form. I think the heart of this discussion is: “What capabilities offer the greatest value to cyber defenders? How do we implement those capabilities?” From there, we can evaluate TAXII (and STIX) against those desired capabilities and identify any gaps that need to be closed. Of course my feeling is that we are already “pretty close”, but I’d rather that conclusion become evidence based (I’m noting the quote in Jason’s signature as I type this). Thank you. -Mark From: cti@lists.oasis-open.org [ mailto:cti@lists.oasis-open.org ] On Behalf Of Jason Keirstead Sent: Monday, July 13, 2015 8:27 AM To: Trey Darley Cc: Eric Burger; cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <image001.gif> Trey Darley ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som From: Trey Darley < trey@soltra.com > To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/13 06:40 AM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library? Cheers, Trey -- Trey Darley Senior Security Engineer Soltra An FS-ISAC & DTCC Company www.soltra.com From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu > Sent: Monday, July 13, 2015 11:25 To: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors. One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything . Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S. A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed. Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and foo. On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant to that product class, and the product class will likely never support any more as a result. This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products. * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer products not being able to support the full set of all possible CybOX objects and their operators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox From: Mark Clancy < mclancy@soltra.com > To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu > Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Date: 2015/07/09 01:38 PM Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Sent by: < cti@lists.oasis-open.org > Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do? Does it consume specific data, does it publish specific data, or does it aggregate/link all data ? The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve. The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure. So what the heck should we do? We need to put life into the STIX profiles. We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table. For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers. -Mark Mark Clancy Chief Executive Officer SOLTRA An FS-ISAC and DTCC Company +1.813.470.2400 office +1.610.659.6671 US mobile ? +44 7823 626 535 UK mobile mclancy@soltra.com soltra.com One organization's incident becomes everyone's defense. ? From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Terry MacDonald < terry.macdonald@threatloop.com > Sent: Wednesday, July 8, 2015 8:26 PM To: Eric Burger Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Yes, well stated Pat. I especially like the notion of describing what you need and nothing more. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote: I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem, which makes the product more attractive to customers. We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build. So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite a product needs to have to meaningfully address the use case. On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote: +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues. sean From: Patrick Maroney < Pmaroney@Specere.org > Date: Wednesday, July 8, 2015 at 12:45 PM To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I may be missing something here and have been hesitating throwing in my usual advocacy for STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc., We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and iterate over them to revise or create new Community "Standard" STIX Profiles. Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase: (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner. (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways. I have always agreed with these objectives. However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex), and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA). Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein was quite legitimately seeking similar unification ;-). Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand. this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume. This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing, (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is: You only describe what you need and nothing more. Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration : Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can eventually remove the Training Wheels. I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity levels, impediments, to adoption, etc. Patrick Maroney Office: (856)983-0001 Cell:: (609)841-5104 Email: pmaroney@specere.org From: < cti@lists.oasis-open.org > on behalf of Sean Barnum < sbarnum@mitre.org > Date: Wednesday, July 8, 2015 at 10:15 AM To: "Kirillov, Ivan A." < ikirillov@mitre.org >, Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs +! I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading. sean From: <Kirillov>, Steve Cell < ikirillov@mitre.org > Date: Wednesday, July 8, 2015 at 8:35 AM To: Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object? Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File). Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or CybOX as appropriate ). I could envision this as a taxonomy, e.g., · Indicator Characterization/Sharing · Host-based Indicator Sharing · STIX · Level 1: Basic Context · Level 2: Level 1 + Supports Sightings · CybOX · Level 1: Supports File Object · File_Path field · Hashes field · Level 2: Level 1 + Supports Windows Registry Key Object · Network Indicator Sharing · TTP/Malware Characterization Sharing · Basic TTP/Malware Characterization Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity levels, I’d recommend limiting the number of levels to 3 to keep things sane: · Level 1: minimal support – very basic, incomplete support · Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) · Level 3: full support – fully supports the use case, in all facets Regards, Ivan From: Terry MacDonald < terry.macdonald@threatloop.com > Date: Tuesday, July 7, 2015 at 7:26 PM To: Bret Jordan < bret.jordan@bluecoat.com > Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >, Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org > Subject: Re: [cti] CTI TC Adoption and Interoperability SCs I agree. I like the way this is headed. I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently. Cheers Terry MacDonald STIX, TAXII, CybOX Consultant M: +61-407-203-026 E: terry.macdonald@threatloop.com W: www.threatloop.com Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers. On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote: The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for. I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?" Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote: Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing. More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example) as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to. Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables) Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc. Level 3: In addition to level 2, adds support for Sightings Level 4: In addition to level 3, adds all STIX and CybOx object types. Level 5: In addition to level 4, adds support for STIX object updates and Revocation Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity. Dave ________________________________________ From: cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV > Sent: Monday, July 6, 2015 1:09 PM To: Eric Burger; cti@lists.oasis-open.org Subject: RE: [cti] CTI TC Adoption and Interoperability SCs I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would need to tackle.


  • 23.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 18:37
    Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric. For STIX: Does your product support: S1) Data marking / handing S2) Information source integrity S3) The required fields from the following STIX Idioms a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables S4) The required fields from the following CybOX objects i) TBD S5) Do you support STIX Profile processing for the following profiles a) TBD b) TBD Optional Extras You Might Support (this is meant to give extra color / context to differentiate products) SA) Do you have a UI for STIX generation For TAXII: Does your product support: T1) Discovery Services T2) Collection Services T3) Subscription Services T4) Poll Services T5) Inbox Services T6) Data Feeds T7) Data Collections T8) Delete Requests Optional Extras You Might Support TA) Authentication  TB) Two-factor Authentication Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported. RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 24.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 18:40





    What do you mean by "information source integrity"?









    From: < cti@lists.oasis-open.org > on behalf of "Jordan, Bret"
    Date: Monday, July 13, 2015 at 2:37 PM
    To: Jason Keirstead
    Cc: " cti@lists.oasis-open.org "
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs





    Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric.



    For STIX:


    Does your product support:
    S1) Data marking / handing
    S2) Information source integrity
    S3) The required fields from the following STIX Idioms
    a) Indicators
    b) Incidents
    c) Threat Actors
    d) Campaigns
    e) TTPs
    f) Course of Actions
    g) Exploit Targets
    h) Observables
    S4) The required fields from the following CybOX objects
    i) TBD
    S5) Do you support STIX Profile processing for the following profiles
    a) TBD
    b) TBD


    Optional Extras You Might Support (this is meant to give extra color / context to differentiate products)
    SA) Do you have a UI for STIX generation






    For TAXII:


    Does your product support:
    T1) Discovery Services
    T2) Collection Services
    T3) Subscription Services
    T4) Poll Services
    T5) Inbox Services
    T6) Data Feeds
    T7) Data Collections
    T8) Delete Requests


    Optional Extras You Might Support

    TA) Authentication 
    TB) Two-factor Authentication












    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:



    RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported.

    RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol.


    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown
















  • 25.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 18:56
    Is there a way with your product to trace the STIX object back to the original source/publisher?   Meaning, if someone send you a STIX package with an Information Source object included in it (and there is no data marking object that prevents the information source from being shared), do you keep it around and use it if you republish that STIX package.  Yes, it seems obvious in open sharing that people would do this, but my guess is that if we do not call it out, some will just drop it on the floor and do their own thing.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 12:40, Wunder, John A. < jwunder@mitre.org > wrote: What do you mean by information source integrity ? From: < cti@lists.oasis-open.org > on behalf of Jordan, Bret Date: Monday, July 13, 2015 at 2:37 PM To: Jason Keirstead Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric. For STIX: Does your product support: S1) Data marking / handing S2) Information source integrity S3) The required fields from the following STIX Idioms a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables S4) The required fields from the following CybOX objects i) TBD S5) Do you support STIX Profile processing for the following profiles a) TBD b) TBD Optional Extras You Might Support (this is meant to give extra color / context to differentiate products) SA) Do you have a UI for STIX generation For TAXII: Does your product support: T1) Discovery Services T2) Collection Services T3) Subscription Services T4) Poll Services T5) Inbox Services T6) Data Feeds T7) Data Collections T8) Delete Requests Optional Extras You Might Support TA) Authentication  TB) Two-factor Authentication Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported. RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 26.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 19:08





    Thanks, that helps.


    One thing that might be worth calling out is what each statement means for pure consumers, pure producers, and hybrid products. For example in considering data markings a pure consumer would presumably need to support ALL of the data markings allowed in
    the profile while a producer only needs to be able to produce some of them. OTOH pure consumers don't need to worry about re-sharing content w/ the original info source since they never share while hybrid products do.









    From: "Jordan, Bret"
    Date: Monday, July 13, 2015 at 2:55 PM
    To: "Wunder, John A."
    Cc: " cti@lists.oasis-open.org "
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs





    Is there a way with "your" product to trace the STIX object back to the original source/publisher?  


    Meaning, if someone send you a STIX package with an Information Source object included in it (and there is no data marking object that prevents the information source from being shared), do you keep it around and use it if you republish that STIX
    package.  Yes, it seems obvious in open sharing that people would do this, but my guess is that if we do not call it out, some will just drop it on the floor and do their own thing.  











    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Jul 13, 2015, at 12:40, Wunder, John A. < jwunder@mitre.org > wrote:





    What do you mean by "information source integrity"?









    From: < cti@lists.oasis-open.org > on behalf of "Jordan, Bret"
    Date: Monday, July 13, 2015 at 2:37 PM
    To: Jason Keirstead
    Cc: " cti@lists.oasis-open.org "
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs





    Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric.



    For STIX:


    Does your product support:
    S1) Data marking / handing
    S2) Information source integrity
    S3) The required fields from the following STIX Idioms
    a) Indicators
    b) Incidents
    c) Threat Actors
    d) Campaigns
    e) TTPs
    f) Course of Actions
    g) Exploit Targets
    h) Observables
    S4) The required fields from the following CybOX objects
    i) TBD
    S5) Do you support STIX Profile processing for the following profiles
    a) TBD
    b) TBD


    Optional Extras You Might Support (this is meant to give extra color / context to differentiate products)
    SA) Do you have a UI for STIX generation






    For TAXII:


    Does your product support:
    T1) Discovery Services
    T2) Collection Services
    T3) Subscription Services
    T4) Poll Services
    T5) Inbox Services
    T6) Data Feeds
    T7) Data Collections
    T8) Delete Requests


    Optional Extras You Might Support

    TA) Authentication 
    TB) Two-factor Authentication












    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:



    RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported.

    RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol.


    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown























  • 27.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 19:18
    Yes, agreed.  Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 13:07, Wunder, John A. < jwunder@mitre.org > wrote: Thanks, that helps. One thing that might be worth calling out is what each statement means for pure consumers, pure producers, and hybrid products. For example in considering data markings a pure consumer would presumably need to support ALL of the data markings allowed in the profile while a producer only needs to be able to produce some of them. OTOH pure consumers don't need to worry about re-sharing content w/ the original info source since they never share while hybrid products do. From: Jordan, Bret Date: Monday, July 13, 2015 at 2:55 PM To: Wunder, John A. Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Is there a way with your product to trace the STIX object back to the original source/publisher?   Meaning, if someone send you a STIX package with an Information Source object included in it (and there is no data marking object that prevents the information source from being shared), do you keep it around and use it if you republish that STIX package.  Yes, it seems obvious in open sharing that people would do this, but my guess is that if we do not call it out, some will just drop it on the floor and do their own thing.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 12:40, Wunder, John A. < jwunder@mitre.org > wrote: What do you mean by information source integrity ? From: < cti@lists.oasis-open.org > on behalf of Jordan, Bret Date: Monday, July 13, 2015 at 2:37 PM To: Jason Keirstead Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric. For STIX: Does your product support: S1) Data marking / handing S2) Information source integrity S3) The required fields from the following STIX Idioms a) Indicators b) Incidents c) Threat Actors d) Campaigns e) TTPs f) Course of Actions g) Exploit Targets h) Observables S4) The required fields from the following CybOX objects i) TBD S5) Do you support STIX Profile processing for the following profiles a) TBD b) TBD Optional Extras You Might Support (this is meant to give extra color / context to differentiate products) SA) Do you have a UI for STIX generation For TAXII: Does your product support: T1) Discovery Services T2) Collection Services T3) Subscription Services T4) Poll Services T5) Inbox Services T6) Data Feeds T7) Data Collections T8) Delete Requests Optional Extras You Might Support TA) Authentication  TB) Two-factor Authentication Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported. RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 28.  RE: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-14-2015 13:01
    I think that this higher level approach is the way to go. It is very much in line with where I had planned to take the stix supporters concept in a future iteration. As was suggested in an earlier email in this thread, I think we should encourage producers and consumers to provide this higher level information while also drafting a profile that describes their stix/cybox usage. The profile would not initially be about interoperability. Instead it would be a tool to allow for detailed communication of the supported stix/cybox structures.   Jon   ============================================ Jonathan O. Baker J83D - Cyber Security Partnerships, Sharing, and Automation The MITRE Corporation Email: bakerj@mitre.org   From: cti@lists.oasis-open.org [mailto:cti@lists.oasis-open.org] On Behalf Of Jordan, Bret Sent: Monday, July 13, 2015 2:37 PM To: Jason Keirstead Cc: cti@lists.oasis-open.org Subject: Re: [cti] CTI TC Adoption and Interoperability SCs   Okay, now I think we are getting out of the weeds and moving forward, so what about this, with the changes from Jason and Eric.   For STIX:   Does your product support: S1) Data marking / handing S2) Information source integrity S3) The required fields from the following STIX Idioms           a) Indicators           b) Incidents           c) Threat Actors           d) Campaigns           e) TTPs           f) Course of Actions           g) Exploit Targets           h) Observables S4) The required fields from the following CybOX objects           i) TBD S5) Do you support STIX Profile processing for the following profiles           a) TBD           b) TBD   Optional Extras You Might Support (this is meant to give extra color / context to differentiate products) SA) Do you have a UI for STIX generation       For TAXII:   Does your product support: T1) Discovery Services T2) Collection Services T3) Subscription Services T4) Poll Services T5) Inbox Services T6) Data Feeds T7) Data Collections T8) Delete Requests   Optional Extras You Might Support TA) Authentication  TB) Two-factor Authentication   Thanks,   Bret       Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."    On Jul 13, 2015, at 12:27, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:   RE STIX 3.h, I would also like to see included in the profile a list of the CybOX objects supported. RE TAXII 8,9 I am not sure how authentication types can be included in the profile when they are not part of the TAXII protocol. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown  


  • 29.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 13:07




    FWIW this was the basic idea behind the "Simple Indicator Sharing Profile" and "Simple Indicator Publishing Profile": we thought we needed to define some baseline profiles for the community to work with and agree upon so over the course of a few community
    calls and list discussions came up with those. I did a lot of the work on them (and on profiles in general) and have some thoughts and lessons learned:


    1. Development on those kind of died due to lack of feedback and interest. There's a lot more momentum now so I doubt that will happen again but I felt it was worth pointing out.


    2. Notice there are two profiles I listed: we started by saying we would define a "simple indicator sharing profile" but very quickly realized that people mean vastly different things when you say that. So, it was split into two. And even then it leaves
    out a lot of products that do indicator sharing but in a slightly different way. There will be a lot of work to do to make sure the number of profiles doesn't explode as you get different combinations of products. For example, my product does indicators, TTPs,
    and campaigns, yours does indicators, TTPs, and threat actors, another does incidents and threat actors and campaigns. There's a lot of overlap there but none align to the same profile.


    3. Profiles (especially the excel format, but I think in general as well) are very hard to work with and understand. I implemented a lot of them and am still finding challenges. This isn't to say that they're insurmountable, but I don't think "define a
    profile" or even "understand this profile we've defined" is all that easy of a task. I can elaborate on this if you want. In any case, at this point I'm starting to think that there's actually more value in defining very high level compatibility statements
    vs. the complete profile. Or maybe you want both: the complete profile to really make sure you're getting it right and high level compatibility statements to make it usable for most people. I don't really know, but I do know that if you hand the average developer
    a STIX profile they'll have a hard time understanding exactly what it's saying.


    4. The biggest consideration you'll have to make when defining these is how prescriptive you want to make them. Do you want to require a lot of things? Ban a lot of things? Both of those will restrict who is able to code to the profile but will also lock
    down exactly what is implemented much more precisely. A profile that leaves everything MAY doesn't lock things down at all but on the other hand one that prohibits a lot of things will be hard for products to comply with. This will be a hard line to balance.


    None of this is to say that this is a bad idea: I agree that "maturity levels" are not the way to go and that profiles can help. I just think we've learned a bunch when using them in the past and need to be careful to make sure what we end up with is useful.


    John








    From: < cti@lists.oasis-open.org > on behalf of Jason Keirstead
    Date: Monday, July 13, 2015 at 8:27 AM
    To: Trey Darley
    Cc: Eric Burger, " cti@lists.oasis-open.org "
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs





    That would be fantastic.... along with a profile negotiation mechanism added to TAXII, the mechanism could refer to the profiles in the repository by URI.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    Trey Darley
    ---2015/07/13 06:40:07 AM---What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, som

    From: Trey Darley < trey@soltra.com >
    To: Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date: 2015/07/13 06:40 AM
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by: < cti@lists.oasis-open.org >





    What about having the TC maintain a repository of STIX Profiles aligned with specific use cases, something like a standard library?


    Cheers,
    Trey
    --
    Trey Darley
    Senior Security Engineer
    Soltra An FS-ISAC & DTCC Company
    www.soltra.com




    From:
    cti@lists.oasis-open.org < cti@lists.oasis-open.org > on behalf of Eric Burger < Eric.Burger@georgetown.edu >
    Sent: Monday, July 13, 2015 11:25
    To: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    We are years too soon for a ‘maturity’ or “My product implements X% of STIX and CybOX” scale to be of any use to anybody, except perhaps the marketing departments of vendors.


    One of the great features of STIX and CybOX is they do
    everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do
    everything .

    Think of profiles as applications that run on top of STIX and CybOX. If you want to exchange DDoS information, think of it as the DDoS application that runs on STIX and CybOX with features A, B, D, and Q. If you want to exchange
    phishing information, that is the phishing application that runs on STIX and CybOX with features A, R, and S.

    A critical success factor for STIX and CybOX is that anyone should be able to create any kind of application without asking OASIS. If you want to exchange foo information that uses features A, T, and Z, so long as the underlying
    implementations offer A, T, and Z, the exchange will happen. That means that we need to have meaningful behavior for implementations that do not offer T, such that the person sending the foo will know why the other side barfed.

    Said another way, TAXII needs to be able to negotiate capabilities in terms of A, B, C, … It would be a disaster and spell doom for the adoption of STIX/TAXII/CybOX if TAXII negotiated capabilities in terms of DDoS, phishing, and
    foo.


    On Jul 9, 2015, at 12:55 PM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:

    I feel like the profile conversation does not get well served by trying to use it to discuss it as a "maturity scale" - they are not really the same thing. CybOX*, STIX and TAXII are very robust protocols that have *a lot* of optional
    information, and not all of that information is relevant to all consumers or producers of STIX. Just because a product only supports a given profile does not mean that product is not mature... the information in other profiles may not be in any way relevant
    to that product class, and the product class will likely never support any more as a result.


    This is why profiles are so important, because in order for products to inter-operate using these protocols, people using them need to "know what to expect" when they connect the products.

    * As well, trying to call out the importance of CybOX in the profile conversation, simply because I don't see it mentioned much in these emails... the CybOX objects supported is a critical component of any profile in my opinion. I foresee a lot of consumer
    products not being able to support the full set of all possible CybOX objects and their operators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Mark Clancy ---2015/07/09 01:38:42 PM---Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox

    From: Mark Clancy < mclancy@soltra.com >
    To: Terry MacDonald < terry.macdonald@threatloop.com >, Eric Burger < Eric.Burger@georgetown.edu >
    Cc: " cti@lists.oasis-open.org " < cti@lists.oasis-open.org >
    Date: 2015/07/09 01:38 PM
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs
    Sent by: < cti@lists.oasis-open.org >





    Maybe the context that would be helpful to add is what does the thing implementing TAXIISTIXCybox actually do?
    Does it consume specific data, does it publish specific data, or does it aggregate/link all data ?

    The STIX profile attempted to address this with kind of saying. “Hey this is what I actually support”. If I am a CTI producer focusing on one thing like say DDoS attacks that narrow subset of Stix and Cybox objects defined in the profile may well be the maximum
    content I would every produce anyway so having a maturity of "X" is the max that I could ever be and similarly if I was a defensive tool that re-directed access to evil web sites support cybox object with Windows Registry keys are fairly irrelevant. On the
    other hand if I am sharing hub/aggregation portal or a SIEM those same levels of support in the STIX profile are way below what a customer of that platform would expect. Those should not get treated in the same way on a maturity curve.


    The downside of a "maturity scale" is that it can be viewed as penalizing specialty services/tools that don't need every widget to have maximum effectiveness for what they do where as you kind of want to point out that another platform is less mature as it
    left a lot of capability on the table with their implementation and therefore have sub-optimal effectiveness given what it could be doing to feel that pressure.

    So what the heck should we do?

    We need to put life into the STIX profiles.
    We need to figure out a way to differentiate STIX profiles where the maximum needed to do the purpose has been achieved and where things are left on the table.


    For the buyer of a solution this is the critical difference and if we can’t express that difference some how that in my experience tend to lay blame (in the mind of the buyer) with the standards not the implementation by their suppliers.

    -Mark

    Mark Clancy
    Chief Executive Officer
    SOLTRA An FS-ISAC and DTCC Company
    +1.813.470.2400 office
    +1.610.659.6671 US
    mobile ?
    +44 7823 626 535 UK
    mobile
    mclancy@soltra.com
    soltra.com

    One organization's incident becomes everyone's defense.

    ?





    From: cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Terry MacDonald < terry.macdonald@threatloop.com >
    Sent: Wednesday, July 8, 2015 8:26 PM
    To: Eric Burger
    Cc: cti@lists.oasis-open.org
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    Yes, well stated Pat. I especially like the notion of describing what you need and nothing more.


    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 9 July 2015 at 03:45, Eric Burger < Eric.Burger@georgetown.edu > wrote:


    I am normally allergic to profiles, but as Bret says, let’s look at this from the perspective of the customer or the product manager. They are not buying STIX. They are buying in to an information sharing
    ecosystem. No matter how much we wish they did, they will not care whether it is STIX, IODEF, OpenIOC, or carrier pigeon under the hood. We offer that by building STIX-enabled products (product manager), your products will seamlessly fit into the ecosystem,
    which makes the product more attractive to customers.

    We are WAY too early in the process to define levels of STIXiness. However, the profiles (should) fit into use cases. Use cases (should) reflect what customers want to buy (use cases that need solving) and as such what people want to build.

    So, I would offer while we are not ready (I’m thinking years here) for building a maturity model, we are getting close (I’m thinking 18 months here) for having ‘profiles’ or “documented use cases” that enumerate which of the optional components of the CTI suite
    a product needs to have to meaningfully address the use case.





    On Jul 8, 2015, at 1:13 PM, Barnum, Sean D. < sbarnum@mitre.org > wrote:

    +1 Well stated, Pat. I think that profiles are a key part of use case breakdown on these issues.

    sean

    From: Patrick Maroney < Pmaroney@Specere.org >
    Date: Wednesday, July 8, 2015 at 12:45 PM
    To: "Barnum, Sean D." < sbarnum@mitre.org >, Steve Cell < ikirillov@mitre.org >,
    Terry MacDonald < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I may be missing something here and have been hesitating throwing in my usual advocacy for
    STIX Profiles [Plus] as a method to help manage complexity, interoperability, different world views, use cases, etc.,


    We've had almost identical conversations when defining the two initial "Standard STIX Profiles" (1) Simple, (2) Complex. The objective of this exercise was to establish consensus for two initial Community driven "Standard" STIX Profiles and then use these and
    iterate over them to revise or create new Community "Standard" STIX Profiles.

    Dr. Burger makes good arguments on these topics, which I will attempt to paraphrase:


    (1) The CTI language should be precise both in terms of how one expresses any given "thing" and similarly precise in how one interprets "things" expressed in this manner.


    (2) The language should (must?) limit the ability to represent a given "thing" in multiple ways.


    I have always agreed with these objectives.

    However, I still see extended STIX Profiles (Human and Machine readable) as a viable approach to providing an Abstraction Layer to help manage Complexity, establish and iterate on common Use Cases, clearly specify what I can convey/consume (from Simple to Complex),
    and to describe methods and any assumptions (e.g. Tokenization, TLP Mapping Transforms, COA).


    Context for my World View is that CTI provides the Inter-exchange mechanisms for specific dialogs between specific members of a very specific Community of Trust and/or Operational Domains. Many variations of these CTIX Communities/Operational Domains will be
    established. So from these perspectives there is never any intent to forge "One Ring to Rule Them All". Understand there are also those quite legitimately seeking a unified "STIX" package (a lthough I might quip that Einstein
    was quite legitimately seeking similar unification ;-).

    Also note that I've argued for the addition of a very explicit form of STIX Profile: I only describe the things I can (1) Convey, (2) Consume, and/or (3) Understand.
    this proposed form of STIX Profile can be extremely simple and only needs to enumerate what I can (1) Convey and (2) Consume.
    This form of STIX Profile would include provisions to optionally share information on policies, exception handling, etc (i.e., My Policy for Undefined Content: (1) Ignore, (2) Discard, (3) Save for future consideration/reprocessing,
    (4) Reject Entire Package, (5) Hold and Contact Source. However, Key take-away here is:
    You only describe what you need and nothing more.


    Perhaps a different way of expressing the underlying concept of what I'm proposing for consideration :


    Before sending our "Little CTI" out in the world on her own: Let's define some initial boundaries and give her some training wheels. As she explores, try's new things, makes mistakes, learns, and continue to expand her horizons, we can
    eventually remove the Training Wheels.


    I was planning to wait for the CTI TC re-organization dust to settle before re-engaging the community in discourse on extending STIX Profiles. However, I wanted to raise it here in the contexts of the ongoing discussions on complexity, interoperability, maturity
    levels, impediments, to adoption, etc.

    Patrick Maroney
    Office: (856)983-0001
    Cell:: (609)841-5104
    Email: pmaroney@specere.org

    From: < cti@lists.oasis-open.org > on behalf of Sean Barnum
    < sbarnum@mitre.org >
    Date: Wednesday, July 8, 2015 at 10:15 AM
    To: "Kirillov, Ivan A." < ikirillov@mitre.org >, Terry MacDonald
    < terry.macdonald@threatloop.com >, "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    +!
    I think Ivan hit the nail squarely on the head here. I think this is the only way that a maturity model can be effective. Blurring the lines together will generally mean the maturity levels are misleading.

    sean

    From: <Kirillov>, Steve Cell < ikirillov@mitre.org >
    Date: Wednesday, July 8, 2015 at 8:35 AM
    To: Terry MacDonald < terry.macdonald@threatloop.com >,
    "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, "Struse, Richard" < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    Interoperability is important, but I’m a little wary of having any sort of abstract system of maturity levels without additional context. The thing is, STIX and CybOX support so many different use cases that just saying that one has to meet a certain threshold
    with regards to a particular maturity level isn’t terribly useful and in my view could be harmful. For example, if my product is only focused on the generation of simple network indicators (IPs, URLs, etc.), why should I have to support every CybOX Object?
    Also, just saying that one supports a CybOX Object doesn’t necessarily mean that one supports every field in the Object, which is quite relevant for some of the larger objects out there (e.g., the Windows Executable File).


    Instead, I would suggest that we begin by documenting, even at a high level, the particular use cases that we wish to support with STIX and CybOX. These could then, in turn, have their own native set of maturity levels (defined independently for STIX and/or
    CybOX as appropriate ). I could envision this as a taxonomy, e.g.,




    Indicator Characterization/Sharing




    Host-based Indicator Sharing




    STIX




    Level 1: Basic Context Level 2: Level 1 + Supports Sightings



    CybOX




    Level 1: Supports File Object




    File_Path field Hashes field



    Level 2: Level 1 + Supports Windows Registry Key Object







    Network Indicator Sharing



    TTP/Malware Characterization Sharing




    Basic TTP/Malware Characterization







    Still arbitrary, but at least we could then tell vendors that if they want to minimally/somewhat/fully support a particular use case in TAXII they need to do XYZ. Also, if we do go down this road of per-use case based maturity
    levels, I’d recommend limiting the number of levels to 3 to keep things sane:




    Level 1: minimal support – very basic, incomplete support Level 2: partial support – typical/average support (with what is commonly expected with regards to the use case) Level 3: full support – fully supports the use case, in all facets




    Regards,
    Ivan

    From: Terry MacDonald < terry.macdonald@threatloop.com >
    Date: Tuesday, July 7, 2015 at 7:26 PM
    To: Bret Jordan < bret.jordan@bluecoat.com >
    Cc: David Eilken < deilken@fsisac.us >, Richard Struse < Richard.Struse@HQ.DHS.GOV >,
    Eric Burger < Eric.Burger@georgetown.edu >, " cti@lists.oasis-open.org "
    < cti@lists.oasis-open.org >
    Subject: Re: [cti] CTI TC Adoption and Interoperability SCs

    I agree. I like the way this is headed.

    I would like to see each SC produce a list of levels that help guide vendors towards a development roadmap for their products. The number of levels could be different for each SC if that makes sense to the SC, but would also align as closely as possible with
    the equivalent level of the other SCs e.g. TAXII Level 2 would work with STIX Level 2 and CybOX Level 2. I prefer separate maturity levels per SC as it frees products to support STIX and CybOX, but not TAXII, or to be fully STIX compliant but not support all
    CybOX objects. It will give vendors a better chance of documenting their maturity more accurately, and as mentioned gives each SC the ability to identify what the requirements of each level are independently.

    Cheers

    Terry MacDonald STIX, TAXII, CybOX Consultant

    M: +61-407-203-026
    E: terry.macdonald@threatloop.com
    W: www.threatloop.com



    Disclaimer: The opinions expressed within this email do not represent the sentiment of any other party except my own. My views do not necessarily reflect those of my employers.

    On 7 July 2015 at 06:55, Jordan, Bret < bret.jordan@bluecoat.com > wrote:
    The thing I like about this, if it is simple enough to understand and figure out/test for, is it gives developers/product managers a line in the sand to shoot for.


    I often get asked by many a vendor, "how much of STIX / TAXII do I need to implement to do XYZ?"


    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."





    On Jul 6, 2015, at 14:50, David Eilken < deilken@fsisac.us > wrote:

    Eric, I was just about to chime in that we do need some maturity measurements (vs testing/ validation), but I it didn't sound like you are necessarily in contention with that, and I wouldn't advocate for layers and layers of testing.


    More on Maturity Measurements, since we recently took a stab at it (below). To Mark's previous points, there is value in essentially chunking the STIX profile into different levels of maturity and also identifying certain features (STIX Editing for example)
    as measurements of more mature implementations. Same could be done for TAXII (ingesting STIX from a Feed is simple compared to pushing data back to an Inbox). This approach starts to overlap with the more "qualitative" aspects that Jane referred to.

    Level 1: Supports a subset of STIX object types (Indicators). Supports a subset of CybOx object types (observables)
    Level 2: In addition to level 1, adds basic context like: title, description, types, date/times, producer, etc.
    Level 3: In addition to level 2, adds support for Sightings
    Level 4: In addition to level 3, adds all STIX and CybOx object types.
    Level 5: In addition to level 4, adds support for STIX object updates and Revocation


    Testing and measuring maturity would essentially be separate items. One would test sample data against a submitted profile for validation/ interoperability, and then measure it's maturity.



    Dave


    ________________________________________
    From: cti@lists.oasis-open.org < cti@lists.oasis-open.org >
    on behalf of Struse, Richard < Richard.Struse@HQ.DHS.GOV >
    Sent: Monday, July 6, 2015 1:09 PM
    To: Eric Burger; cti@lists.oasis-open.org
    Subject: RE: [cti] CTI TC Adoption and Interoperability SCs

    I think we are actually in agreement. I'm not advocating heavyweight "suites" of exhaustive tests but I do think we will benefit from a shared understanding of the basic outlines of what it means to be interoperable. Definitely a question that the SC would
    need to tackle.




  • 30.  Re: [cti] CTI TC Adoption and Interoperability SCs

    Posted 07-13-2015 10:46
    I have yet to see explicit references, however, to STIX or CybOX uses in virtualisation environments. This includes Cloud Computing instantiations in data centres and NFV.  Perhaps this is a potential subgroup. --tony On 2015-07-13 5:25 AM, Eric Burger wrote: One of the great features of STIX and CybOX is they do everything . The biggest downside of STIX and CybOX, as evidenced by a number of the IETF references that have flown about on the list, is they do everything .