<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-network-element-tsm-yang-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Network Element TSM YANG">A YANG Data Model for Network Element Threat Surface Management</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-network-element-tsm-yang-01"/>
    <author initials="F." surname="Hu" fullname="Feifei Hu">
      <organization>China Southern Power Grid</organization>
      <address>
        <email>huff@csg.cn</email>
      </address>
    </author>
    <author initials="D." surname="Hong" fullname="Danke Hong">
      <organization>China Southern Power Grid</organization>
      <address>
        <email>hongdk@csg.cn</email>
      </address>
    </author>
    <author initials="L." surname="Xia" fullname="Liang Xia">
      <organization>Huawei Technologies</organization>
      <address>
        <email>frank.xialiang@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="18"/>
    <keyword/>
    <keyword/>
    <keyword/>
    <abstract>
      <?line 58?>

<t>This document defines a base YANG data model for network element
threat surface management that is application- and technology-agnostic.</t>
    </abstract>
  </front>
  <middle>
    <?line 63?>

<section anchor="intro">
      <name>Introduction</name>
      <t>nowadays, there are more and more advanced network attacks on network infrastructures, such as routers, switches, etc. To ensure the security management of network devices, the first thing is to continuously improve the security status visibility of network devices. To achieve this, on the one hand, the device security operation baseline should be defined based on device's normal services, so that the abnormal status of the device is identified in real time based on the trustlist similar mechanism, to ensure that all devices, connections, and traffic meet the expectation. On the other hand, by switching to the attacker perspective, comprehensively define the threat surface of devices, and manage potential risks in a timely manner through identification and monitoring to ensure the convergence of the threat surface.</t>
      <t>Network element threat surface management is not a new concept, a similar concept is External Attack Surface Management (EASM) which is defines as "refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers, exposed enterprise data such as credentials and third-party partner software code vulnerabilities that could be exploited by adversaries.". In contrast, EASM is a larger system and methodology, of which this document presents a specific implementation for network devices. In addition, the difference between the threat surface and attack surface needs to be clarified. The threat surface may not have vulnerabilities or be an attack surface. However, it is exposed to the sight of attackers and faces threats from external attackers. Therefore, the security risk is high. The attack surface can be accessed by hackers and has vulnerabilities, that is, it is both exposed and vulnerable, and the security risk is very high. In summary, not all threat surfaces will become attack surfaces, only exploitable threat surfaces that overlay attack vectors will become an attack surface. So, managing the exposure means converging the attack surface.</t>
      <t>In the past, the IETF has done some work in the area of security posture definition, collection, and assessment, including the concluded Network Endpoint Assessment (NEA) and Security Automation and Continuous Monitoring (SACM) working groups <xref target="RFC5209"/><xref target="RFC8248"/>. However, they mainly complete the standard definition of general use cases and requirements, architecture and communication protocols, and software inventory attribute definition, and do not continue to extend and define more specific security posture models, such as the network device threat surface model proposed in this document. As described above, in the current situation of increasingly frequent network attacks and complex means, it is valuable to define the specific security posture model to automatically mitigate major security risks in user networks. Recently, the extended MUD YANG model for SBOM and vulnerability information of devices defined in <xref target="RFC9472"/>, and the extended MUD YANG model for (D)TLS profiles for IoT devices proposed in <xref target="I-D.ietf-opsawg-mud-tls"/>, seems as the continuation of the definition of the specific security posture model.</t>
      <t><xref target="Def"/> of this document defines the basic framework of the threat surface management. The details are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>What parts are included? How to design each part? Specifically, what attributes, configurations, and running status information are included?</t>
        </li>
        <li>
          <t>What their relationship is like.</t>
        </li>
        <li>
          <t>Some key points in operation: timely discovery, continuous visibility, verifiability, traceability, priority management, etc.</t>
        </li>
      </ul>
      <t>Based on the above definitions, <xref target="tsmyangmodel"/> of this document defines the YANG model for the device threat surface management.</t>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The following terms are defined in <xref target="RFC7950"/> and are not
  redefined here:</t>
        <ul spacing="normal">
          <li>
            <t>client</t>
          </li>
          <li>
            <t>server</t>
          </li>
          <li>
            <t>augment</t>
          </li>
          <li>
            <t>data model</t>
          </li>
          <li>
            <t>data node</t>
          </li>
        </ul>
        <t>The following terms are defined in <xref target="RFC6241"/> and are not redefined
  here:</t>
        <ul spacing="normal">
          <li>
            <t>configuration data</t>
          </li>
          <li>
            <t>state data</t>
          </li>
        </ul>
        <t>The terminology for describing YANG data models is found in
  <xref target="RFC7950"/>.</t>
        <t>Following terms are used for the representation of the hierarchies in the network inventory.</t>
        <t>Network Element:</t>
        <ul empty="true">
          <li>
            <t>a manageable network entity that contains hardware and software units, e.g. a network device installed on one or several chassis</t>
          </li>
        </ul>
        <t>Chassis:</t>
        <ul empty="true">
          <li>
            <t>a holder of the device installation.</t>
          </li>
        </ul>
        <t>Slot:</t>
        <ul empty="true">
          <li>
            <t>a holder of the board.</t>
          </li>
        </ul>
        <t>Component:</t>
        <ul empty="true">
          <li>
            <t>a unit of the network element, e.g.  hardware components like chassis, card, port, software components like software-patch, bios, and boot-loader</t>
          </li>
        </ul>
        <t>Board/Card:</t>
        <ul empty="true">
          <li>
            <t>a pluggable equipment can be inserted into one or several slots/sub-slots and can afford a specific transmission function independently.</t>
          </li>
        </ul>
        <t>Port:</t>
        <ul empty="true">
          <li>
            <t>an interface on board</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The meaning of the symbols in this diagram is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefix-in-data-node-names">
        <name>Prefix in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects
  are prefixed using the standard prefix associated with the
  corresponding YANG imported modules, as shown in the following table.</t>
        <table anchor="tab-prefixes">
          <name>Prefixes and corresponding YANG modules</name>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="left">Yang Module</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">inet</td>
              <td align="left">ietf-inet-types</td>
              <td align="left">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">yang</td>
              <td align="left">ietf-yang-types</td>
              <td align="left">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">ianahw</td>
              <td align="left">iana-hardware</td>
              <td align="left">
                <xref target="IANA_YANG"/></td>
            </tr>
            <tr>
              <td align="left">ni</td>
              <td align="left">ietf-network-inventory</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please remove this note.</t>
      </section>
    </section>
    <section anchor="Def">
      <name>Definition of Threat Surface</name>
      <section anchor="overview">
        <name>Overview</name>
        <t><xref target="fig-ne-tsm-framework"/> depicts the overall framework of the network element threat surface management:</t>
        <figure anchor="fig-ne-tsm-framework">
          <name>Network Element Threat Surface Management Framework</name>
          <artwork><![CDATA[
                +------------------+
                |  Threat Surface  |
                +--------+---------+
                         |
      +-------------+----+-------+------------+
      |             |            |            |
      |             |            |            |
      |             |            |            |
      |             |            |            |
 +----v----+  +-----v---+  +-----v---+ +------v------+
 |Interface|  | Service |  | Account | | Version &   |
 |Exposure |  |Exposure |  |Exposure | |Vulnerability|
 +---------+  +---------+  +---------+ +-------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="interface-exposure">
        <name>Interface Exposure</name>
        <t>Device interfaces include physical interfaces (such as Gigabit Ethernet interfaces) and logical interfaces (such as POS, tunnel, and loopback), and IP management layer interfaces for local access.</t>
        <t>Interface exposure is classified as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Unused Interfaces:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The physical status of the interface is Down, but the administrative status is not shutdown.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Set the interface management status to shutdown.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>IP management interface exposure:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The interface has an IP management layer interface configured for local access.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: If the address does not have service requirements, delete the management interface. If the address meets service requirements, check and set the corresponding access control policy, such as ACL, is configured.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The YANG model here is defined based on <xref target="RFC8343"/>, which the preceding interface information related to the threat surface is parsed and obtained from.</t>
      </section>
      <section anchor="service-exposure">
        <name>Service Exposure</name>
        <t>Services refer to all management plane protocol functions running on devices, including SNMP, FTP, Telnet, SSH, TFTP, NTP, RADIUS, TACACS, SYSLOG, PORTAL, NETCONF, RESTCONF, SFTP, HTTP, HTTPS, and RPC.</t>
        <t>Service exposure is classified as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Insecure protocols:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The protocol used by the service is insecure, such as Telnet and SNMPv2.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Disable the service or replace the protocol with a secure one, for example, replace Telnet with SSH.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Abnormal service IP address:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The service binding IP address is invalid or is not within the predefined management address range.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Change the IP address bound to the service to a valid address and set the corresponding security policy.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Weak service security configuration:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The security configuration of the corresponding service is insufficient. For example, weak algorithms or passwords are used, or ACLs are not configured.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Modify all weak security configurations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Abnormal Service port:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: It is found that the service uses an invalid, incorrect, or redundant port, or there is a port that cannot correspond to the service.</t>
              </li>
              <li>
                <t>Recommended security hardening operations: Reconfigure all incorrect ports and disable invalid and redundant ports.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Part of the YANG model here is defined based on <xref target="RFC7317"/>, which the preceding interface information related to the threat surface is parsed and obtained from. The other part may add new definition.</t>
      </section>
      <section anchor="account-exposure">
        <name>Account Exposure</name>
        <t>To add.</t>
      </section>
      <section anchor="version-and-vulnerability">
        <name>Version and Vulnerability</name>
        <t>The software version and vulnerability information directly affect the device threat surface. The any above threat surface may have specific problems in a specific version. The problems may be caused by the device itself or the third-party open-source implementation. Therefore, this information is very important for the overall analysis of the threat surface and needs to be collected and comprehensively used in real time.</t>
        <t>"Bug Fixes and Errata", "Security Advisory"和"Optimal Software Version" use cases in <xref target="I-D.palmero-ivy-ps-almo"/> mention the value about collecting and untilizing these information as well.</t>
      </section>
      <section anchor="operation-key-points">
        <name>Operation Key Points</name>
        <t>Supports full and incremental information reporting.</t>
        <t>Calculates the priorities of different types of exposure plane information and handles anomalies on the threat surface based on the priorities.</t>
        <t>Supports baseline setting and comparison with the baseline to accurately detect exceptions.</t>
        <t>Quickly collects and processes information about a large number of devices.</t>
        <t>Security hardening policies can be automatically delivered and executed.</t>
        <t>...</t>
      </section>
    </section>
    <section anchor="yang-data-model-for-network-element-threat-surface-management-overview">
      <name>YANG Data Model for Network Element Threat Surface Management Overview</name>
      <t>To add.</t>
    </section>
    <section anchor="network-element-threat-surface-management-tree-diagram">
      <name>Network Element Threat Surface Management Tree Diagram</name>
      <t>To add.</t>
    </section>
    <section anchor="tsmyangmodel">
      <name>YANG Data Model for Network Element Threat Surface Management</name>
      <t>To add.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>&lt;Add any manageability considerations&gt;</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>&lt;Add any security considerations&gt;</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>&lt;Add any IANA considerations&gt;</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA_YANG" target="https://www.iana.org/assignments/yang-parameters">
          <front>
            <title>YANG Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5209" target="https://www.rfc-editor.org/info/rfc5209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5209.xml">
          <front>
            <title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
            <author fullname="P. Sangster" initials="P." surname="Sangster"/>
            <author fullname="H. Khosravi" initials="H." surname="Khosravi"/>
            <author fullname="M. Mani" initials="M." surname="Mani"/>
            <author fullname="K. Narayan" initials="K." surname="Narayan"/>
            <author fullname="J. Tardo" initials="J." surname="Tardo"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model. NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system. This may take place during the request for network access and/or subsequently at any time while connected to the network. The learned posture information can then be applied to a variety of compliance-oriented decisions. The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software. In order to provide context for the requirements, a reference model and terminology are introduced. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5209"/>
          <seriesInfo name="DOI" value="10.17487/RFC5209"/>
        </reference>
        <reference anchor="RFC8248" target="https://www.rfc-editor.org/info/rfc8248" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8248.xml">
          <front>
            <title>Security Automation and Continuous Monitoring (SACM) Requirements</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="L. Lorenzin" initials="L." surname="Lorenzin"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines the scope and set of requirements for the Security Automation and Continuous Monitoring (SACM) architecture, data model, and transfer protocols. The requirements and scope are based on the agreed-upon use cases described in RFC 7632.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8248"/>
          <seriesInfo name="DOI" value="10.17487/RFC8248"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8340.xml">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6991" target="https://www.rfc-editor.org/info/rfc6991" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6991.xml">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC8343" target="https://www.rfc-editor.org/info/rfc8343" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8343.xml">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC7317" target="https://www.rfc-editor.org/info/rfc7317" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7317.xml">
          <front>
            <title>A YANG Data Model for System Management</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="August" year="2014"/>
            <abstract>
              <t>This document defines a YANG data model for the configuration and identification of some common system properties within a device containing a Network Configuration Protocol (NETCONF) server. This document also includes data node definitions for system identification, time-of-day management, user management, DNS resolver configuration, and some protocol operations for system management.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7317"/>
          <seriesInfo name="DOI" value="10.17487/RFC7317"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9472" target="https://www.rfc-editor.org/info/rfc9472" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9472.xml">
          <front>
            <title>A YANG Data Model for Reporting Software Bills of Materials (SBOMs) and Vulnerability Information</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>To improve cybersecurity posture, automation is necessary to locate the software a device is using, whether that software has known vulnerabilities, and what, if any, recommendations suppliers may have. This memo extends the Manufacturer User Description (MUD) YANG schema to provide the locations of software bills of materials (SBOMs) and vulnerability information by introducing a transparency schema.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9472"/>
          <seriesInfo name="DOI" value="10.17487/RFC9472"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="August" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to allow manufacturers to define (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software, malware, or security policy-violating traffic on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-18"/>
        </reference>
        <reference anchor="I-D.palmero-ivy-ps-almo" target="https://datatracker.ietf.org/doc/html/draft-palmero-ivy-ps-almo-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.palmero-ivy-ps-almo.xml">
          <front>
            <title>Asset Lifecycle Management and Operations: A Problem Statement</title>
            <author fullname="Marisol Palmero" initials="M." surname="Palmero">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Frank Brockners" initials="F." surname="Brockners">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Sudhendu Kumar" initials="S." surname="Kumar">
              <organization>NC State University</organization>
            </author>
            <author fullname="Camilo Cardona" initials="C." surname="Cardona">
              <organization>NTT</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica I+D</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>This document presents a problem statement for assets lifecycle management and operations. It describes a framework, the motivation and requirements for asset-centric metrics including but not limited to, asset adoption, usability, entitlements, supported capabilities, and enabled capabilities. The document also defines an information model. The primary objective for this problem statement document is to validate and prove that the framework can measure and improve the network operators' experience along the lifecycle journey, from technical requirements and technology selection through renewal, including the end of life of an asset.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-palmero-ivy-ps-almo-02"/>
        </reference>
      </references>
    </references>
    <?line 282?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using kramdown.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA81aa3IbSXL+36cogxG2xgOAkka7GjHWo4H4kBgWH0tQOzsR
jnAUugtALRtdcFc3IJjknMC/fAKfxXfxPfxl1qO7AVArxUY4zJDIflRlZeXj
y6zMHgwGSaWrXB2J3kj8Orp8L05kJcWFyVQupqYUl6pam/JOnOZqoYpK3M5L
JSsxrsupTJW4kIWc8ZteIieTUq1AaWfO+IJp95JUVmpmys2RsFWW2Hqy0NZq
U9xulmDh/PT2LNHL8khUZW2rl8+fv3n+MkkykxZygfdZKafVYF4PCrfAQLkF
BpVdDDaymA2ev2gRrSJRIQ6EzK0Bb7rI1FLhFzjui57KdGVKLXO6OR+9wx9s
und+c3vWS4p6MVHlUZKB66MkNYVVha0ts6eSBDQhiyMxujkd4YY4mpWmXh5F
of2CX7qYiff0OLlTGzzNjhIxEPH/ShU1iB8I4ef+8p5uHO/d+Xi8kDqnIT+r
z3KxzNUwNQt6Lst0fiTmVbW0R4eHrZeHjtxMV/N6QttX1XSgV5vBenYYpKgL
MAEpbFiGPYzPsWFbYXig2Jo2dLSG2jxB4NCpKU7ZP2o4rxZ5L0lkXc0NZCzE
AP+FcJo+U3qqtPhQ8zNTzo7E8VwXUowNxquyENdmrUoIRmc8RDnJzOvp9OfU
zoZpsUXxRBZ3SnwwxexbSWJKdref6EeNnYg/a9nQ/FDLNTi/Vem8MLmZaWXb
1KYl+Bh+hsHR1J/nPJq1SD8wsarUk7oiiSRJYcqFrPQK9gEa56PL0b+SGx0x
Qe+27LPXsgQ/lSrdWo1MI1s02U2T5UxVja2s1+shWJFDDDuU8JtZQS5lD9mf
lg3hRBfTFj+DwUDIia1KmVZJcjvXVsBPa/b3TE11oayQYiKtcixmBCuLCCve
KIT34KRysGI9rCwirIhqjuegLpfLXAM/4NhYuchEFUS8GchZYWyl06Hja6Gz
LGcHPYc8TVanNEvcH2i6fSTBrmUmN7YvSPOK/Bi80QXouotsJYtUZZFRWVUy
vbMCdMIjCKSUkADI16UCMVuncyGtgLeSyPBgrat0Tq9UlQ7FrREEICCPZYVV
aV3qatPerJlG6pla6VQ5FsVUl5ZEQWAAWVRGkKnooja1zTdCL5alWW2RtZWs
aitW2uqJzunJLnXmSaZzrXi2xnLYIJExhRJziMOt74Y3tM1SlawK1nAObQs7
N3WeiYny6s/4VUb03Ox/sIINOgeZ0u/NGqdfWkNOwmvHOLhtLY1dawJtPdUg
qgsBe8nhBAvVrEPDOXLkGtKyeqFzWYoF7EQW2i76JLeoAKwq87wRMwRaKDYU
3LB9AcamOsV85RhUn5cYwNseiisvJjIgL6jJxiuctFQZtyk2GwyBwCxNh/fQ
WlCYmoMX3EJ/TmKO/64jQAiRQzZOthWxNBXJAhIotYVVQh6ShZGzORVYEIRM
PZtHqTnX8RZecNRzbLZMEjJYKeBD4Vbe5QcOdtn13G2GW8asSeGQMoxuTaRT
taywi6gY/4jGnX6GwxTYzojltSe9EM9OR+OL78R6ruFkhDYBZKzolWoK8QaZ
wxcgL8u+EzGiJb0sGiCILHOzwRNMzbRN4UQlhEnMqGoAFkhGiu6XEDTUCbKV
ZVp2Yyu1cNd4bFKNoJmRkRiSpw2cFmleZ5ALUS+meoZ3mVjWE4CZSHNTt7hh
srhh7GBCRLBZnTE0gEwKOs4G3ER4b5kRYMM96TfZgDXTak3glgJ4xarO8VAy
GCAsOR9Ig9divdxo2gLsGPAHJmSJYcPeEDDKeENo1xekBwZkpAmwldJLwglY
IfJkLPA+WZCTQdWJDrB8SxGGLAEeQaZJAObMyRlpO0JEpAITMkO6hgEelPQU
amdjnWCwUsU+D2L9OKsKjwqlMrYWbDvFJhhTAIW7kxdywzY8l6td+YHJCdHf
Ij9ElrEGnpZ9odm4gya9eSLEzhnpAzY4/dFU69e3yBPMAhO9V8SRzCSsHSGq
30V7wgFabA7qbitbm07BKLGbsm+wluet5ecwqa0N9kPsDRuZAO3ibmhSmJAr
D5n7OIIkNp4tqNDWi4UsYR0MDQDgrsThNhoPJwoQub0FDk4AOG+ptOzObOaY
vDiH5vz0FWDXlFuUd7U2Nn0HEIyLDu/ZlWHVsrABHMPbrelJcu7Mb8lOQld8
8iC5ZhRMLS3r8wZHAJyTGUSBYTVKJByyeTtPTZ67qNQPSAP1kaf0PbQEfghN
CWmy5shWZEsDMBOjOEk8uzwdfceUxmHZEdLNRRMcjmNigVNgjBPPxqNjQl9/
IOGzihX39393c3b8u5fP3zw+uusfX7768fGx5QJgjUKSJsVR2MuRTTo7qbCa
LLPWdkkaCD6wqFzUlkzWelQs1b/VumSEoECI0w6QitMufg3Ci7oIIQ74XxkI
zofMCILxAEK64zS7K2sanBk2TJ9dKY6P8MLC2buP05whRuza0R9nua10kHbb
RbMdmOG8GHw712IDaUHmEBrETJuCafK8iaEkwpsRFi9Js1ZXtQxShGlgAQtV
QexTkh4N2c5lveigk8/OxoOjr2ReO/cy7dzkr2yZRktvTClcG3qHZGcIizCA
vwAtO9DASQu0HJEe4HajUvCZb/re/0jw2PDFpxN3iGjOD+N3VxcdCHIZbjyj
ODH42BEzUqx4f/8WZvrm1euXj48NaH1pqWcn391+HJN2pjoHMXp2bm4j8bba
QP18cDLks69ZWrmeDRZ1NqhyS6tZxQmDDf5KJhZ5dblu2xW+QuSAneT+/kRN
Hx/djH3HMKKDHBlEpnSaYxPYm921kjcXQjJV4dRq+Xwkaed5btaWTn/iFwJa
yjPcW5/mZG/J853Z0FFSKBwueNhbMfZbIcvoIzOgBDz4ocu/OTuSrRS8rIuC
4MafCNra7Swa+MGWdAmwyB2RuV6SNef6Dvg8AMADge8UiVBT/gF9xXPMUcie
Qxa46beOWK1DVJ/iGbYhwy2dgFW8Q6Jmtg517vCXJO/axxT24Za+seH7+8ou
6NTNmv1rCt0y0tZJ6WmdUonh4EDcqnKhW1nxpXFpl6UqA6nd6ZkDC4Y6BXdc
iJD+9ZvfPQeTHJTwHqiJ2ZSTunGUpnDZ4h8FcixNZ3x34xJcfyPr2aJ51dQI
2g8KPPgmzn7/8tWLLmcNX6DT4axtdLxc4LIi2AoPODNsSY0k7vGYeNkqcFgy
uqmpC+IJs9vyGhK5sz27qMk4giZL5ZPkDjrglF5y6FM2gH9TivChjelv1V95
sz8h3XamwMAe6y8wcVirPwpgQY1MZ46wzBGzEz4RYCn4quFsyGe6TkDDtAqO
7Qyc0h2G+xWHchy/rdVsXcfuMnI0N3mGCLB11He03EGbRo5zUz0xZWLAKw86
RiDDwq3tEsNh3Fa9yW+j2WkaZju4CDwDBDACbm3Kqt8+TnVHhxc4fuH43xcT
bTyCTYypBrmRmTP5d8Tu4bGkKrDncpnXsxnrhHKcJTu6z9UhCFVWbNpA1C2p
WgjFHtp6MuArF8wprZ3CirL24QoIVVhfExfTunDVsFYhPHdmc41NBrYKdwp2
NYjCiZnB46aViUXkoAKgg1YqcONAfvFpfEsVdforLq/4+ub0j5/Ob05P6Hr8
YfTxY7xI/Ijxh6tPH0+aq2bm8dXFxenliZuMp6LzKOldjH7tOYH3rq5vz68u
Rx97O2kU+5k79Wl3qFYkXGmTJrfCnHfH1//9Xy9eebd9+eIFklt/8+OL169w
s54rny7yecTdUqKbyOVSyZLLMThrpHKJYwrnoZbqY+uCwWeY/OEtl8wGv3/7
k4fkUilxouUMATpx0qSEjCAiJAKbxcTkttmUG9xUQloA+OMPrxzUgPI1Tov6
M73jxs4lFQIukQWwO55vSajPdW0uvUXodZbl6lytIq6Z/AUJONWbSapLXgU8
1DacR2J+7961ayRrXVFRQCUEwMheLZwpi0CqF+RtispUWZ2rtvQ86rWiADkO
NvoQ9vkgfqWS/AVPFft+HmDCoWzA95g84B8RLp782R7BkyH7ium6jgcVjqh7
Y/es7OPTmzcUn3gyxftmMtfcv34y1e3na+EuBhHL9u35/j62DzCbJhfav+KV
d5o0HYGdHYs/48ffJ/dH4gCSH3itW9eL+Kfedbh3B4sdzXqF9h6ThEiecu+N
QATx+DpX1CtA5MsJc3i5YCfMgGvGCdeiCNWU9iGpIbEwvppNsZ/M40CcdDLr
rSbm/QFl0OwuVysqxqk1pdXIDCAXbi7GxBnCA2xqWL4r/zIW57uJdfG1VVIA
7m+//ZZsa+z7XeP7fmfQg9jeCZTzJKXvv0CpIZnsW//79vzOq0DqYZuxp27+
/43n/ax4M2Hfq90bv+tV3PbDeQiQD0Rz7Iq4gm9GaYr0r8LVg/iTKjnw/r1b
7eE0VJVo5FM3D39qH2sDk4MOk3tutrTmTIu8dZ8pB6/96g6/OAtTe85ZogRE
YD1JTkIO51/ZWAFfzjeWTn/td89CjeS9Rg6EdO2UW7EA1GaQK1dRK/WpyddX
Y8RfnBVV3veDzXIi07vv3O35dbstkctNKPI7OpR154aIu+Io8kKq5oW9xTIg
8CTNCX+4BbV1Hv5UcAYfp1luabdw54hPEVEI3SZXk2xhkROEOuSQtW+LZTh2
aGq0Uu8oHoVdb8XO6yrD8CEvdkO1zYUrZMR6AYUF5TKJ5rA79i2tZt2WgPwS
ANiG/GBLiHpHPPv324yjQijSyi/qQrRaJDta+cYtnk+9+DKEIQoTyjalfN9y
2aorIq8J1cl9Wx1u06TOoH2CVjpX6Z3v6FS+4NMOiG5Trq1ichwwcp1umprh
6Phjnw0uCmTo0sLWuZ9b1638L/ZBYxb4A1WdQg+Gs7RU8eote2vVVLhw0jQq
tmIWVlrKMpT+zYTOiqSn0ixIN/QPmBBwsEGEcWhvcZeOi4SImC0BI+IXKlZt
4wnFxvJPbCHbdtF7fHlx3Rdnt/h1q4CWyF7H4w+44UeX9OtmdHL+CdhwOzoe
HePv+Nfxx6v3fQDGze0IAr48vT2+ujzDwNOxvxrz7A+34ffYQcjN9fEwbuUr
IeG8YAtttvYUJoSd174v49ooZex7ezqNdbj9ujI+pLB6+a3OcaKtb580K5ky
Zl9VmyvOwqTwe8EptM++6T8y6sdJnikeDkUQZowm3Y4/eb93nv2iCOMm2nlJ
M94JYiVznRGnHv9oMX8oWDa1p5Zthdk4As/Ut0rpeE6zXC+nYWTClZ3QzPMM
k1ULx10Y97Tvt2q55PUkqV+UvIvE4vtOeeopie0bG+LK9rptm6rp6wbNtd6z
tj7XxIrMZ1THnC+4zbmEibuTfShV8WdyACkbS2xtpPo2MeOwpqcbRoW1E8O+
LdmOQQVPXHLNYlsw51VTgovfl4Td166pFKyJIYXElFZ95wMZpknCJS76uJKc
83XJz3y1TBZu20HCWybxbVKwRzzUi5BlEdniRZ09Zd5vgye43libYYgpuZZl
LHx9fbx4/cOL1/9X8YJN19UUqDnAfXb4DX8p0hTFh8jDOKiEfLoJKvTZUkYx
kV6HFJvW6STOLmTGst2qNe7pvlGmSej5hippJP0nS+u+zV5sfDV/z7cDLtkI
hThAKpS38J/rxMeerWEIBm4MTafvE2Q7KoQKaWVVPvWm2fnyAwZVDKypSxrV
+ahi69MB3W2nhD69K76QMYVadDjiAlNz5K72idYRybTzXYVrXHvtb3/wVNut
j7igyd67eibOYv3gtIRnSC4Gxk51ttLWlJve//znf/SulphHSBC0662g12od
Nx25pcwXqjT8QerSDnBncJQn4WjfkaGeJ/dl6ip23SlPAyswPZjJv/vKlu06
AcLxWuW5q7Zdxe/i/lltxDX3mZA21EvnwtOaBZm5/iyrJt/yKBqIhUDuWOZp
zV/iemfkzpL25Tn/7UslXLkIj2JS4vKpDo/8gUeR5SxbA7Exmb3fy3S+pmsW
Hba20Xzzp6ooJFKxLKGfoqnbxIEUHtOUkNx97kbNezBMn385aE/+WOv0jr8R
YNE7G4hfcnV3wzrynx+FulDT7eU8bQdpOdTSrsN3MJ1GNeARhll6a1WfMb/i
lHs45K4Z5bZ/2+fxrcpSxK6Db5jerRC3SPxtXIn7g07XsUP6wveLHEYeQ1E6
C/GKZPIvfxhlGQPgojMy7Yz8iUhFjXyJSjvwbxOg8uUXJ/OAnYlUpKVKALc+
EUfuCrPOVcZdR5sk218uryX18xUMOday7yBwdwb+X3nEQ+stMQAA

-->

</rfc>
