Component/s: Start TC
Bret submitted charter for new TC:
Section 1: TC Charter
(1)(a) TC Name
Collaborative Automated Course of Action Operations (CACAO) for Cyber Security
(1)(b) Statement of Purpose
This TC will create a standard that implements the course of action playbook model for cybersecurity operations. Each type of collaborative course of action playbook, such as prevention, mitigation and remediation will consist of a sequence of cyber defense actions that can be executed by the various technological solutions that can act on those actions. These course of action playbooks should be referenceable by other cyber threat intelligence that provides support for related data such as threat actors, campaigns, intrusion sets, malware, attack patterns, and other adversarial techniques, tactics, and procedures.
This TC may submit the specifications produced by this TC to other standards bodies (e.g., ITU-T, ETSI) for additional ratification.
To defend against threat actors and their tactics, techniques, and procedures, organizations need to manually identify, create, and document prevention, mitigation, and remediation steps. These steps when grouped together form a course of action playbook that can be used to protect systems, networks, data, and users. The problem is, once these course of action playbooks have been created there is no standardized and structured way to document them or easily share them across organizational boundaries and technological solutions.
This solution will specifically enable:
1. the creation and documentation of course of action playbooks in a structured machine-readable format
2. organizations to digitally sign course of action playbooks
3. the securely sharing and distribution of course of action playbooks across organizational boundaries and technological solutions
4. the creation and documentation of processing instructions for course of action playbooks in a machine readable format
It is out of scope of the WG to define or recommend actual investigation, detection, prevention, mitigation, and remediation steps for a given specific threat (e.g., defining how to remediate Fuzzy Panda on Windows™ 10). The TC will not consider how shared actions are operationalized on specific systems, except where it is necessary for those actions to interact with the playbook including the response expected for a specific action or step.
This TC has the following major goals and deliverables
- CACAO Use Cases and Requirements
- The TC will identify and document the core requirements needed to support the common use cases that are done today.
- CACAO Functional Architecture: Roles and Interfaces
- The TC will specify the system functions and roles that are needed to enable collaborative courses of action playbooks.
- CACAO Protocol Specification
- The TC will identify and standardize the configuration for at least one protocol that can be used to distribute course of action playbooks over the interfaces identified in the CACAO functional architecture.
- CACAO Data Model
- This TC will define a normative data model for CACAO using property tables similar to how the OASIS STIXv2 data model was defined. This data model will be designed to explicitly work with I-JSON and all examples will be done in JSON. The TC will also define JSON as the mandatory to implement serialization for this version of CACAO. The TC may decide to also document the data model in other non-normative forms that would be located in an appendix.
- CACAO Interoperability Test Documents
- This TC will define and create a series of tests and documents to assist with interoperability of the various systems involved. These documents can be used by technological solutions adopting the CACAO course of action playbooks to help ensure that they do so in an interoperable manner. The TC will decide how best to publish these documents.
(1)(e) IPR Mode
Security Vendors, Incident Responders, Security Operation Centers (SOCs), Cyber Defense Centers, Threat Intelligence Analysts, Large Enterprise, Governments
(Optional References for Section 1)
Section 2: Additional Information
(2)(a) Identification of Similar Work
We do not know of any existing open source or open standard solutions that address security playbooks. There are several proprietary solutions that exist, but those are not shareable in an open standards way. Some solutions like BPMN exist that deal with process management for a business in XML format. However, this group does not believe that BPMN is the best solution for trying to solve the cyber security playbook problem. Some additional frameworks such as:
may be utilized or referenced in the design of CACAO playbooks.
(2)(b) First TC Meeting
Tuesday September 24th 20th 2019 at 11:00 AM US-ET and will be done via Zoom. Tentative schedule will be:
- submit charter to OASIS 7/15
- start call for comment 7/16
- end call for comment 7/31
- convener call 8/5
- call for participation (assuming nothing needs to change) - 8/7
- first meeting 9/24
(2)(c) Ongoing Meeting Schedule
The TC will plan on having bi-weekly meetings on Tuesdays at 11:00 AM US-ET.
(2)(d) TC Proposers
Bret Jordan - Bret_Jordan@symantec.com
Allan Thomson - firstname.lastname@example.org
Jyoti Verma - email@example.com
Jason Keirstead - Jason.Keirstead@ca.ibm.com
Allen Hadden - firstname.lastname@example.org
Arnaud Taddei - email@example.com
(2)(e) Primary Representatives' Support
“CACAO Technical Committee represents a significant opportunity to define a standard mechanism for security playbook for security operations and incident response. LookingGlass Cyber Solutions firmly supports the creation of this TC and will provide active support in creating the specifications” - Allan Thomson, CTO, LookingGlass Cyber Solutions.
“The need for automated and shareable cyber security playbooks is critical to improving operational cyber security. CACAO will enable organizations, both big and small, to prevent, mitigate, or remediate cyber threats more quickly and with greater confidence. Symantec Corporation fully supports the creation of this TC and the participation of our proposer(s) listed above.” - Bret Jordan, Director Office of the CTO, Symantec Corporation.
"The ability to efficiently collaborate across vendors on incident response actions and playbooks, will fill a critical gap in the cybersecurity operations ecosystem, and enable better outcomes for our clients. IBM Security is proud to support the formation of this TC and the participation of our proposers listed above." - Jason Keirstead - Chief Architect of Threat Management, IBM Security
(2)(f) TC Convener
Bret Jordan - firstname.lastname@example.org
(2)(g) OASIS Member Section
(2)(h) Anticipated Contributions
(2) FAQ Document
(2)(j) Work Product Titles and Acronyms