[Openid-specs-risc] Call notes

Atul Tulshibagwale atultulshi at gmail.com
Tue Mar 22 18:04:44 UTC 2022


Hi all,
Notes from today's call are below. They are also stored here
<https://github.com/openid/sse/wiki/WG_Meeting-2022-03-22>.
SSE Working Group: 2022-03-22
<https://github.com/openid/sse/wiki/WG_Meeting-2022-03-22#agenda>Agenda

   - SSE for Cybersecurity - Martin's feedback
   - Explicit Token Revoked event for CAEP?
   - Continue cyber security applications of SSE discussion
   - VeriClouds demo

<https://github.com/openid/sse/wiki/WG_Meeting-2022-03-22#attendees>
Attendees

   - Atul Tulshibagwale (SGNL)
   - Badi Azad (Google)
   - Jason Garbis (AppGate)
   - Martin Gallo (SecureAuth)
   - Stefan Duernberger (Cisco)
   - Gail Hodges (OIDF)
   - Tom Sato (VeriClouds)
   - Mike Virginio (Wayfair)
   - Stan Bounev (VeriClouds)

<https://github.com/openid/sse/wiki/WG_Meeting-2022-03-22#notes>Notes

   -

   Martin's feedback to 'Sharing Cybersecurity Signals'
   - Difference between 'Threat Information' versus 'Threat Intelligence'
      - These are separate concepts. So do we see SSE as a way of sharing
      Threat Information or Threat Intelligence
      - Threat Information is pieces of evidence of events that are
      happening
      - Threat Intelligence is aggregation of Threat Information and the
      analysis of it in order to conclude about the intent, techniques and
      procedures of the threat actor
      - Pulling different types of events or information
      - Every major Threat Intelligence vendor has implementations of STIX
      / TAXII standards
      - Can SSE be used to provide threat information that is specific to
      identity events?
   -

   Trustworthiness of the data to be shared: Data sovereignty is a big
   concern in Europe, something we should think about.
   -

   There are some standards for data classification.
   -

   Ensure that parties data is being shared with are trusted, and there are
   no leaks
   -

   VeriClouds uses SSE to share compromised credential SET. Actual password
   is not shared, but a verifier is shared.
   -

   Authentication and authorization of Transmitter and Receiver are built
   into SSE
   -

   SSE is a communication protocol that doesn't assure the trustworthiness
   of the content of the stream
   -

   The current SSE spec can be used for verifying compromised credentials
   -

   When we use STIX / TAXII, it goes into the dashboards of the Receiver,
   along with a lot of other signals (SIEM, Network monitoring, etc.)
   -

   They need a way to prioritize. If they do not have the compromised
   password, then they cannot determine the importance of the signal received
   from the credential monitoring service
   -

   There is some potential with security companies in order to use the
   'compromised credential' event
   -

   The 'device compliance' is binary and asserted by the Transmitter in
   CAEP. That may not always be the case. E.g. for accessing some data certain
   patch levels are OK, but for others we may need to have a higher patch
   level to the OS of the device being used to access.
   -

   There's an opportunity to use SSE to provide identity-related events.
   -

   We may identify new types of events, but we will know when we talk to
   cyber security companies.
   -

   We need to be cautious to not distract from existing targets of the
   group in order to explore the cyber-security angle
   -

   If it's already in the spec, and just getting other companies to
   potentially use it, that is something we could push forward with
   -

   What is the handoff between SSE and STIX and TAXII? We could address
   this too in the document
   -

   Explore additional use cases that can be covered with SSE - we can add
   this to the hypothesis document
   -

   If some use-cases are lower priority, we can put them in the appendix
   (e.g. those we think are already covered in the cyber security standards)
   -

   VeriClouds demo
   -

   How can SSE be improved to help make a better product?
   - Receiver has to make a CredVerify API call, there is no way to do this
      in the standard today. It would be nice to do this using SSE
      - Can the SSE event have the password verifier in it?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20220322/5bd99870/attachment.html>


More information about the Openid-specs-risc mailing list