<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hu-opsawg-network-element-tsm-yang-00" category="info" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Network Element TSM YANG">A YANG Data Model for Network Element Threat Surface Management</title>
    <seriesInfo name="Internet-Draft" value="draft-hu-opsawg-network-element-tsm-yang-00"/>
    <author initials="F." surname="Hu" fullname="Feifei Hu">
      <organization>China Southern Power Grid</organization>
      <address>
        <email>huff@csg.cn</email>
      </address>
    </author>
    <author initials="D." surname="Hong" fullname="Danke Hong">
      <organization>China Southern Power Grid</organization>
      <address>
        <email>hongdk@csg.cn</email>
      </address>
    </author>
    <author initials="L." surname="Xia" fullname="Liang Xia">
      <organization>Huawei Technologies</organization>
      <address>
        <email>frank.xialiang@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="30"/>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword/>
    <keyword/>
    <keyword/>
    <abstract>
      <?line 58?>

<t>This document defines a base YANG data model for network element
threat surface management that is application- and technology-agnostic.</t>
    </abstract>
  </front>
  <middle>
    <?line 63?>

<section anchor="intro">
      <name>Introduction</name>
      <t>With more and more advanced network attacks on network infrastructures, one important thing of network device security management is to increase the security visibility. To achieve this, on the one hand, the device normal security posture should be defined in advance, so that the abnormal security status or operation of the device can be identified timely.  On the other hand, from the attacker perspective, how to comprehensively define the threat surface of device, and manage potential risks through timely monitoring is becoming vital.</t>
      <t>Network element threat surface management has a similar concept as External Attack Surface Management (EASM) which is defines as "refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers, exposed enterprise data such as credentials and third-party partner software code vulnerabilities that could be exploited by adversaries.".  Comparing with EASM as a larger system and methodology, this document presents a specific implementation for network device threat surface management. Furthermore, the difference between the threat surface and attack surface is clarified briefly here: The threat surface may not have vulnerabilities or be an attack surface. However, it is exposed to the attackers and faces threats from them.  Therefore, its security risk is high.  However, the attack surface can be accessed by attackers and has vulnerabilities, that is, it is both exposed and vulnerable, and the security risk is very high.  In summary, not all threat surfaces will become attack surfaces, only exploitable threat surfaces with corresponding attack vectors will become an attack surface.</t>
      <t>In the past, the IETF has existing work about security posture definition, collection, and assessment, including the concluded Network Endpoint Assessment (NEA) and Security Automation and Continuous Monitoring (SACM) working groups <xref target="RFC5209"/><xref target="RFC8248"/>. They have mainly finished the standard definition of general use cases and requirements, architecture and communication protocols, and software inventory attribute definition and so on. Recently, the extended MUD YANG model for SBOM and vulnerability information of devices defined in <xref target="RFC9472"/>, and the extended MUD YANG model for (D)TLS profiles for IoT devices proposed in <xref target="I-D.ietf-opsawg-mud-tls"/>, are all aiming to propose the specific security posture model definition. Similarly, this document proposes the device threat surface YANG model.</t>
      <t><xref target="Def"/> of this document defines the basic framework of the threat surface management.</t>
      <t>Based on the above definitions, <xref target="tsmyangmodel"/> of this document defines the YANG model for the device threat surface management.</t>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The following terms are defined in <xref target="RFC7950"/> and are not
  redefined here:</t>
        <ul spacing="normal">
          <li>
            <t>client</t>
          </li>
          <li>
            <t>server</t>
          </li>
          <li>
            <t>augment</t>
          </li>
          <li>
            <t>data model</t>
          </li>
          <li>
            <t>data node</t>
          </li>
        </ul>
        <t>The following terms are defined in <xref target="RFC6241"/> and are not redefined
  here:</t>
        <ul spacing="normal">
          <li>
            <t>configuration data</t>
          </li>
          <li>
            <t>state data</t>
          </li>
        </ul>
        <t>The terminology for describing YANG data models is found in
  <xref target="RFC7950"/>.</t>
        <t>Following terms are used for the representation of the hierarchies in the network inventory.</t>
        <t>Network Element:</t>
        <ul empty="true">
          <li>
            <t>a manageable network entity that contains hardware and software units, e.g. a network device installed on one or several chassis</t>
          </li>
        </ul>
        <t>Chassis:</t>
        <ul empty="true">
          <li>
            <t>a holder of the device installation.</t>
          </li>
        </ul>
        <t>Slot:</t>
        <ul empty="true">
          <li>
            <t>a holder of the board.</t>
          </li>
        </ul>
        <t>Component:</t>
        <ul empty="true">
          <li>
            <t>a unit of the network element, e.g.  hardware components like chassis, card, port, software components like software-patch, bios, and boot-loader</t>
          </li>
        </ul>
        <t>Board/Card:</t>
        <ul empty="true">
          <li>
            <t>a pluggable equipment can be inserted into one or several slots/sub-slots and can afford a specific transmission function independently.</t>
          </li>
        </ul>
        <t>Port:</t>
        <ul empty="true">
          <li>
            <t>an interface on board</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="tree-diagram">
        <name>Tree Diagram</name>
        <t>The meaning of the symbols in this diagram is defined in <xref target="RFC8340"/>.</t>
      </section>
      <section anchor="prefix-in-data-node-names">
        <name>Prefix in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects
  are prefixed using the standard prefix associated with the
  corresponding YANG imported modules, as shown in the following table.</t>
        <table anchor="tab-prefixes">
          <name>Prefixes and corresponding YANG modules</name>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="left">Yang Module</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">inet</td>
              <td align="left">ietf-inet-types</td>
              <td align="left">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">yang</td>
              <td align="left">ietf-yang-types</td>
              <td align="left">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">ianahw</td>
              <td align="left">iana-hardware</td>
              <td align="left">
                <xref target="IANA_YANG"/></td>
            </tr>
            <tr>
              <td align="left">ni</td>
              <td align="left">ietf-network-inventory</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document.
Please remove this note.</t>
      </section>
    </section>
    <section anchor="Def">
      <name>Definition of Threat Surface</name>
      <section anchor="overview">
        <name>Overview</name>
        <t><xref target="fig-ne-tsm-framework"/> depicts the overall framework of the network element threat surface management:</t>
        <figure anchor="fig-ne-tsm-framework">
          <name>Network Element Threat Surface Management Framework</name>
          <artwork><![CDATA[
                +------------------+
                |  Threat Surface  |
                +--------+---------+
                         |
      +-------------+----+-------+------------+
      |             |            |            |
      |             |            |            |
      |             |            |            |
      |             |            |            |
 +----v----+  +-----v---+  +-----v---+ +------v------+
 |Interface|  | Service |  | Account | | Version &   |
 |Exposure |  |Exposure |  |Exposure | |Vulnerability|
 +---------+  +---------+  +---------+ +-------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="interface-exposure">
        <name>Interface Exposure</name>
        <t>Device interfaces include physical interfaces (such as Gigabit Ethernet interfaces) and logical interfaces (such as POS, tunnel, and loopback), and IP management layer interfaces for local access.</t>
        <t>Interface exposure is classified as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Unused Interfaces:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The physical status of the interface is Down, but the administrative status is not shutdown.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Set the interface management status to shutdown.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>IP interface exposure:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The interface has the IP (including primary and secondary IP addresses) configured for local access.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: If the address does not have service requirements, delete the management interface. Otherwise, check and set the corresponding access control policy, such as ACL, is configured.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>With the existing definitions of A YANG Data Model for Interface Management <xref target="RFC8343"/> and A YANG Data Model for IP Management <xref target="RFC8344"/>, the interface exposure information can be retrieved with NETCONF <xref target="RFC6241"/> Subtree Filtering mechanism as following example:</t>
        <artwork><![CDATA[
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="101">  
  <get-data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda" 
            xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">  
    <datastore>ds:operational</datastore>  
    <subtree-filter> 
      <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">  
        <interface> 
          <name/>  
          <type/>  
          <enabled/>
          <oper-status/>  
          <admin-status/>
          <if-index/>          
          <phys-address/> 
                 <ipv4>
                 <address/>
                 </ipv4>
                 <ipv6>
                 <address/>
                 </ipv6>
        </interface> 
      </interfaces> 
    </subtree-filter> 
  </get-data> 
</rpc>
]]></artwork>
        <t>In addition, the realtime change of the above information can be notified on time with NETCONF pub/sub mechanisms <xref target="RFC8639"/><xref target="RFC8640"/><xref target="RFC8641"/> as following examples:</t>
        <artwork><![CDATA[
<netconf:rpc xmlns:netconf="urn:ietf:params:xml:ns:netconf:base:1.0" 
             message-id="101">  
  <establish-subscription 
    xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications" 
    xmlns:yp="urn:ietf:params:xml:ns:yang:ietf-yang-push">  
    <yp:datastore xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
      ds:operational
    </yp:datastore>  
    <yp:datastore-subtree-filter> 
      <interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">  
        <interface> 
          <name/>  
          <type/>  
          <enabled/>
          <oper-status/>  
          <admin-status/>
          <if-index/>          
          <phys-address/> 
                  <ipv4>
                   <address/>
                  </ipv4>
                  <ipv6>
                   <address/>
                  </ipv6>
        </interface> 
      </interfaces> 
      </interfaces> 
    </yp:datastore-subtree-filter>  
    <yp:on-change/> 
  </establish-subscription> 
</netconf:rpc>
]]></artwork>
      </section>
      <section anchor="service-exposure">
        <name>Service Exposure</name>
        <t>Here, services refer to the corresponding protocols running on devices, including SNMP, FTP, Telnet, SSH, TFTP, NTP, RADIUS, TACACS, SYSLOG, PORTAL, NETCONF, RESTCONF, SFTP, HTTP, HTTPS, and RPC.</t>
        <t>Service exposure is classified as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Insecure protocols:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The protocol used by the service is insecure, such as Telnet and SNMPv2.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Disable the service or replace the protocol with a secure one, for example, replace Telnet with SSH.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Abnormal service IP address:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The service binding IP address is invalid or is not within the predefined management address range.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Change the IP address bound to the service to a valid address and set the corresponding security policy.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Weak service security configuration:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: The security configuration of the corresponding service is insufficient. For example, weak algorithms or passwords are used, or ACLs are not configured.</t>
              </li>
              <li>
                <t>Recommended security hardening operation: Modify all weak security configurations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Abnormal Service port:
            </t>
            <ul spacing="normal">
              <li>
                <t>Definition: It is found that the service uses an invalid, incorrect, or redundant port, or there is a port that cannot correspond to the service.</t>
              </li>
              <li>
                <t>Recommended security hardening operations: Reconfigure all incorrect ports and disable invalid and redundant ports.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="account-exposure">
        <name>Account Exposure</name>
        <t>To add.</t>
      </section>
      <section anchor="version-and-vulnerability">
        <name>Version and Vulnerability</name>
        <t>The software version and vulnerability information directly affect the device threat surface. The any above threat surface may have specific problems in a specific version. The problems may be caused by the device itself or the third-party open-source implementation.</t>
        <t>With the existing definitions of A YANG Data Model for Network Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, the version and vulnerability information can be retrieved with NETCONF <xref target="RFC6241"/> Subtree Filtering mechanism as following example:</t>
        <artwork><![CDATA[
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="101">  
  <get-data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda" 
            xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">  
    <datastore>ds:operational</datastore>  
    <subtree-filter> 
      <network-inventory 
            xmlns="urn:ietf:params:xml:ns:yang:ietf-network-inventory">  
        <network-elements> 
          <network-element> 
            <ne-id/>  
            <ne-type/>  
            <name/>  
            <hardware-rev/>  
            <software-rev/>  
            <software-patch-rev/>  
            <product-name/>  
            <components> 
              <component> 
                <component-id/>  
                <name/>  
                <hardware-rev/>  
                <software-rev/>  
                <software-patch-rev/>  
                <product-name/> 
              </component> 
            </components> 
          </network-element> 
        </network-elements> 
      </network-inventory> 
    </subtree-filter> 
  </get-data> 
</rpc>
]]></artwork>
      </section>
    </section>
    <section anchor="tsmyangmodel">
      <name>YANG Data Model for Network Element Threat Surface Management</name>
      <t>To add.</t>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>&lt;Add any manageability considerations&gt;</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>&lt;Add any security considerations&gt;</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>&lt;Add any IANA considerations&gt;</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA_YANG" target="https://www.iana.org/assignments/yang-parameters">
          <front>
            <title>YANG Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC5209" target="https://www.rfc-editor.org/info/rfc5209" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5209.xml">
          <front>
            <title>Network Endpoint Assessment (NEA): Overview and Requirements</title>
            <author fullname="P. Sangster" initials="P." surname="Sangster"/>
            <author fullname="H. Khosravi" initials="H." surname="Khosravi"/>
            <author fullname="M. Mani" initials="M." surname="Mani"/>
            <author fullname="K. Narayan" initials="K." surname="Narayan"/>
            <author fullname="J. Tardo" initials="J." surname="Tardo"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the problem statement, scope, and protocol requirements between the components of the NEA (Network Endpoint Assessment) reference model. NEA provides owners of networks (e.g., an enterprise offering remote access) a mechanism to evaluate the posture of a system. This may take place during the request for network access and/or subsequently at any time while connected to the network. The learned posture information can then be applied to a variety of compliance-oriented decisions. The posture information is frequently useful for detecting systems that are lacking or have out-of-date security protection mechanisms such as: anti-virus and host-based firewall software. In order to provide context for the requirements, a reference model and terminology are introduced. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5209"/>
          <seriesInfo name="DOI" value="10.17487/RFC5209"/>
        </reference>
        <reference anchor="RFC8248" target="https://www.rfc-editor.org/info/rfc8248" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8248.xml">
          <front>
            <title>Security Automation and Continuous Monitoring (SACM) Requirements</title>
            <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
            <author fullname="L. Lorenzin" initials="L." surname="Lorenzin"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document defines the scope and set of requirements for the Security Automation and Continuous Monitoring (SACM) architecture, data model, and transfer protocols. The requirements and scope are based on the agreed-upon use cases described in RFC 7632.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8248"/>
          <seriesInfo name="DOI" value="10.17487/RFC8248"/>
        </reference>
        <reference anchor="RFC7950" target="https://www.rfc-editor.org/info/rfc7950" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7950.xml">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6241" target="https://www.rfc-editor.org/info/rfc6241" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6241.xml">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8340" target="https://www.rfc-editor.org/info/rfc8340" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8340.xml">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6991" target="https://www.rfc-editor.org/info/rfc6991" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6991.xml">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC8343" target="https://www.rfc-editor.org/info/rfc8343" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8343.xml">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7223.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8343"/>
          <seriesInfo name="DOI" value="10.17487/RFC8343"/>
        </reference>
        <reference anchor="RFC8344" target="https://www.rfc-editor.org/info/rfc8344" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8344.xml">
          <front>
            <title>A YANG Data Model for IP Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for management of IP implementations. The data model includes configuration and system state.</t>
              <t>The YANG data model in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
              <t>This document obsoletes RFC 7277.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8344"/>
          <seriesInfo name="DOI" value="10.17487/RFC8344"/>
        </reference>
        <reference anchor="RFC8639" target="https://www.rfc-editor.org/info/rfc8639" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8639.xml">
          <front>
            <title>Subscription to YANG Notifications</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8639"/>
          <seriesInfo name="DOI" value="10.17487/RFC8639"/>
        </reference>
        <reference anchor="RFC8640" target="https://www.rfc-editor.org/info/rfc8640" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8640.xml">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over NETCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document provides a Network Configuration Protocol (NETCONF) binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8640"/>
          <seriesInfo name="DOI" value="10.17487/RFC8640"/>
        </reference>
        <reference anchor="RFC8641" target="https://www.rfc-editor.org/info/rfc8641" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8641.xml">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9472" target="https://www.rfc-editor.org/info/rfc9472" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9472.xml">
          <front>
            <title>A YANG Data Model for Reporting Software Bills of Materials (SBOMs) and Vulnerability Information</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>To improve cybersecurity posture, automation is necessary to locate the software a device is using, whether that software has known vulnerabilities, and what, if any, recommendations suppliers may have. This memo extends the Manufacturer User Description (MUD) YANG schema to provide the locations of software bills of materials (SBOMs) and vulnerability information by introducing a transparency schema.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9472"/>
          <seriesInfo name="DOI" value="10.17487/RFC9472"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="August" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to allow manufacturers to define (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software, malware, or security policy-violating traffic on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-18"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang" target="https://datatracker.ietf.org/doc/html/draft-ietf-ivy-network-inventory-yang-03" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ivy-network-inventory-yang.xml">
          <front>
            <title>A YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>This document defines a base YANG data model for network inventory that is application- and technology-agnostic. This data model can be augmented with application-specific and technology-specific details in other, more specific network inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-03"/>
        </reference>
      </references>
    </references>
    <?line 357?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using kramdown.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
