Skip to content

SACM - Security Automation and Continuous Monitoring

warning alert: Not to be confused with ITIL's SACM - Service Asset and Configuration Management.

Security Automation and Continuous Monitoring is a life-cycle process which provides effective asset control and efficient delivery of information. The process includes managing resources (infrastructure, data), capabilities (people) and artifacts (HWs, SWs, Documentation).

Alberto Explains It was an effort organized under IETF to formalize asset life-cycle. I guess, it is still too early for SACM to be used in the field.

Key Online Resources

  • SACM, Concluded IETF Working Group [Online, 2024-04-03]
  • SACM Github Organization[Online, 2024-04-03]
  • RFC: 7632, Endpoint Security Posture Assessment: Enterprise Use Cases (SACM Use Cases)[Published: September 2015]
  • RFC: 8248, Security Automation and Continuous Monitoring (SACM) Requirements (SACM Requirements)[Published: September 2017]
  • RFC: 8412, Software Inventory Message and Attributes (SWIMA) for PA-TNC (extensions for NEA (network endpoint assessment) architecture)[Published: July 2018]
  • RFC: 9393, Concise Software Identification Tags (CoSWID)[Published: June 2023]