Security Automation and Continuous Monitoring (SACM) Requirements
posture assessment
posture validation
software integrity
network authorization
software compliance
This document defines the scope and set of requirements for the Security Automation and Continuous Monitoring (SACM) architecture, data model, and transfer protocols. The requirements and scope are based on the agreed-upon use cases described in RFC 7632.