14:02:46 RRSAgent has joined #wot-sec 14:02:51 logging to https://www.w3.org/2023/11/27-wot-sec-irc 14:02:51 meeting: WoT Security 14:03:08 present+ Kaz_Ashimura, Michael_McCool, Mahda_Noura, Tomoaki_Mizushima 14:06:10 ScribeNick: Mahda_Noura 14:06:20 rrsagent, make log public 14:06:24 rrsagent, draft minutes 14:06:26 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:06:33 Topic: Minutes overview 14:06:56 -> https://www.w3.org/2023/11/20-wot-sec-minutes.html Nov-20 14:07:20 mm: published minutes 14:07:36 ...lets look on the requirement issue 14:07:50 https://github.com/w3c/wot-usecases/issues/243 14:08:16 mm: no open PR this time for security 14:08:17 https://github.com/w3c/wot-usecases/pull/233 14:08:41 mm: we should talk about what to do next and make a todo list 14:10:07 mahda: I looked at Jan's work from the discovery, would be good to discuss how to map the use cases to requirements 14:11:00 mm: using the links facilitate automatic links and sections 14:11:10 https://pr-preview.s3.amazonaws.com/w3c/wot-usecases/pull/233.html 14:11:19 agenda: https://www.w3.org/WoT/IG/wiki/IG_Security_WebConf#27_November_2023 14:11:22 chair: McCool 14:11:30 rrsagent, draft minutes 14:11:31 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:11:51 i/published/scribenick: mahda-noura/ 14:11:52 rrsagent, draft minutes 14:11:53 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:11:59 mm: there are four categories, the simple first step is to restructure this to follow the discovery template 14:12:20 i|lets look|topic: Requirements| 14:12:57 rrsagent, draft minutes 14:12:59 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:15:14 mm: next: each category tries to capture the use cases it relates to 14:16:05 mm: do each in single PR's 14:17:27 mm: after we do the categories, we need to (the requirements should be mitigations) 14:17:53 mm: we want to mitigate each threat 14:18:35 s/lets/let's/ 14:20:20 ...first formatting, then the categories, while going through the use cases we might find new categories, then we can try to align the security requirements to the threats we already have. A path from security considerations to the threats 14:20:40 q+ 14:21:11 ...in the next meeting when the first one is done, we can try to start the next step 14:22:20 ...we had a table with the use cases from the past 14:23:51 ...we can update the existing table and update it 14:24:52 ...we can limit the scope of the work to focus for now on the security and not privacy 14:26:39 https://github.com/w3c/wot-usecases/issues/246 14:26:41 q? 14:27:12 kaz: this should be probably be next step, after this re-organization we need to gather more feedback or use cases from various industries 14:28:01 mm: there are two things, first we can assign categories, secondly we may find gaps where we have a clear mitigation 14:28:20 ack k 14:29:39 mm: i think in general the use case contributors can look at the requirements, and then think about gaps rather than starting from scratch 14:32:54 mm: lets look at the use case file and see whether it is up to date 14:36:04 q+ 14:37:29 ...the table is outdated 14:37:59 kaz: after looking at the use case documents, I started to fear the current structure of the use case document, it's not understandable 14:38:31 mm: I totally agree, if we have decent id's, we can move things around and re-organize things 14:39:03 kaz: we need somebody else to moderate the use case discussions 14:39:49 ack k 14:39:50 mm: all I want is to update the security part 14:41:13 kaz: yeah, so we need to concentrate on the security portion within the Use Cases/Requirements descriptions 14:41:20 i/yeah/scribenick: kaz/ 14:41:30 scribenick: mahda-noura 14:43:21 ...we can have two categories, yes, no, and maybe 14:44:35 ...in general lets only do the leaf nodes of a main category e.g. retail 14:46:31 ...will create a PR under use cases 14:49:18 q+ 14:49:51 ack k 14:50:03 kaz: digging into existing use cases would make sense, this work would be time-consuming and maybe we need additional help from the other participants of the group 14:50:15 s/would/would still/ 14:50:22 s/this work/but this work/ 14:50:56 mm: I think we should go through the obvious ones and ask for input from others, in the next hour we can go through them, and later ask confirmation from the rest of the members 14:51:30 rrsagent, draft minutes 14:51:31 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:52:51 https://github.com/w3c/wot-usecases/pull/247 14:53:25 s/https/-> https/ 14:53:34 s/247/247 PR 247 - Define Security Category Template/ 14:53:41 rrsagent, draft minutes 14:53:42 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 14:53:57 https://github.com/w3c/wot-usecases/blob/main/USE-CASES/security-categories.csv 14:54:51 q? 14:55:02 [adjourned] 14:55:03 rrsagent, draft minutes 14:55:05 I have made the request to generate https://www.w3.org/2023/11/27-wot-sec-minutes.html kaz 17:07:26 Zakim has left #wot-sec