<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parsons-opsawg-security-operations-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Security Operations">Security Operations Fundamentals and Guidance</title>
    <seriesInfo name="Internet-Draft" value="draft-parsons-opsawg-security-operations-00"/>
    <author fullname="Michael Parsons">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>michael.p1@ncsc.gov.uk</email>
      </address>
    </author>
    <author fullname="Florence Driscoll">
      <organization>UK National Cyber Security Centre</organization>
      <address>
        <email>florence.d@ncsc.gov.uk</email>
      </address>
    </author>
    <date year="2026" month="February" day="27"/>
    <area>OPS</area>
    <workgroup>TBD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 39?>
<t>Security operators are responsible for detecting malicious activity, responding to threats and defending their networks and systems from cyber attacks. Security operations are commonly entwined with other operational and management priorities to ensure that both security and operational priorities are considered holistically.</t>
      <t>With security operators being a crucial part of operation, management and security of the network, it is valuable to give consideration to them during the design of new protocols. This document builds upon draft-ietf-opsawg-rfc5706bis, describing the fundamentals of security operations to provide a foundation for considerations for protocol design and guidance.  This document also describes how security operations considerations can be most usefully included in other IETF documents.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parsons-opsawg-security-operations/"/>.
      </t>
      <t>
      </t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Security operations are a crucial part of both the security and management of a network, enterprise or system.  Security operators work to not only prevent cyber attacks but also to identify, limit the impact of and recover from attacks that bypass preventative security controls, through monitoring and responding to threats as part of day-to-day operation.</t>
      <t>The approach, tools and day-to-day work of security operators is deeply tied together with the protocols that run over their networks and are used by attackers and defenders.  As such, it is valuable to provide security operators with guidance to address any changes that may affect  ability to detect and respond to threats when deploying a new protocol. This document describes how one might consider how the range of functions of a security operator may be impacted and, where possible, suggests how to document these and provide guidance on deployment or operation. This early guidance is particularly valuable as retrofitting mechanisms can be difficult and any impact may risk both the operational efficiency and security of the network.</t>
      <t>Security operations are commonly run from a Security Operations Centre (SOC); a centralised team or function that includes both cyber security analysts and operational engineers protect and defend the network.</t>
      <t>Those who work in security operations may have many different roles or job titles including, but not limited to, cyber security analyst, incident responder, security engineer and security operations manager.  In this document the term security operator is used to cover all roles in security operations.</t>
      <t>Security operators improve the security of the network through a broad range of functions. These range from pre-emptive threat intelligence and knowledge building, through continuous network management and monitoring for suspicious activity, responding to incidents and defending the network during an attack, and recovery of the system to a secure state following an incident.</t>
      <t>One organisational model is for operational and security responsibilities to be managed by separate teams with distinct objectives: security teams focusing on identifying and mitigating cyber security threats, and operational teams prioritising availability, performance, and the overall efficiency of network services. This model can have advantages, for example in enabling separation of duties. However, complete separation can also lead to conflicting priorities and outcomes.  For example, security or compliance requirements could delay the deployment of new services, while operational and efficiency requirements could inadvertently introduce weaknesses that increase security risks.</t>
      <t>The term SecOps <xref target="SECOPS"/>, is commonly used to define an approach to combine operational and security teams, tools and processes to ensure both the protection and reliable operation of networks. As cyber security threats continue to increase in both frequency and scale, a more integrated and coordinated approach is often necessary.  When security processes are siloed from operational processes, it can be challenging to adapt to emerging threats in a timely manner, and overall security may be reduced. Embedding security practices directly into operation and management, rather than as a bolt-on, is often vital for security, hence security operations becoming an integral part of the operation and management of many environments and enterprises. This approach considers the system as a whole in order to achieve both security and operational goals.</t>
      <t>As such, security operations should be considered during the design of new protocols. This document outlines the key fundamentals of security operations to supplement the guidance provided in <xref target="I-D.ietf-opsawg-rfc5706bis"/> to support protocol designers.</t>
    </section>
    <section anchor="responsibilities-of-security-operators">
      <name>Responsibilities of Security Operators</name>
      <t>Security operators have key responsibilities to ensure the security of their network, which can be broken down into the categories below. During the design of new protocols, it may be useful to take these responsibilities into account to reduce or highlight any potential adverse impact. Different organisations will consider different functions and roles as part of their security operations team, so these categories will not apply to all organisations.</t>
      <section anchor="threat-intelligence">
        <name>Threat Intelligence</name>
        <t>Threat Intelligence (TI) is a term used to refer to the knowledge of cyber attackers' activities. This may include an understanding of a threat actor's motivations, in-depth technical descriptions, and indicators of an attacker's activities. Security operators can both produce their own Threat Intelligence and consume it from other sources to stay ahead of new attacker techniques. Building Threat Intelligence includes the collection, analysis and dissemination of information about possible cyber security threats. Security operators are responsible for developing their understanding of threat actor capabilities, tools and techniques in order to plan ahead to mitigate and respond to potential threats. They also ensure Threat Intelligence information is deployed across their network to support detection of malicious activity. Effective deployment of Threat Intelligence contributes not only to the security of the networks under the operators' responsibility but also strengthens the broader security community by enabling shared awareness of evolving threats.</t>
      </section>
      <section anchor="security-monitoring">
        <name>Security Monitoring</name>
        <t>Security operators are responsible for monitoring all parts of the environment that they are protecting and managing including any infrastructure, network traffic, endpoints, data flows and log sources. The objective of this monitoring is to establish a baseline of normal activity and identify deviations that may indicate malicious activity. It is essential that this monitoring is continuous as advanced actors frequently "dwell" in the network to evade immediate detection and conduct malicious activity at known operational downtimes to reduce the likelihood of being observed by security operators. In addition to reactive monitoring, security operators perform proactive "threat hunting". Rather than awaiting alerts generated by security tooling, threat hunting involves targeted analysis of the network and investigation to identify previously unknown indicators of malicious activity. Based on the Threat Intelligence responsibility, security operators are responsible for developing their capability to detect attackers, through developing and using tooling, which will involve engineering and operational experts to ensure this capability is maintained and improved.</t>
      </section>
      <section anchor="incident-response">
        <name>Incident Response</name>
        <t>Security operators are responsible for responding to cyber security incidents should the network be targeted by a cyber attack. Such attacks can have significant impact, so a vital part of a security operator's role is to design, implement and update an incident response plan. Through effective security monitoring, security operators discover potential suspicious activity, and it is their responsibility to investigate this and determine whether the activity is malicious.   In the event of confirming such an attack on the network, the security operators will follow their plan to conduct rapid response to defend against the attack, reduce its impact and return the network to a secure and operational state. Following the resolution of an incident, security operators also conduct post incident analysis to understand the impact, for example if any data breaches occurred, and may perform a root-cause analysis to prevent similar attacks in future.</t>
        <t>Security operators have a range of tools and techniques that they commonly deploy and rely upon to be able to fulfil these responsibilities, which should be considered during protocol design.</t>
      </section>
    </section>
    <section anchor="artefact-requirements">
      <name>Artefact Requirements</name>
      <t>This section outlines some of the fundamental artefacts that are used by security operators to ensure security and operation of the network.</t>
      <t>With increasingly complex cyber threats, and to support both operational and security objectives, it is vital that security operators have multiple opportunities to detect malicious activity at different parts of the network and to account for different points of failure.  Thus, network defence techniques often use multiple layers of defence with several different mitigations at each layer - a concept referred to as "defence-in-depth". This approach can apply to considering security at different parts of the network, for example detecting activity at the network edge and on endpoints, and security operators also apply network level controls to separate traffic to support their security monitoring responsibilities. Security operators rely upon artefacts from a variety of sources to achieve their goals.</t>
      <section anchor="asset-management">
        <name>Asset Management</name>
        <t>Defence and management of an environment relies on knowing what hardware and software assets have access to, or are installed on, a network or system.  An accurate inventory is necessary to manage the security of an organisation's assets, to ensure that unauthorised devices are not present on the system and to understand how an organisation may be impacted by a cyber incident.</t>
        <t>The term "Shadow IT" is often used to refer to assets that are not accounted for. This can include devices which are not officially onboarded or are misconfigured, but also includes services, tools and accounts with access to the system. Shadow IT may introduce threats to the security of the system as protections and controls put in place may be ineffective.</t>
        <t>A good asset management approach will use tools to scan the environment for new, modified or removed assets on a regular or continuous basis.  It should maintain an authoritative and accurate source of information, which should be made accessible to security operators.  It could use a variety of data sources including procurement records, mobile device management and logging platforms.  Security operators are most likely to use asset management systems to identify devices or software that should not be on the system, as well as to identify legitimate assets that need to be protected as part of a cyber incident.</t>
      </section>
      <section anchor="indictors-of-compromise">
        <name>Indictors of Compromise</name>
        <t>The identification of Indicators of Compromise (IoCs) is relied upon by security operators to identify and defend against malicious activity on the network and endpoints that they are responsible for.  As outlined in <xref target="RFC9424"/>, IoCs are observable artefacts relating to a cyber threat actor or their activities, such as their tactics, techniques, procedures (TTPs), or tooling and attack infrastructure. Examples of IoCs include hash values of known malicious files or executables, IP addresses or domain names associated with malicious traffic or software and tooling used by attackers. These artefacts could be network based, such as information about Command and Control (C2) infrastructure embedded in network protocols, endpoint based, such as suspicious files or software, or behaviour based such as irregular account or access activity.</t>
        <t>These artefacts can be observed on the network or at hosts and endpoints, including infrastructure, services and applications. They help security operators to proactively block malicious activity, whether that be blocking traffic or preventing code execution at a point in the network. IoCs support Incident Response as they are crucial in determining whether an attack has taken place. Similarly, they can be used to link discovered suspicious activity to a known attackers, which enables further investigation and mitigations to be put in place. Having IoCs deployed to various security control points across a system supports a defence-in-depth approach which should be used by security operators.</t>
        <t>Security operators not only discover, use and deploy IoCs in the systems that they are responsible for, but also consume and share IoCs with the wider security community to increase wider understanding of emerging cyber threats.</t>
      </section>
      <section anchor="digital-forensics-and-logging">
        <name>Digital Forensics and Logging</name>
        <t>Alongside deployment of IoCs to detect and reduce the effects of compromise, security operators require digital forensics from the network, endpoints, hosts and applicationsto enable effective incident response or threat hunting. For example, details of authentication or authorization events, network traffic or endpoint-detection events can be found in logs.</t>
        <t>Using a range of log sources is vital, as each log source will give a different view of attacker activity to build a full picture and enable effective defensive mitigations. For example, authentication logs provide details when adversaries attempt to gain unauthorised access to systems, DNS logs can provide the first indications of a compromise device, and anti-malware software logs help to identify specific attacker capabilities.</t>
        <t>Understanding and interpreting log sources is not always straightforward, so security operators typically use log analytic techniques to index, enrich and query log data and thus take effective action.</t>
        <t>Security operators, through their Threat Intelligence insight play a role in threat modelling which enables effective identification of valuable log sources. Security operators are responsible for ensuring that logging processes and data are secured effectively.</t>
      </section>
    </section>
    <section anchor="tooling-requirements">
      <name>Tooling Requirements</name>
      <t>Changes to protocols may require changes to tooling in order to continue to be effective for security operations, and this should be highlighted when writing drafts. To assess this, the following section outlines the common tooling used and relied upon by security operators and which could be considered in protocol development. This is non-exhaustive, so other operational tools and techniques may also be worth considering.</t>
      <t>Endpoint Detection and Response (EDR) tools are deployed to endpoints, or end-user devices such as workstations, laptops or phones attached to the network that security operators are responsible for. EDR tooling can also be deployed to workloads in cloud environments. EDR tooling monitors events and provides security operators visibility of any malicious activity where they are deployed. EDR tooling also allows security operators to not only monitor and identify threats, but also respond to them, for example by isolating potentially compromised devices from the network in order to prevent a cyber threat actor's next stages of attack. A challenge that security operators face when using EDR tooling is the increase in cyber threat actors deploying "living off the land" techniques, so that their activity does not appear malicious and thus is not identified by EDR tooling.</t>
      <t>Network Detection and Response (NDR) tools are designed to detect threats by analysing network data and traffic flows to identify suspicious patterns. As a complement to EDR, NDR tooling is often relied upon to detect threats that may be hard to detect at the endpoint, for example an attacker moving laterally through the network towards more sensitive data or suspicious behaviour such as unauthorized credential use or data exfiltration. Security operators often use NDR tooling to establish a baseline of the network's normal behaviour patterns and deviations from this trigger alerts. As with EDR, NDR tooling can offer the ability to respond to threats in addition to monitoring for them, for example by blocking malicious traffic.</t>
      <t>Security Information and Event Management (SIEM) tooling is used by security operators to collect and analyse data from across the network in order to build a comprehensive view of the network activity, which is key to identify and respond to malicious activity. Note that, in comparison to EDR and NDR, SIEM tools collect and analyse events, rather than monitor the network directly. SIEM analysis would not be possible manually, so security operators rely on tooling to combine and analyse a range of data, including log data, network events and threat intelligence feeds in order to identify suspected suspicious events that require further investigation. SIEM tooling will send security operators automatic alerts based on predefined security rules to reduce the impact of compromise. These rules require effective management, as false positive may lead to "alert fatigue", where too frequent alerts may be ignored, raising the risk of real compromises being missed.</t>
      <t>Security Orchestration, Automation, and Response (SOAR) tooling offers security operators the ability to automate routine security and operational tasks to improve efficiency of response. Based on threat related data that is collected, SOAR tools are used to automate responses without human intervention, based on predefined "playbooks". These playbooks are designed by security operators with both incident response and operational priorities in mind. This automation is vital to security operators who experience an overwhelming volume of threats and would otherwise be unable to defend their networks. This automated action provided by SOAR tools complements the data analytic and insight provided by SIEM tools to respond to threats identified.</t>
      <t>Security operators rely upon Protocol Dissectors to parse and interpret individual network protocols. Dissecting protocols across network layers allows security operators to understand, analyse and filter traffic on their system in order to detect and defend against attacks. Dissectors support the identification of suspicious behaviour and malicious traffic that would otherwise be hidden within regular network traffic. These tools also support forensic investigation after an attack to understand how an attacker gained access and prevent this in future.</t>
    </section>
    <section anchor="additional-benefits-of-security-operations">
      <name>Additional Benefits of Security Operations</name>
      <t>Whilst the core responsibilities of security operators are outlined above, they may be well placed to support other important security functions.</t>
      <section anchor="vulnerability-management">
        <name>Vulnerability management</name>
        <t>Security operators are well positioned to proactively find vulnerabilities in the systems and infrastructure that they are responsible for. As part of their investigations security operators may conduct vulnerability scanning and security assessments and thus be able to triage and report priority issues to system owners who are responsible for patch management. This helps to mitigate security issues found before they can be exploited by cyber threat actors. This patching and remediation is an example where the joining of security and operational teams has particular value as patch management may involve prioritisation based on impact, risk and deployment considerations. When designing new protocols, consideration should be given to enabling efficient patching, for example supporting cheap and fast connection handoffs and reconnections.</t>
      </section>
      <section anchor="threat-modelling-and-architecture-review">
        <name>Threat Modelling and Architecture Review</name>
        <t>With their unique position, security operators are well placed to support wider security teams in developing the required security posture for their network. Blending insight from Threat Intelligence with a deep understanding of the operational aspects of the network, security operators can work with design teams to ensure their priorities are supported. This perspective of current cyber threats and operational experience can also be considered in protocol development.</t>
      </section>
    </section>
    <section anchor="security-operation-considerations">
      <name>Security Operation Considerations</name>
      <t>The previous sections outline what security operations is, and the artefacts and tooling that it relies upon. During the design and development of protocols, it is valuable to consider how security operators could be impacted by changes and mitigate such impact if possible. If they cannot be mitigated, then clearly documenting such considerations will aid security operators if and when the new protocol is deployed.</t>
      <t>New protocols may have implications for the types, locations or availability of IoCs and it is important for security operators to understand these implications in order to continue to effectively monitor for malicious activity.</t>
      <t>Similarly, consideration should be given to  how a new protocol or a change to a protocol may impact attackers' capabilities, such as Command and Control (C2) communications, network traversal or facilitation of exfiltration of data from the network. Where there are new or different opportunities for performing such malicious activity or where current defence techniques are prevented, it is important that this is captured to inform security operations and mitigated where possible to ensure their Threat Intelligence function can be fulfilled.</t>
      <t>One indicator of malicious activity that security operators use is to consider traffic levels and traffic patterns in order to identify suspicious activity or to defend against malicious distributed denial-of-service (DDoS) attacks. Mitigations should be included or threats documented if new protocols could be used to create DDoS attacks, for example amplification attacks in DNS or NTP. <xref target="RFC4732"/> provides further considerations for protocol designers with regards to denial-of-service.</t>
      <t>As outlined above, security operations rely on a variety of log sources enable effective incident response or threat hunting. If a new protocol changes the properties or topology of the network, this may impact the requirement for digital forensics. The mitigation for this may be to design new ways, schema or formats to providing such logging information when designing a new protocol. <xref target="I-D.ietf-quic-qlog-main-schema"/> is an example of structured logging for network protocols.</t>
      <t>Impact on tooling should be considered. Updating and augmenting existing tools is expected when the network is upgraded or new functionality is deployed, but having to completely rebuild such tooling will greatly reduce the effectiveness of security operators. A mitigation for this may be to consider designing flexibility for future versions and extensions into protocols so that code can be easily written to handle, identify and differentiate between protocol versions.</t>
      <t>In general, where protocols are being updated or replaced, consideration should be given to the current techniques employed by security operators who use the deployed protocol. This should include the techniques, tooling and corresponding infrastructure used to provide security and effective operation of the network. Where possible, these practices should remain consistent, or mitigations or documentation included to ensure security operations are not adversely affected.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document focuses primarily on operational considerations in addition to <xref target="I-D.ietf-opsawg-rfc5706bis"/> .</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document supports improving security by helping protocol designers consider security operators and their effort to mitigate cyber threats. It focused on the operational aspects, rather than the security of the protocols.</t>
      <t>Security operators have access to sensitive data, which is critical to protect for the security and privacy of the network.  It is important that such data is suitably secured and that appropriate controls are in place to enforce this, for example ensuring security operations data is segregated from the rest of the network, security operations tools and actions audited, and logs and forensic data securely stored and access controlled. Additional legal and governance requirements are often raised on security operators to ensure that such access is only being used for the intended purpose and thus benefiting the security of the system.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="SECOPS" target="https://niccs.cisa.gov/resources/glossary">
        <front>
          <title>NICCS Glossary</title>
          <author>
            <organization/>
          </author>
          <date year="2026" month="February"/>
        </front>
      </reference>
      <reference anchor="I-D.ietf-opsawg-rfc5706bis">
        <front>
          <title>Guidelines for Considering Operations and Management in IETF Specifications</title>
          <author fullname="Benoît Claise" initials="B." surname="Claise">
            <organization>Everything OPS</organization>
          </author>
          <author fullname="Joe Clarke" initials="J." surname="Clarke">
            <organization>Cisco</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
            <organization>Blue Fern Consulting</organization>
          </author>
          <author fullname="Ran Chen" initials="R." surname="Chen">
            <organization>ZTE</organization>
          </author>
          <date day="19" month="February" year="2026"/>
          <abstract>
            <t>   New Protocols and Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when defining New Protocols and Protocol Extensions.

   This document obsoletes RFC 5706, replacing it completely and
   updating it with new operational and management techniques and
   mechanisms.  It also updates RFC 2360 to obsolete mandatory MIB
   creation.  Finally, it introduces a requirement to include an
   "Operational Considerations" section in new RFCs that document a
   technical specification in the IETF Stream, while providing an escape
   clause if no new considerations are identified.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-rfc5706bis-02"/>
      </reference>
      <reference anchor="RFC9424">
        <front>
          <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
          <author fullname="K. Paine" initials="K." surname="Paine"/>
          <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
          <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
          <author fullname="A. Shaw" initials="A." surname="Shaw"/>
          <date month="August" year="2023"/>
          <abstract>
            <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9424"/>
        <seriesInfo name="DOI" value="10.17487/RFC9424"/>
      </reference>
      <reference anchor="RFC4732">
        <front>
          <title>Internet Denial-of-Service Considerations</title>
          <author fullname="M. Handley" initials="M." role="editor" surname="Handley"/>
          <author fullname="E. Rescorla" initials="E." role="editor" surname="Rescorla"/>
          <author>
            <organization abbrev="IAB">Internet Architecture Board</organization>
          </author>
          <date month="December" year="2006"/>
          <abstract>
            <t>This document provides an overview of possible avenues for denial-of-service (DoS) attack on Internet systems. The aim is to encourage protocol designers and network engineers towards designs that are more robust. We discuss partial solutions that reduce the effectiveness of attacks, and how some solutions might inadvertently open up alternative vulnerabilities. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4732"/>
        <seriesInfo name="DOI" value="10.17487/RFC4732"/>
      </reference>
      <reference anchor="I-D.ietf-quic-qlog-main-schema">
        <front>
          <title>qlog: Structured Logging for Network Protocols</title>
          <author fullname="Robin Marx" initials="R." surname="Marx">
            <organization>Akamai</organization>
          </author>
          <author fullname="Luca Niccolini" initials="L." surname="Niccolini">
            <organization>Meta</organization>
          </author>
          <author fullname="Marten Seemann" initials="M." surname="Seemann">
         </author>
          <author fullname="Lucas Pardue" initials="L." surname="Pardue">
            <organization>Cloudflare</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   qlog provides extensible structured logging for network protocols,
   allowing for easy sharing of data that benefits common debug and
   analysis methods and tooling.  This document describes key concepts
   of qlog: formats, files, traces, events, and extension points.  This
   definition includes the high-level log file schemas, and generic
   event schemas.  Requirements and guidelines for creating protocol-
   specific event schemas are also presented.  All schemas are defined
   independent of serialization format, allowing logs to be represented
   in various ways such as JSON, CSV, or protobuf.

Note to Readers

      Note to RFC editor: Please remove this section before publication.

   Feedback and discussion are welcome at https://github.com/quicwg/qlog
   (https://github.com/quicwg/qlog).  Readers are advised to refer to
   the "editor's draft" at that URL for an up-to-date version of this
   document.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-qlog-main-schema-13"/>
      </reference>
    </references>
    <?line 158?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
