Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  • Possibly to include mitigation and actions.   
  • If we expect ONAP to respond to security events in a closed loop manner, then there needs to be a way for events generated by the SIEM to be ingested back into ONAP.