diff --git a/src/pages/Specification.jsx b/src/pages/Specification.jsx index 421e91e..46b0279 100644 --- a/src/pages/Specification.jsx +++ b/src/pages/Specification.jsx @@ -25,6 +25,7 @@ export default function SpecificationPage() { System Identity Ownership Capabilities + Security Extensions Dependencies Constraints Runtime @@ -207,6 +208,59 @@ runtime: + {/* Security Extensions */} +
+
+

Security Extensions (x-security)

+

+ For security tools (EDR, SIEM, SOAR, etc.), the x-security extension + describes actionable capabilities for automation. This enables SOAR platforms to auto-discover what security tools can do. +

+ {`provides: + - capability: "host-containment" + type: "rest" + contract: + type: "openapi" + ref: "./api/containment.yaml" + x-security: + actuator_profile: "edr" # OpenC2 actuator type + actions: ["contain", "allow", "query"] # Supported actions + targets: ["hostname", "device_id"] # Target types`} + +

Extension Fields

+
+ + + + + + + + + + + + + + + + + + + + + +
FieldDescription
actuator_profileOpenC2-inspired profile: edr, siem, slpf, soar
actionsSupported actions: query, contain, deny, allow, remediate, notify
targetsTarget types: hostname, ipv4_addr, file, process, ioc
+
+ +
+

+ Export to OpenC2: Use scp-cli scan --export openc2 to generate an actuator inventory for SOAR integration. +

+
+
+
+ {/* Dependencies */}