I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This internet-draft specifies a data model used for the management of network interfaces. The security considerations section does exist and discusses that the data is made available through the NETCONF protocol. NETCONF uses SSH to access and transfer said data. It goes on to discuss the implications of unattended access to list and leaf data, but does not provide guidance on how to mitigate against unauthorized access. If this is discussed in the NETCONF draft then this draft should at least provide this reference. General comments: None. Editorial comments: None. Shawn. --