<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-ietf-iotops-security-summary-00" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT networking security summary">A summary of security-enabling technologies for IoT devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2023" month="July" day="04"/>

    <area>Security</area>
    <workgroup>IOTOPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This memo serves as an entry-point to detail which technologies are available for use in IoT networks and to enable IoT designers to discover technologies that may solve their problems. This draft addresses.</t>

<t>Many baseline security requirements documents have been drafted by standards setting organisations, however these documents typically do not specify the technologies available to satisfy those requirements. They also do not express the next steps if an implementor wants to go above and beyond the baseline in order to differentiate their products and enable even better security. This memo defines the mapping from some IoT baseline security requirements definitions to ietf and related security technologies. It also highlights some gaps in those IoT baseline security requirements.</t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="survey-of-baseline-security-requirements"><name>Survey of baseline security requirements</name>

<t>At time of writing, there are IoT baseline security requirements provided by several organisations:</t>

<t><list style="symbols">
  <t>ENISA's Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (<xref target="ENISA-Baseline"/>)</t>
  <t>ETSI's Cyber Security for Consumer Internet of Things: Baseline Requirements <xref target="ETSI-Baseline"/></t>
  <t>NIST's IoT Device Cybersecurity Capability Core Baseline <xref target="NIST-Baseline"/></t>
</list></t>

</section>
<section anchor="requirement-mapping"><name>Requirement Mapping</name>

<t>Requirements that pertain to hardware, procedure, and policy compliance are noted, but do not map to ietf and related technologies. NIST's requirements (<xref target="NIST-Baseline"/>) are very broad and already have mappings to ENISA baseline security recommendations.</t>

<section anchor="hardware-security"><name>Hardware Security</name>

<section anchor="identity"><name>Identity</name>

<t>ENISA GP-PS-10: Establish and maintain asset management procedures and configuration controls for key network and information systems.
NIST Device Identification: The IoT device can be uniquely identified logically and physically.</t>

<t>These requirements are architectural requirements, however <xref target="RFC4122"/> can be used for identifiers.</t>

</section>
<section anchor="hardware-immutable-root-of-trust"><name>Hardware Immutable Root of Trust</name>

<t>ENISA GP-TM-01: Employ a hardware-based immutable root of trust.</t>

<t>This is an architectural requirement.</t>

</section>
<section anchor="hardware-backed-secret-storage"><name>Hardware-Backed Secret Storage</name>

<t>ENISA GP-TM-02: Use hardware that incorporates security features to strengthen the protection and integrity of the device - for example, specialized security chips / coprocessors that integrate security at the transistor level, embedded in the processor, providing, among other things, a trusted storage of device identity and authentication means, protection of keys at rest and in use, and preventing unprivileged from accessing to security sensitive code. Protection against local and physical attacks can be covered via functional security.</t>

<t>NIST Data Protection: The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>

<t>This is an architectural requirement.</t>

</section>
</section>
<section anchor="software-integrity-authenticity"><name>Software Integrity &amp; Authenticity</name>

<section anchor="boot-environment-trustworthiness-and-integrity"><name>Boot Environment Trustworthiness and Integrity</name>

<t>ENISA GP-TM-03: Trust must be established in the boot environment before any trust in any other software or executable program can be claimed.</t>

<t>Satisfying this requirement can be done in several ways, increasing in security guarantees:</t>

<t><list style="numbers">
  <t>Implement secure boot to verify the bootloader and boot environment. Trust is established purely by construction: if code is running in the boot environment, it must have been signed, therefore it is trustworthy.</t>
  <t>Record critical measurements of each step of boot in a TPM. Trust is established by evaluating the measurements recorded by the TPM.</t>
  <t>Use Remote Attestation. Remote attestation allows a device to report to third parties the critical measurements it has recorded (either in a TPM or signed by each stage) in order to prove the trustworthiness of the boot environment and running software. Remote Attestation is implemented in <xref target="I-D.ietf-rats-eat"/>.</t>
</list></t>

</section>
<section anchor="code-integrity-and-authenticity"><name>Code Integrity and Authenticity</name>

<t>ENISA GP-TM-04: Sign code cryptographically to ensure it has not been tampered with after signing it as safe for the device, and implement run-time protection and secure execution monitoring to make sure malicious attacks do not overwrite code after it is loaded.</t>

<t>Satisfying this requirement requires a secure invocation mechanism. In monolithic IoT software images, this is accomplished by Secure Boot. In IoT devices with more fully-featured operating systems, this is accomplished with an operating system-specific code signing practice.</t>

<t>Secure Invocation can be achieved using the SUIT Manifest format, which provides for secure invocation procedures. See <xref target="I-D.ietf-suit-manifest"/>.</t>

<t>To satisfy the associated requirement of run-time protection and secure execution monitoring, the use of a TEE is recommended to protect sensitive processes. The TEEP protocol (see <xref target="I-D.ietf-teep-architecture"/>) is recommended for managing TEEs.</t>

</section>
<section anchor="secure-firmware-update"><name>Secure Firmware Update</name>

<t>ENISA GP-TM-05: Control the installation of software in operating systems, to prevent unauthenticated software and files from being loaded onto it.</t>

<t>NIST Software Update:</t>

<t><list style="numbers">
  <t>The ability to update the device’s software through remote (e.g., network download) and/or local means (e.g., removable media)</t>
  <t>The ability to verify and authenticate any update before installing it</t>
  <t>The ability for authorized entities to roll back updated software to a previous version</t>
  <t>The ability to restrict updating actions to authorized entities only</t>
  <t>The ability to enable or disable updating</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to:</t>
  <t>The ability to configure any remote update mechanisms to be either automatically or manually initiated for update downloads and installations</t>
  <t>The ability to enable or disable notification when an update is available and specify who or what is to be notified</t>
</list></t>

<t>Many fully-featured operating systems have dedicated means of implementing this requirement. The SUIT manifest (See <xref target="I-D.ietf-suit-manifest"/>) is recommended as a means of providing secure, authenticated software update. Where the software is deployed to a TEE, TEEP (See <xref target="I-D.ietf-teep-protocol"/>) is recommended for software update and management.</t>

</section>
<section anchor="configuration"><name>Configuration</name>

<t>NIST Device Configuration:</t>

<t><list style="numbers">
  <t>The ability to change the device’s software configuration settings</t>
  <t>The ability to restrict configuration changes to authorized entities only</t>
  <t>The ability for authorized entities to restore the device to a secure configuration defined by an authorized entity</t>
</list></t>

<t>Configuration can be delivered to a device either via a firmware update, such as in <xref target="I-D.ietf-suit-manifest"/>, or via a runtime configuration interface, such as <xref target="LwM2M"/>.</t>

</section>
<section anchor="resilience-to-failure"><name>Resilience to Failure</name>

<t>ENISA GP-TM-06: Enable a system to return to a state that was known to be secure, after a security breach has occured or if an upgrade has not been successful.</t>

<t>While there is no specificaiton for this, it is also required in <xref target="RFC9019"/></t>

</section>
<section anchor="trust-anchor-management"><name>Trust Anchor Management</name>

<t>ENISA GP-TM-07: Use protocols and mechanisms able to represent and manage trust and trust relationships.</t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships).</t>

</section>
</section>
<section anchor="default-security-privacy"><name>Default Security &amp; Privacy</name>

<section anchor="security-on-by-default"><name>Security ON by Default</name>

<t>ENISA GP-TM-08: Any applicable security features should be enabled by default, and any unused or insecure functionalities should be disabled by default.</t>

<t>NIST Logical Access to Interfaces:</t>

<t><list style="numbers">
  <t>The ability to logically or physically disable any local and network interfaces that are not necessary for the core functionality of the device</t>
  <t>The ability to logically restrict access to each network interface to only authorized entities (e.g., device authentication, user authentication)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability to enable, disable, and adjust thresholds for any ability the device might have to lock or disable an account or to delay additional authentication attempts after too many failed authentication attempts</t>
</list></t>

<t>These are procedural requirements, rather than a protocol or document requirement.</t>

</section>
<section anchor="default-unique-passwords"><name>Default Unique Passwords</name>

<t>ENISA GP-TM-09: Establish hard to crack, device-individual default passwords.</t>

<t>This is a procedural requirement, rather than a protocol or document requirement.</t>

</section>
</section>
<section anchor="data-protection"><name>Data Protection</name>

<t>The data protection requirements are largely procedural/architectural. While this memo can recommend using TEEs to protect data, and TEEP (<xref target="I-D.ietf-teep-architecture"/>) to manage TEEs, implementors must choose to architect their software in such a way that TEEs are helpful in meeting these requirements.</t>

<t>ENISA Data Protection requirements:</t>

<t><list style="symbols">
  <t>GP-TM-10: Personal data must be collected and processed fairly and lawfully, it should never be collected and processed without the data subject's consent.</t>
  <t>GP-TM-11: Make sure that personal data is used for the specified purposes for which they were collected, and that any further processing of personal data is compatible and that the data subjects are well informed.</t>
  <t>GP-TM-12: Minimise the data collected and retained.</t>
  <t>GP-TM-13: IoT stakeholders must be compliant with the EU General Data Protection Regulation (GDPR).</t>
  <t>GP-TM-14: Users of IoT products and services must be able to exercise their rights to information, access, erasure, rectification, data portability, restriction of processing, objection to processing, and their right not to be evaluated on the basis of automated processing.</t>
</list></t>

<t>NIST Data Protection:</t>

<t><list style="numbers">
  <t>The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>
  <t>The ability for authorized entities to render all data on the device inaccessible by all entities, whether previously authorized or not (e.g., through a wipe of internal storage, destruction of cryptographic keys for encrypted data)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability for authorized entities to configure the cryptography use itself, such as choosing a key length</t>
</list></t>

</section>
<section anchor="system-safety-and-reliability"><name>System Safety and Reliability</name>

<t>Safety and reliability requirements are procedural/architectural. Implementors should ensure they have processes and architectures in place to meet these requirements.</t>

<t>ENISA Safety and Reliability requirements:</t>

<t><list style="symbols">
  <t>GP-TM-15: Design with system and operational disruption in mind, preventing the system from causing an unacceptable risk of injury or physical damage.</t>
  <t>GP-TM-16: Mechanisms for self-diagnosis and self-repair/healing to recover from failure, malfunction or a compromised state.</t>
  <t>GP-TM-17: Ensure standalone operation - essential features should continue to work with a loss of communications and chronicle negative impacts from compromised devices or cloud-based systems.</t>
</list></t>

</section>
<section anchor="secure-software-firmware-updates"><name>Secure Software / Firmware updates</name>

<t>Technical requirements for Software Updates are provided for in SUIT (<xref target="I-D.ietf-suit-manifest"/>) and TEEP (<xref target="I-D.ietf-teep-protocol"/>). Procedural and architectural requirements should be independently assessed by the implementor.</t>

<t>ENISA Software Update Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-18: Ensure that the device software/firmware, its configuration and its applications have the ability to update Over-The-Air (OTA), that the update server is secure, that the update file is transmitted via a secure connection, that it does not contain sensitive data (e.g. hardcoded credentials), that it is signed by an authorised trust entity and encrypted using accepted encryption methods, and that the update package has its digital signature, signing certificate and signing certificate chain, verified by the device before the update process begins.</t>
  <t>GP-TM-19: Offer an automatic firmware update mechanism.</t>
  <t>GP-TM-20: (Procedural / Architectural) Backward compatibility of firmware updates. Automatic firmware updates should not modify user-configured preferences, security, and/or privacy settings without user notification.</t>
</list></t>

</section>
<section anchor="authentication"><name>Authentication</name>

<section anchor="align-authentication-schemes-with-threat-models"><name>Align Authentication Schemes with Threat Models</name>

<t>ENISA GP-TM-21: Design the authentication and authorisation schemes (unique per device) based on the system-level threat models.</t>

<t>This is a procedural / architectural requirement.</t>

</section>
<section anchor="password-rules"><name>Password Rules</name>

<t>ENISA applies the following requirements to Password-based authentication:</t>

<t><list style="symbols">
  <t>GP-TM-22: Ensure that default passwords and even default usernames are changed during the initial setup, and that weak, null or blank passwords are not allowed.</t>
  <t>GP-TM-23: Authentication mechanisms must use strong passwords or personal identification numbers (PINs), and should consider using two-factor authentication (2FA) or multi-factor authentication (MFA) like Smartphones, Biometrics, etc., on top of certificates.</t>
  <t>GP-TM-24: Authentication credentials shall be salted, hashed and/or encrypted.</t>
  <t>GP-TM-25: Protect against 'brute force' and/or other abusive login attempts. This protection should also consider keys stored in devices.</t>
  <t>GP-TM-26: Ensure password recovery or reset mechanism is robust and does not supply an attacker with information indicating a valid account. The same applies to key update and recovery mechanisms.</t>
</list></t>

<t>As an alternative, implementors are encouraged to consider passwordless schemes, such as FIDO.</t>

</section>
</section>
<section anchor="authorisation"><name>Authorisation</name>

<section anchor="principle-of-least-privilege"><name>Principle of Least Privilege</name>

<t>ENISA GP-TM-27: Limit the actions allowed for a given system by Implementing fine-grained authorisation mechanisms and using the Principle of least privilege (POLP): applications must operate at the lowest privilege level possible.</t>

<t>This is a procedural / architectural requirement, however at the network level, this can be implemented using Manufacturer Usage Descriptions (see <xref target="RFC8520"/>).</t>

</section>
<section anchor="software-isolation"><name>Software Isolation</name>

<t>ENISA GP-TM-28: Device firmware should be designed to isolate privileged code, processes and data from portions of the firmware that do not need access to them. Device hardware should provide isolation concepts to prevent unprivileged from accessing security sensitive code.</t>

<t>Implementors should use TEEs to address this requirement. The provisioning and management of TEEs can be accomplished using TEEP (see <xref target="I-D.ietf-teep-architecture"/>).</t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t>ENISA GP-TM-29: Data integrity and confidentiality must be enforced by access controls. When the subject requesting access has been authorised to access particular processes, it is necessary to enforce the defined security policy.
ENISA GP-TM-30: Ensure a context-based security and privacy that reflects different levels of importance.</t>

<t>These requirements are complex and require a variety of technologies to implement. Use of TEEs can provide a building block for these requirements, but is not sufficient in itself to meet these requiremnents.</t>

</section>
</section>
<section anchor="environmental-and-physical-security"><name>Environmental and Physical Security</name>

<t>ENISA defines the following physical security requirements. These are hardware-architectural requirements and not covered by protocol and format specifications.</t>

<t><list style="symbols">
  <t>GP-TM-31: Measures for tamper protection and detection. Detection and reaction to hardware
tampering should not rely on network connectivity.</t>
  <t>GP-TM-32: Ensure that the device cannot be easily disassembled and that the data storage medium is encrypted at rest and cannot be easily removed.</t>
  <t>GP-TM-33: Ensure that devices only feature the essential physical external ports (such as USB) necessary for them to function and that the test/debug modes are secure, so they cannot be used to maliciously access the devices. In general, lock down physical ports to only trusted connections.</t>
</list></t>

</section>
<section anchor="cryptography"><name>Cryptography</name>

<t>ENISA makes the following architectural cryptography requirements for IoT devices:</t>

<t><list style="symbols">
  <t>GP-TM-34: Ensure a proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of data and information (including control messages), in transit and in rest. Ensure the proper selection of standard and strong encryption algorithms and strong keys, and disable insecure protocols. Verify the robustness of the implementation.</t>
  <t>GP-TM-35: Cryptographic keys must be securely managed.</t>
  <t>GP-TM-36: Build devices to be compatible with lightweight encryption and security techniques.</t>
  <t>GP-TM-37: Support scalable key management schemes.</t>
</list></t>

</section>
<section anchor="secure-and-trusted-communications"><name>Secure and Trusted Communications</name>

<section anchor="data-security"><name>Data Security</name>

<t>GP-TM-38: Guarantee the different security aspects -confidentiality (privacy), integrity, availability and authenticity- of the information in transit on the networks or stored in the IoT application or in the Cloud.</t>

<t>This Data Security requirement can be fulfilled using COSE <xref target="RFC8152"/> for ensuring the authenticity, integrity, and confidentiality of data either in transit or at rest. Secure Transport (see <xref target="secure-transport"/>) technologies can be used to protect data in transit.</t>

</section>
<section anchor="secure-transport"><name>Secure Transport</name>

<t>ENISA GP-TM-39: Ensure that communication security is provided using state-of-the-art, standardised security protocols, such as TLS for encryption.
ENISA GP-TM-40: Ensure credentials are not exposed in internal or external network traffic.</t>

<t>This requirement is satisfied by several standards:</t>

<t><list style="symbols">
  <t>TLS (<xref target="RFC8446"/>).</t>
  <t>DTLS (<xref target="RFC9147"/>).</t>
  <t>QUIC (<xref target="RFC9000"/>).</t>
  <t>OSCORE (<xref target="RFC9203"/>).</t>
</list></t>

</section>
<section anchor="data-authenticity"><name>Data Authenticity</name>

<t>ENISA GP-TM-41: Guarantee data authenticity to enable reliable exchanges from data emission to data reception. Data should always be signed whenever and wherever it is captured and stored.</t>

<t>The authenticity of data can be protected using COSE <xref target="RFC8152"/>.</t>

<t>ENISA GP-TM-42: Do not trust data received and always verify any interconnections. Discover, identify and verify/authenticate the devices connected to the network before trust can be established, and preserve
their integrity for reliable solutions and services.</t>

<t>Verifying communication partners can be done in many ways. Key technologies supporting authentication of communication partners are:</t>

<t><list style="symbols">
  <t>RATS: Remote attestation of a communication partner (See <xref target="I-D.ietf-rats-architecture"/>).</t>
  <t>TLS/DTLS: Mutual authentication of communication partners (See <xref target="RFC8446"/> / <xref target="RFC9147"/>).</t>
  <t>ATLS: Application-layer TLS for authenticating a connection that may traverse multiple secure transport connections.</t>
  <t>Attested TLS: The use of attestation in session establishment in TLS (See <xref target="I-D.fossati-tls-attestation"/>).</t>
</list></t>

</section>
<section anchor="least-privilege-communication"><name>Least Privilege Communication</name>

<t>ENISA GP-TM-43: IoT devices should be restrictive rather than permissive in communicating.</t>

<t>This Requirement can be enabled and enforced using Manufacturer Usage Descriptions, which codify expected communication (See <xref target="RFC8520"/>)</t>

<t>ENISA GP-TM-44: Make intentional connections. Prevent unauthorised connections to it or other devices the
product is connected to, at all levels of the protocols.</t>

<t>This requirement can be satisfied through authenticating connections (TLS / DTLS mutual authentication. See <xref target="RFC8446"/> / <xref target="RFC9147"/>) and declaring communication patterns (Manufacturer Usage Descriptions. See <xref target="RFC8520"/>)</t>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-45: Disable specific ports and/or network connections for selective connectivity.</t>
  <t>ENISA GP-TM-46: Rate limiting. Controlling the traffic sent or received by a network to reduce the risk of automated attacks.</t>
</list></t>

</section>
</section>
<section anchor="secure-interfaces-and-network-services"><name>Secure Interfaces and network services</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>GP-TM-47: Risk Segmentation. Splitting network elements into separate components to help isolate security breaches and minimise the overall risk.</t>
  <t>GP-TM-48: Protocols should be designed to ensure that, if a single device is compromised, it does not affect the whole set.</t>
  <t>GP-TM-49: Avoid provisioning the same secret key in an entire product family, since compromising a single device would be enough to expose the rest of the product family.</t>
  <t>GP-TM-50: Ensure only necessary ports are exposed and available.</t>
  <t>GP-TM-51: Implement a DDoS-resistant and Load-Balancing infrastructure.</t>
  <t>GP-TM-53: Avoid security issues when designing error messages.</t>
</list></t>

<section anchor="encrypted-user-sessions"><name>Encrypted User Sessions</name>

<t>ENISA GP-TM-52: Ensure web interfaces fully encrypt the user session, from the device to the backend services, and that they are not susceptible to XSS, CSRF, SQL injection, etc.</t>

<t>This requirement can be partially satisfied through use of TLS or QUIC (See <xref target="RFC8446"/> and <xref target="RFC9000"/>)</t>

</section>
</section>
<section anchor="secure-input-and-output-handling"><name>Secure input and output handling</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-54: Data input validation (ensuring that data is safe prior to use) and output filtering.</t>

</section>
<section anchor="logging"><name>Logging</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-55: Implement a logging system that records events relating to user authentication, management of accounts and access rights, modifications to security rules, and the functioning of the system. Logs must be preserved on durable storage and retrievable via authenticated connections.</t>

<t>NIST Cybersecurity State Awareness</t>

<t><list style="numbers">
  <t>The ability to report the device’s cybersecurity state</t>
  <t>The ability to differentiate between when a device will likely operate as expected from when it may be in a degraded cybersecurity state</t>
  <t>The ability to restrict access to the state indicator so only authorized entities can view it</t>
  <t>The ability to prevent any entities (authorized or unauthorized) from editing the state except for those entities that are responsible for maintaining the device’s state information</t>
  <t>The ability to make the state information available to a service on another device, such as an event/state log server</t>
</list></t>

<t>Certain logs and indicators of cybersecurity state can be transported via RATS: See <xref target="I-D.ietf-rats-eat"/>. Where associated with SUIT firmware updates, logs can be transported using SUIT Reports. See <xref target="I-D.ietf-suit-report"/>.</t>

</section>
<section anchor="monitoring-and-auditing"><name>Monitoring and Auditing</name>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-56: Implement regular monitoring to verify the device behaviour, to detect malware and to discover integrity errors.</t>
  <t>ENISA GP-TM-57: Conduct periodic audits and reviews of security controls to ensure that the controls are effective. Perform penetration tests at least biannually.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>No additional security considerations are required; they are laid out in the preceeding sections.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC4122'>
  <front>
    <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
    <author fullname='P. Leach' initials='P.' surname='Leach'/>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <author fullname='R. Salz' initials='R.' surname='Salz'/>
    <date month='July' year='2005'/>
    <abstract>
      <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
      <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4122'/>
  <seriesInfo name='DOI' value='10.17487/RFC4122'/>
</reference>

<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC8995'>
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname='M. Pritikin' initials='M.' surname='Pritikin'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='T. Eckert' initials='T.' surname='Eckert'/>
    <author fullname='M. Behringer' initials='M.' surname='Behringer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8995'/>
  <seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>

<reference anchor='RFC7030'>
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'/>
    <author fullname='P. Yee' initials='P.' role='editor' surname='Yee'/>
    <author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'/>
    <date month='October' year='2013'/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7030'/>
  <seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>

<reference anchor='RFC8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC9019'>
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='M. Meriac' initials='M.' surname='Meriac'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9019'/>
  <seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>

<reference anchor='RFC9203'>
  <front>
    <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
    <author fullname='F. Palombini' initials='F.' surname='Palombini'/>
    <author fullname='L. Seitz' initials='L.' surname='Seitz'/>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <author fullname='M. Gunnarsson' initials='M.' surname='Gunnarsson'/>
    <date month='August' year='2022'/>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9203'/>
  <seriesInfo name='DOI' value='10.17487/RFC9203'/>
</reference>

<reference anchor='RFC8152'>
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname='J. Schaad' initials='J.' surname='Schaad'/>
    <date month='July' year='2017'/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8152'/>
  <seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>

<reference anchor='RFC9000'>
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname='J. Iyengar' initials='J.' role='editor' surname='Iyengar'/>
    <author fullname='M. Thomson' initials='M.' role='editor' surname='Thomson'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9000'/>
  <seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>

<reference anchor='RFC9147'>
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='N. Modadugu' initials='N.' surname='Modadugu'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9147'/>
  <seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.0-20201202.html">
  <front>
    <title>FIDO Device Onboarding</title>
    <author initials="" surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="LwM2M" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
  <front>
    <title>LwM2M Core Specification</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISA-Baseline" target="https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/">
  <front>
    <title>Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures</title>
    <author initials="" surname="ENISA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-Baseline" target="https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf">
  <front>
    <title>Cyber Security for Consumer Internet of Things: Baseline Requirements</title>
    <author initials="" surname="ETSI">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NIST-Baseline" target="https://www.nist.gov/publications/iot-device-cybersecurity-capability-core-baseline">
  <front>
    <title>IoT Device Cybersecurity Capability Core Baseline</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='30' month='June' year='2023'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-21'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='27' month='February' year='2023'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the that code/data,
   the devices to which it applies, and cryptographic information
   protecting the manifest.  Software updates and Trusted Invocation
   both tend to use sequences of common operations, so the manifest
   encodes those sequences of operations, rather than declaring the
   metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-22'/>
   
</reference>


<reference anchor='I-D.ietf-sacm-coswid'>
   <front>
      <title>Concise Software Identification Tags</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Jessica Fitzgerald-McKay' initials='J.' surname='Fitzgerald-McKay'>
         <organization>National Security Agency</organization>
      </author>
      <author fullname='Charles Schmidt' initials='C.' surname='Schmidt'>
         <organization>The MITRE Corporation</organization>
      </author>
      <author fullname='David Waltermire' initials='D.' surname='Waltermire'>
         <organization>National Institute of Standards and Technology</organization>
      </author>
      <date day='24' month='February' year='2023'/>
      <abstract>
	 <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-24'/>
   
</reference>


<reference anchor='I-D.birkholz-rats-corim'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>arm</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>arm</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies Concise Reference Integrity Manifests (CoRIM) that
   represent Endorsements and Reference Values in CBOR format.
   Composite devices or systems are represented by a collection of
   Concise Module Identifiers (CoMID) and Concise Software Identifiers
   (CoSWID) bundled in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-03'/>
   
</reference>


<reference anchor='I-D.ietf-teep-architecture'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-19'/>
   
</reference>


<reference anchor='I-D.ietf-teep-protocol'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Protocol</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Akira Tsukamoto' initials='A.' surname='Tsukamoto'>
         <organization>ALAXALA Networks Corp.</organization>
      </author>
      <date day='3' month='July' year='2023'/>
      <abstract>
	 <t>   This document specifies a protocol that installs, updates, and
   deletes Trusted Components in a device with a Trusted Execution
   Environment (TEE).  This specification defines an interoperable
   protocol for managing the lifecycle of Trusted Components.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-protocol-15'/>
   
</reference>


<reference anchor='I-D.ietf-rats-architecture'>
   <front>
      <title>Remote ATtestation procedureS (RATS) Architecture</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='28' month='September' year='2022'/>
      <abstract>
	 <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-report'>
   <front>
      <title>Secure Reporting of Update Status</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   The Software Update for the Internet of Things (SUIT) manifest
   provides a way for many different update and boot workflows to be
   described by a common format.  However, this does not provide a
   feedback mechanism for developers in the event that an update or boot
   fails.

   This specification describes a lightweight feedback mechanism that
   allows a developer in possession of a manifest to reconstruct the
   decisions made and actions performed by a manifest processor.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-report-05'/>
   
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   Attestation is the process by which an entity produces evidence about
   itself that another party can use to evaluate the trustworthiness of
   that entity.

   In use cases that require the use of remote attestation, such as
   confidential computing or device onboarding, an attester has to
   convey evidence or attestation results to a relying party.  This
   information exchange may happen at different layers in the protocol
   stack.

   This specification provides a generic way of passing evidence and
   attestation results in the TLS handshake.  Functionality-wise this is
   accomplished with the help of key attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-03'/>
   
</reference>


<reference anchor="IoTopia" target="https://globalplatform.org/iotopia/mud-file-service/">
  <front>
    <title>Global Platform Iotopia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

