<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-moran-iot-nets-03" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT networking security guidelines">A summary of security-enabling technologies for IoT devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2023" month="April" day="24"/>

    <area>Security</area>
    <workgroup>IOTOPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This memo serves as an entry-point to detail which technologies are available for use in IoT networks and to enable IoT designers to discover technologies that may solve their problems. This draft addresses.</t>

<t>Many baseline security requirements documents have been drafted by standards setting organisations, however these documents typically do not specify the technologies available to satisfy those requirements. They also do not express the next steps if an implementor wants to go above and beyond the baseline in order to differentiate their products and enable even better security. This memo defines the mapping from some IoT baseline security requirements definitions to ietf and related security technologies. It also highlights some gaps in those IoT baseline security requirements.</t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="survey-of-baseline-security-requirements"><name>Survey of baseline security requirements</name>

<t>At time of writing, there are IoT baseline security requirements provided by several organisations:</t>

<t><list style="symbols">
  <t>ENISA's Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (<xref target="ENISA-Baseline"/>)</t>
  <t>ETSI's Cyber Security for Consumer Internet of Things: Baseline Requirements <xref target="ETSI-Baseline"/></t>
  <t>NIST's IoT Device Cybersecurity Capability Core Baseline <xref target="NIST-Baseline"/></t>
</list></t>

</section>
<section anchor="requirement-mapping"><name>Requirement Mapping</name>

<t>Requirements that pertain to hardware, procedure, and policy compliance are noted, but do not map to ietf and related technologies. NIST's requirements (<xref target="NIST-Baseline"/>) are very broad and already have mappings to ENISA baseline security recommendations.</t>

<section anchor="hardware-security"><name>Hardware Security</name>

<section anchor="identity"><name>Identity</name>

<t>ENISA GP-PS-10: Establish and maintain asset management procedures and configuration controls for key network and information systems.
NIST Device Identification: The IoT device can be uniquely identified logically and physically.</t>

<t>These requirements are architectural requirements, however <xref target="RFC4122"/> can be used for identifiers.</t>

</section>
<section anchor="hardware-immutable-root-of-trust"><name>Hardware Immutable Root of Trust</name>

<t>ENISA GP-TM-01: Employ a hardware-based immutable root of trust.</t>

<t>This is an architectural requirement.</t>

</section>
<section anchor="hardware-backed-secret-storage"><name>Hardware-Backed Secret Storage</name>

<t>ENISA GP-TM-02: Use hardware that incorporates security features to strengthen the protection and integrity of the device - for example, specialized security chips / coprocessors that integrate security at the transistor level, embedded in the processor, providing, among other things, a trusted storage of device identity and authentication means, protection of keys at rest and in use, and preventing unprivileged from accessing to security sensitive code. Protection against local and physical attacks can be covered via functional security.</t>

<t>NIST Data Protection: The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>

<t>This is an architectural requirement.</t>

</section>
</section>
<section anchor="software-integrity-authenticity"><name>Software Integrity &amp; Authenticity</name>

<section anchor="boot-environment-trustworthiness-and-integrity"><name>Boot Environment Trustworthiness and Integrity</name>

<t>ENISA GP-TM-03: Trust must be established in the boot environment before any trust in any other software or executable program can be claimed.</t>

<t>Satisfying this requirement can be done in several ways, increasing in security guarantees:</t>

<t><list style="numbers">
  <t>Implement secure boot to verify the bootloader and boot environment. Trust is established purely by construction: if code is running in the boot environment, it must have been signed, therefore it is trustworthy.</t>
  <t>Record critical measurements of each step of boot in a TPM. Trust is established by evaluating the measurements recorded by the TPM.</t>
  <t>Use Remote Attestation. Remote attestation allows a device to report to third parties the critical measurements it has recorded (either in a TPM or signed by each stage) in order to prove the trustworthiness of the boot environment and running software. Remote Attestation is implemented in <xref target="I-D.ietf-rats-eat"/>.</t>
</list></t>

</section>
<section anchor="code-integrity-and-authenticity"><name>Code Integrity and Authenticity</name>

<t>ENISA GP-TM-04: Sign code cryptographically to ensure it has not been tampered with after signing it as safe for the device, and implement run-time protection and secure execution monitoring to make sure malicious attacks do not overwrite code after it is loaded.</t>

<t>Satisfying this requirement requires a secure invocation mechanism. In monolithic IoT software images, this is accomplished by Secure Boot. In IoT devices with more fully-featured operating systems, this is accomplished with an operating system-specific code signing practice.</t>

<t>Secure Invocation can be achieved using the SUIT Manifest format, which provides for secure invocation procedures. See <xref target="I-D.ietf-suit-manifest"/>.</t>

<t>To satisfy the associated requirement of run-time protection and secure execution monitoring, the use of a TEE is recommended to protect sensitive processes. The TEEP protocol (see <xref target="I-D.ietf-teep-architecture"/>) is recommended for managing TEEs.</t>

</section>
<section anchor="secure-firmware-update"><name>Secure Firmware Update</name>

<t>ENISA GP-TM-05: Control the installation of software in operating systems, to prevent unauthenticated software and files from being loaded onto it.</t>

<t>NIST Software Update:</t>

<t><list style="numbers">
  <t>The ability to update the device’s software through remote (e.g., network download) and/or local means (e.g., removable media)</t>
  <t>The ability to verify and authenticate any update before installing it</t>
  <t>The ability for authorized entities to roll back updated software to a previous version</t>
  <t>The ability to restrict updating actions to authorized entities only</t>
  <t>The ability to enable or disable updating</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to:</t>
  <t>The ability to configure any remote update mechanisms to be either automatically or manually initiated for update downloads and installations</t>
  <t>The ability to enable or disable notification when an update is available and specify who or what is to be notified</t>
</list></t>

<t>Many fully-featured operating systems have dedicated means of implementing this requirement. The SUIT manifest (See <xref target="I-D.ietf-suit-manifest"/>) is recommended as a means of providing secure, authenticated software update. Where the software is deployed to a TEE, TEEP (See <xref target="I-D.ietf-teep-protocol"/>) is recommended for software update and management.</t>

</section>
<section anchor="configuration"><name>Configuration</name>

<t>NIST Device Configuration:</t>

<t><list style="numbers">
  <t>The ability to change the device’s software configuration settings</t>
  <t>The ability to restrict configuration changes to authorized entities only</t>
  <t>The ability for authorized entities to restore the device to a secure configuration defined by an authorized entity</t>
</list></t>

<t>Configuration can be delivered to a device either via a firmware update, such as in <xref target="I-D.ietf-suit-manifest"/>, or via a runtime configuration interface, such as <xref target="LwM2M"/>.</t>

</section>
<section anchor="resilience-to-failure"><name>Resilience to Failure</name>

<t>ENISA GP-TM-06: Enable a system to return to a state that was known to be secure, after a security breach has occured or if an upgrade has not been successful.</t>

<t>While there is no specificaiton for this, it is also required in <xref target="RFC9019"/></t>

</section>
<section anchor="trust-anchor-management"><name>Trust Anchor Management</name>

<t>ENISA GP-TM-07: Use protocols and mechanisms able to represent and manage trust and trust relationships.</t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships).</t>

</section>
</section>
<section anchor="default-security-privacy"><name>Default Security &amp; Privacy</name>

<section anchor="security-on-by-default"><name>Security ON by Default</name>

<t>ENISA GP-TM-08: Any applicable security features should be enabled by default, and any unused or insecure functionalities should be disabled by default.</t>

<t>NIST Logical Access to Interfaces:</t>

<t><list style="numbers">
  <t>The ability to logically or physically disable any local and network interfaces that are not necessary for the core functionality of the device</t>
  <t>The ability to logically restrict access to each network interface to only authorized entities (e.g., device authentication, user authentication)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability to enable, disable, and adjust thresholds for any ability the device might have to lock or disable an account or to delay additional authentication attempts after too many failed authentication attempts</t>
</list></t>

<t>These are procedural requirements, rather than a protocol or document requirement.</t>

</section>
<section anchor="default-unique-passwords"><name>Default Unique Passwords</name>

<t>ENISA GP-TM-09: Establish hard to crack, device-individual default passwords.</t>

<t>This is a procedural requirement, rather than a protocol or document requirement.</t>

</section>
</section>
<section anchor="data-protection"><name>Data Protection</name>

<t>The data protection requirements are largely procedural/architectural. While this memo can recommend using TEEs to protect data, and TEEP (<xref target="I-D.ietf-teep-architecture"/>) to manage TEEs, implementors must choose to architect their software in such a way that TEEs are helpful in meeting these requirements.</t>

<t>ENISA Data Protection requirements:</t>

<t><list style="symbols">
  <t>GP-TM-10: Personal data must be collected and processed fairly and lawfully, it should never be collected and processed without the data subject's consent.</t>
  <t>GP-TM-11: Make sure that personal data is used for the specified purposes for which they were collected, and that any further processing of personal data is compatible and that the data subjects are well informed.</t>
  <t>GP-TM-12: Minimise the data collected and retained.</t>
  <t>GP-TM-13: IoT stakeholders must be compliant with the EU General Data Protection Regulation (GDPR).</t>
  <t>GP-TM-14: Users of IoT products and services must be able to exercise their rights to information, access, erasure, rectification, data portability, restriction of processing, objection to processing, and their right not to be evaluated on the basis of automated processing.</t>
</list></t>

<t>NIST Data Protection:</t>

<t><list style="numbers">
  <t>The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>
  <t>The ability for authorized entities to render all data on the device inaccessible by all entities, whether previously authorized or not (e.g., through a wipe of internal storage, destruction of cryptographic keys for encrypted data)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability for authorized entities to configure the cryptography use itself, such as choosing a key length</t>
</list></t>

</section>
<section anchor="system-safety-and-reliability"><name>System Safety and Reliability</name>

<t>Safety and reliability requirements are procedural/architectural. Implementors should ensure they have processes and architectures in place to meet these requirements.</t>

<t>ENISA Safety and Reliability requirements:</t>

<t><list style="symbols">
  <t>GP-TM-15: Design with system and operational disruption in mind, preventing the system from causing an unacceptable risk of injury or physical damage.</t>
  <t>GP-TM-16: Mechanisms for self-diagnosis and self-repair/healing to recover from failure, malfunction or a compromised state.</t>
  <t>GP-TM-17: Ensure standalone operation - essential features should continue to work with a loss of communications and chronicle negative impacts from compromised devices or cloud-based systems.</t>
</list></t>

</section>
<section anchor="secure-software-firmware-updates"><name>Secure Software / Firmware updates</name>

<t>Technical requirements for Software Updates are provided for in SUIT (<xref target="I-D.ietf-suit-manifest"/>) and TEEP (<xref target="I-D.ietf-teep-protocol"/>). Procedural and architectural requirements should be independently assessed by the implementor.</t>

<t>ENISA Software Update Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-18: Ensure that the device software/firmware, its configuration and its applications have the ability to update Over-The-Air (OTA), that the update server is secure, that the update file is transmitted via a secure connection, that it does not contain sensitive data (e.g. hardcoded credentials), that it is signed by an authorised trust entity and encrypted using accepted encryption methods, and that the update package has its digital signature, signing certificate and signing certificate chain, verified by the device before the update process begins.</t>
  <t>GP-TM-19: Offer an automatic firmware update mechanism.</t>
  <t>GP-TM-20: (Procedural / Architectural) Backward compatibility of firmware updates. Automatic firmware updates should not modify user-configured preferences, security, and/or privacy settings without user notification.</t>
</list></t>

</section>
<section anchor="authentication"><name>Authentication</name>

<section anchor="align-authentication-schemes-with-threat-models"><name>Align Authentication Schemes with Threat Models</name>

<t>ENISA GP-TM-21: Design the authentication and authorisation schemes (unique per device) based on the system-level threat models.</t>

<t>This is a procedural / architectural requirement.</t>

</section>
<section anchor="password-rules"><name>Password Rules</name>

<t>ENISA applies the following requirements to Password-based authentication:</t>

<t><list style="symbols">
  <t>GP-TM-22: Ensure that default passwords and even default usernames are changed during the initial setup, and that weak, null or blank passwords are not allowed.</t>
  <t>GP-TM-23: Authentication mechanisms must use strong passwords or personal identification numbers (PINs), and should consider using two-factor authentication (2FA) or multi-factor authentication (MFA) like Smartphones, Biometrics, etc., on top of certificates.</t>
  <t>GP-TM-24: Authentication credentials shall be salted, hashed and/or encrypted.</t>
  <t>GP-TM-25: Protect against 'brute force' and/or other abusive login attempts. This protection should also consider keys stored in devices.</t>
  <t>GP-TM-26: Ensure password recovery or reset mechanism is robust and does not supply an attacker with information indicating a valid account. The same applies to key update and recovery mechanisms.</t>
</list></t>

<t>As an alternative, implementors are encouraged to consider passwordless schemes, such as FIDO.</t>

</section>
</section>
<section anchor="authorisation"><name>Authorisation</name>

<section anchor="principle-of-least-privilege"><name>Principle of Least Privilege</name>

<t>ENISA GP-TM-27: Limit the actions allowed for a given system by Implementing fine-grained authorisation mechanisms and using the Principle of least privilege (POLP): applications must operate at the lowest privilege level possible.</t>

<t>This is a procedural / architectural requirement, however at the network level, this can be implemented using Manufacturer Usage Descriptions (see <xref target="RFC8520"/>).</t>

</section>
<section anchor="software-isolation"><name>Software Isolation</name>

<t>ENISA GP-TM-28: Device firmware should be designed to isolate privileged code, processes and data from portions of the firmware that do not need access to them. Device hardware should provide isolation concepts to prevent unprivileged from accessing security sensitive code.</t>

<t>Implementors should use TEEs to address this requirement. The provisioning and management of TEEs can be accomplished using TEEP (see <xref target="I-D.ietf-teep-architecture"/>).</t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t>ENISA GP-TM-29: Data integrity and confidentiality must be enforced by access controls. When the subject requesting access has been authorised to access particular processes, it is necessary to enforce the defined security policy.
ENISA GP-TM-30: Ensure a context-based security and privacy that reflects different levels of importance.</t>

<t>These requirements are complex and require a variety of technologies to implement. Use of TEEs can provide a building block for these requirements, but is not sufficient in itself to meet these requiremnents.</t>

</section>
</section>
<section anchor="environmental-and-physical-security"><name>Environmental and Physical Security</name>

<t>ENISA defines the following physical security requirements. These are hardware-architectural requirements and not covered by protocol and format specifications.</t>

<t><list style="symbols">
  <t>GP-TM-31: Measures for tamper protection and detection. Detection and reaction to hardware
tampering should not rely on network connectivity.</t>
  <t>GP-TM-32: Ensure that the device cannot be easily disassembled and that the data storage medium is encrypted at rest and cannot be easily removed.</t>
  <t>GP-TM-33: Ensure that devices only feature the essential physical external ports (such as USB) necessary for them to function and that the test/debug modes are secure, so they cannot be used to maliciously access the devices. In general, lock down physical ports to only trusted connections.</t>
</list></t>

</section>
<section anchor="cryptography"><name>Cryptography</name>

<t>ENISA makes the following architectural cryptography requirements for IoT devices:</t>

<t><list style="symbols">
  <t>GP-TM-34: Ensure a proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of data and information (including control messages), in transit and in rest. Ensure the proper selection of standard and strong encryption algorithms and strong keys, and disable insecure protocols. Verify the robustness of the implementation.</t>
  <t>GP-TM-35: Cryptographic keys must be securely managed.</t>
  <t>GP-TM-36: Build devices to be compatible with lightweight encryption and security techniques.</t>
  <t>GP-TM-37: Support scalable key management schemes.</t>
</list></t>

</section>
<section anchor="secure-and-trusted-communications"><name>Secure and Trusted Communications</name>

<section anchor="data-security"><name>Data Security</name>

<t>GP-TM-38: Guarantee the different security aspects -confidentiality (privacy), integrity, availability and authenticity- of the information in transit on the networks or stored in the IoT application or in the Cloud.</t>

<t>This Data Security requirement can be fulfilled using COSE <xref target="RFC8152"/> for ensuring the authenticity, integrity, and confidentiality of data either in transit or at rest. Secure Transport (see <xref target="secure-transport"/>) technologies can be used to protect data in transit.</t>

</section>
<section anchor="secure-transport"><name>Secure Transport</name>

<t>ENISA GP-TM-39: Ensure that communication security is provided using state-of-the-art, standardised security protocols, such as TLS for encryption.
ENISA GP-TM-40: Ensure credentials are not exposed in internal or external network traffic.</t>

<t>This requirement is satisfied by several standards:</t>

<t><list style="symbols">
  <t>TLS (<xref target="RFC8446"/>).</t>
  <t>DTLS (<xref target="RFC9147"/>).</t>
  <t>QUIC (<xref target="RFC9000"/>).</t>
  <t>OSCORE (<xref target="RFC9203"/>).</t>
</list></t>

</section>
<section anchor="data-authenticity"><name>Data Authenticity</name>

<t>ENISA GP-TM-41: Guarantee data authenticity to enable reliable exchanges from data emission to data reception. Data should always be signed whenever and wherever it is captured and stored.</t>

<t>The authenticity of data can be protected using COSE <xref target="RFC8152"/>.</t>

<t>ENISA GP-TM-42: Do not trust data received and always verify any interconnections. Discover, identify and verify/authenticate the devices connected to the network before trust can be established, and preserve
their integrity for reliable solutions and services.</t>

<t>Verifying communication partners can be done in many ways. Key technologies supporting authentication of communication partners are:</t>

<t><list style="symbols">
  <t>RATS: Remote attestation of a communication partner (See <xref target="I-D.ietf-rats-architecture"/>).</t>
  <t>TLS/DTLS: Mutual authentication of communication partners (See <xref target="RFC8446"/> / <xref target="RFC9147"/>).</t>
  <t>ATLS: Application-layer TLS for authenticating a connection that may traverse multiple secure transport connections.</t>
  <t>Attested TLS: The use of attestation in session establishment in TLS (See <xref target="I-D.fossati-tls-attestation"/>).</t>
</list></t>

</section>
<section anchor="least-privilege-communication"><name>Least Privilege Communication</name>

<t>ENISA GP-TM-43: IoT devices should be restrictive rather than permissive in communicating.</t>

<t>This Requirement can be enabled and enforced using Manufacturer Usage Descriptions, which codify expected communication (See <xref target="RFC8520"/>)</t>

<t>ENISA GP-TM-44: Make intentional connections. Prevent unauthorised connections to it or other devices the
product is connected to, at all levels of the protocols.</t>

<t>This requirement can be satisfied through authenticating connections (TLS / DTLS mutual authentication. See <xref target="RFC8446"/> / <xref target="RFC9147"/>) and declaring communication patterns (Manufacturer Usage Descriptions. See <xref target="RFC8520"/>)</t>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-45: Disable specific ports and/or network connections for selective connectivity.</t>
  <t>ENISA GP-TM-46: Rate limiting. Controlling the traffic sent or received by a network to reduce the risk of automated attacks.</t>
</list></t>

</section>
</section>
<section anchor="secure-interfaces-and-network-services"><name>Secure Interfaces and network services</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>GP-TM-47: Risk Segmentation. Splitting network elements into separate components to help isolate security breaches and minimise the overall risk.</t>
  <t>GP-TM-48: Protocols should be designed to ensure that, if a single device is compromised, it does not affect the whole set.</t>
  <t>GP-TM-49: Avoid provisioning the same secret key in an entire product family, since compromising a single device would be enough to expose the rest of the product family.</t>
  <t>GP-TM-50: Ensure only necessary ports are exposed and available.</t>
  <t>GP-TM-51: Implement a DDoS-resistant and Load-Balancing infrastructure.</t>
  <t>GP-TM-53: Avoid security issues when designing error messages.</t>
</list></t>

<section anchor="encrypted-user-sessions"><name>Encrypted User Sessions</name>

<t>ENISA GP-TM-52: Ensure web interfaces fully encrypt the user session, from the device to the backend services, and that they are not susceptible to XSS, CSRF, SQL injection, etc.</t>

<t>This requirement can be partially satisfied through use of TLS or QUIC (See <xref target="RFC8446"/> and <xref target="RFC9000"/>)</t>

</section>
</section>
<section anchor="secure-input-and-output-handling"><name>Secure input and output handling</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-54: Data input validation (ensuring that data is safe prior to use) and output filtering.</t>

</section>
<section anchor="logging"><name>Logging</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-55: Implement a logging system that records events relating to user authentication, management of accounts and access rights, modifications to security rules, and the functioning of the system. Logs must be preserved on durable storage and retrievable via authenticated connections.</t>

<t>NIST Cybersecurity State Awareness</t>

<t><list style="numbers">
  <t>The ability to report the device’s cybersecurity state</t>
  <t>The ability to differentiate between when a device will likely operate as expected from when it may be in a degraded cybersecurity state</t>
  <t>The ability to restrict access to the state indicator so only authorized entities can view it</t>
  <t>The ability to prevent any entities (authorized or unauthorized) from editing the state except for those entities that are responsible for maintaining the device’s state information</t>
  <t>The ability to make the state information available to a service on another device, such as an event/state log server</t>
</list></t>

<t>Certain logs and indicators of cybersecurity state can be transported via RATS: See <xref target="I-D.ietf-rats-eat"/>. Where associated with SUIT firmware updates, logs can be transported using SUIT Reports. See <xref target="I-D.ietf-suit-report"/>.</t>

</section>
<section anchor="monitoring-and-auditing"><name>Monitoring and Auditing</name>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-56: Implement regular monitoring to verify the device behaviour, to detect malware and to discover integrity errors.</t>
  <t>ENISA GP-TM-57: Conduct periodic audits and reviews of security controls to ensure that the controls are effective. Perform penetration tests at least biannually.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>No additional security considerations are required; they are laid out in the preceeding sections.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC4122'>
<front>
<title>A Universally Unique IDentifier (UUID) URN Namespace</title>
<author fullname='P. Leach' initials='P.' surname='Leach'><organization/></author>
<author fullname='M. Mealling' initials='M.' surname='Mealling'><organization/></author>
<author fullname='R. Salz' initials='R.' surname='Salz'><organization/></author>
<date month='July' year='2005'/>
<abstract><t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier).  A UUID is 128 bits long, and can guarantee uniqueness across space and time.  UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t><t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group).  Information from earlier versions of the DCE specification have been incorporated into this document.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4122'/>
<seriesInfo name='DOI' value='10.17487/RFC4122'/>
</reference>



<reference anchor='RFC8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author fullname='E. Lear' initials='E.' surname='Lear'><organization/></author>
<author fullname='R. Droms' initials='R.' surname='Droms'><organization/></author>
<author fullname='D. Romascanu' initials='D.' surname='Romascanu'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>



<reference anchor='RFC8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>



<reference anchor='RFC7030'>
<front>
<title>Enrollment over Secure Transport</title>
<author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'><organization/></author>
<author fullname='P. Yee' initials='P.' role='editor' surname='Yee'><organization/></author>
<author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'><organization/></author>
<date month='October' year='2013'/>
<abstract><t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t></abstract>
</front>
<seriesInfo name='RFC' value='7030'/>
<seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>



<reference anchor='RFC8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC9019'>
<front>
<title>A Firmware Update Architecture for Internet of Things</title>
<author fullname='B. Moran' initials='B.' surname='Moran'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='D. Brown' initials='D.' surname='Brown'><organization/></author>
<author fullname='M. Meriac' initials='M.' surname='Meriac'><organization/></author>
<date month='April' year='2021'/>
<abstract><t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t><t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t></abstract>
</front>
<seriesInfo name='RFC' value='9019'/>
<seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>



<reference anchor='RFC9203'>
<front>
<title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
<author fullname='F. Palombini' initials='F.' surname='Palombini'><organization/></author>
<author fullname='L. Seitz' initials='L.' surname='Seitz'><organization/></author>
<author fullname='G. Selander' initials='G.' surname='Selander'><organization/></author>
<author fullname='M. Gunnarsson' initials='M.' surname='Gunnarsson'><organization/></author>
<date month='August' year='2022'/>
<abstract><t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework.  It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t></abstract>
</front>
<seriesInfo name='RFC' value='9203'/>
<seriesInfo name='DOI' value='10.17487/RFC9203'/>
</reference>



<reference anchor='RFC8152'>
<front>
<title>CBOR Object Signing and Encryption (COSE)</title>
<author fullname='J. Schaad' initials='J.' surname='Schaad'><organization/></author>
<date month='July' year='2017'/>
<abstract><t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.</t></abstract>
</front>
<seriesInfo name='RFC' value='8152'/>
<seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>



<reference anchor='RFC9000'>
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
<author fullname='J. Iyengar' initials='J.' role='editor' surname='Iyengar'><organization/></author>
<author fullname='M. Thomson' initials='M.' role='editor' surname='Thomson'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t></abstract>
</front>
<seriesInfo name='RFC' value='9000'/>
<seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>



<reference anchor='RFC9147'>
<front>
<title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<author fullname='N. Modadugu' initials='N.' surname='Modadugu'><organization/></author>
<date month='April' year='2022'/>
<abstract><t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t><t>This document obsoletes RFC 6347.</t></abstract>
</front>
<seriesInfo name='RFC' value='9147'/>
<seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.0-20201202.html">
  <front>
    <title>FIDO Device Onboarding</title>
    <author initials="" surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="LwM2M" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
  <front>
    <title>LwM2M Core Specification</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISA-Baseline" target="https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/">
  <front>
    <title>Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures</title>
    <author initials="" surname="ENISA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-Baseline" target="https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf">
  <front>
    <title>Cyber Security for Consumer Internet of Things: Baseline Requirements</title>
    <author initials="" surname="ETSI">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NIST-Baseline" target="https://www.nist.gov/publications/iot-device-cybersecurity-capability-core-baseline">
  <front>
    <title>IoT Device Cybersecurity Capability Core Baseline</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Jeremy O&#39;Donoghue' initials='J.' surname='O&#39;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='19' month='December' year='2022'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-19'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='27' month='February' year='2023'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the that code/data,
   the devices to which it applies, and cryptographic information
   protecting the manifest.  Software updates and Trusted Invocation
   both tend to use sequences of common operations, so the manifest
   encodes those sequences of operations, rather than declaring the
   metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-22'/>
   
</reference>


<reference anchor='I-D.ietf-sacm-coswid'>
   <front>
      <title>Concise Software Identification Tags</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Jessica Fitzgerald-McKay' initials='J.' surname='Fitzgerald-McKay'>
         <organization>National Security Agency</organization>
      </author>
      <author fullname='Charles Schmidt' initials='C.' surname='Schmidt'>
         <organization>The MITRE Corporation</organization>
      </author>
      <author fullname='David Waltermire' initials='D.' surname='Waltermire'>
         <organization>National Institute of Standards and Technology</organization>
      </author>
      <date day='24' month='February' year='2023'/>
      <abstract>
	 <t>   ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an
   extensible XML-based structure to identify and describe individual
   software components, patches, and installation bundles.  SWID tag
   representations can be too large for devices with network and storage
   constraints.  This document defines a concise representation of SWID
   tags: Concise SWID (CoSWID) tags.  CoSWID supports a similar set of
   semantics and features as SWID tags, as well as new semantics that
   allow CoSWIDs to describe additional types of information, all in a
   more memory efficient format.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-24'/>
   
</reference>


<reference anchor='I-D.birkholz-rats-corim'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>arm</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>arm</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies Concise Reference Integrity Manifests (CoRIM) that
   represent Endorsements and Reference Values in CBOR format.
   Composite devices or systems are represented by a collection of
   Concise Module Identifiers (CoMID) and Concise Software Identifiers
   (CoSWID) bundled in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-03'/>
   
</reference>


<reference anchor='I-D.ietf-teep-architecture'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>   A Trusted Execution Environment (TEE) is an environment that enforces
   that any code within that environment cannot be tampered with, and
   that any data used by such code cannot be read or tampered with by
   any code outside that environment.  This architecture document
   motivates the design and standardization of a protocol for managing
   the lifecycle of trusted applications running inside such a TEE.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-19'/>
   
</reference>


<reference anchor='I-D.ietf-teep-protocol'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Protocol</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Akira Tsukamoto' initials='A.' surname='Tsukamoto'>
         </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document specifies a protocol that installs, updates, and
   deletes Trusted Components in a device with a Trusted Execution
   Environment (TEE).  This specification defines an interoperable
   protocol for managing the lifecycle of Trusted Components.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-protocol-12'/>
   
</reference>


<reference anchor='I-D.ietf-rats-architecture'>
   <front>
      <title>Remote ATtestation procedureS (RATS) Architecture</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='28' month='September' year='2022'/>
      <abstract>
	 <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-report'>
   <front>
      <title>Secure Reporting of Update Status</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   The Software Update for the Internet of Things (SUIT) manifest
   provides a way for many different update and boot workflows to be
   described by a common format.  However, this does not provide a
   feedback mechanism for developers in the event that an update or boot
   fails.

   This specification describes a lightweight feedback mechanism that
   allows a developer in possession of a manifest to reconstruct the
   decisions made and actions performed by a manifest processor.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-report-05'/>
   
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   Attestation is the process by which an entity produces evidence about
   itself that another party can use to evaluate the trustworthiness of
   that entity.

   In use cases that require the use of remote attestation, such as
   confidential computing or device onboarding, an attester has to
   convey evidence or attestation results to a relying party.  This
   information exchange may happen at different layers in the protocol
   stack.

   This specification provides a generic way of passing evidence and
   attestation results in the TLS handshake.  Functionality-wise this is
   accomplished with the help of key attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-03'/>
   
</reference>


<reference anchor="IoTopia" target="https://globalplatform.org/iotopia/mud-file-service/">
  <front>
    <title>Global Platform Iotopia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

