<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-posture-assessment-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="RPASCA">Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-00"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Transforming Information Security LLC</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization abbrev="NIST">National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
        <uri>https://orcid.org/0000-0003-1092-2642</uri>
      </address>
    </author>
    <author initials="C." surname="Nelogal" fullname="Chandra Nelogal">
      <organization abbrev="Dell">Dell Technologies</organization>
      <address>
        <postal>
          <street>176 South Street</street>
          <region>MA</region>
          <code>01748</code>
          <country>USA</country>
        </postal>
        <email>chandra.nelogal@dell.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <abstract>
      <?line 72?>

<t>This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, eliminating the need to send over individual attestations for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT). While the discussion below pertains mostly to TPM, other Roots of Trust such as TCG DICE, and non-TCG defined components will also be included.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://kme.github.io/draft-moriarty-attestationsets/draft-moriarty-rats-posture-assessment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-posture-assessment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/kme/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels, local assessment of evidence can be performed to continuously assess compliance.</t>
      <t>For example, the Trusted Computing Group's Trusted Platform Module (TPM) format and assessment method can provide this kind of compliance.  This and other methods employ a secured log for transparency on the results of the assessed evidence against expected values.</t>
      <t>In order to support continuous monitoring of posture assessment and integrity in an enterprise or large data center, the local assessments and remediation are useful to reduce load on the network and remote resources.
This is currently done today in measured boot mechanisms.</t>
      <t>It is useful to be able to share these results in order to gain a big picture view of the governance, risk, and compliance posture for a network.</t>
      <t>As such, communicating a summary result as evidence tied including a link to supporting logs with a remote attestation defined in an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/> provides a way to accomplish that goal.</t>
      <t>This level of integration, which includes the ability to remediate, makes posture assessment through remote attestation achievable for organizations of all sizes.  This is enabled through integration with existing toolsets and systems, built as an intrinsic capability.</t>
      <t>The measurement and policy grouping results summarized in an EAT profile may be provided by the vendor or by a neutral third party to enable ease of use and consistent implementations.</t>
      <t>The local system or server host performs the assessment of posture and remediation.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.</t>
      <t>The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.</t>
      <t>This document describes a method to use existing remote attestation formats and protocols.
The method described allows for defined profiles of policies, benchmarks, and measurements for specific assurance levels.
This provides transparency on posture assessment results summarized with remote attestations.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="posture-assessment-scenarios">
      <name>Posture Assessment Scenarios</name>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks developed with industry experts.
Attestations aligned to the CIS Benchmarks or other configuration guide such as a DISA STIG could be used to assert the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single attestation for a set of benchmarks or policies being met with a link to the verification logs from the local assessments, is the evidence that may be sent to the verifier and then the relying party.
On traditional servers, assurance to NIST SP 800-193 is provable through attestation from a root of trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats. However, this remains local and one knows the policies and measurements have been met if other functions that rely on the assurance are running.</t>
      <t>At boot, policy and measurement expectations are verified against a set of "golden policies" from collected evidence and are verified to meet expected values.  Device identity and measurements can also be attested at runtime.
The attestations on evidence (e.g. hash of boot element) and verification of attestations are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the attestation verification process for boot element.
Event logs and PCR values may be exposed to provide transparency into the verified attestations.  The remote attestation defined in this document provides a summary of a local assessment of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment as evidence. The Relying Party uses the verified evidence to under stand posture of interconnected operating systems, applications, and systems that are communicated in summary results.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, if using the TPM, logs and TPM PCR values may be passed to provide assurance of verification of attestation evidence meeting set requirements.
Providing the set of evidence as assurance to a policy set can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>
and a RESTful interface such as ROLIE <xref target="RFC8322"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed as evidence for the remote attestation. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document to enable interoperability. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide attestation to a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original verified evidence as well as the attestation on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a Governance, Risk, and Compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mps</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">lem</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">pcr</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">fma</td>
            <td align="left">Format of MPS Attestations</td>
            <td align="left">Format of included attestations</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">hsh</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions for a Verifier Owner and Relying Party Owner to declare an Appraisal Policy for Attestation Results and Evidence that allows for modification of the Target Environment (e.g. a product, system, or service).</t>
      <t>Over its lifecycle, the Target Environment may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The Relying Party Owner managing the Target Environment (e.g. customer using the product) can chose to:</t>
      <ul spacing="normal">
        <li>
          <t>Update the Appraisal Policy for Attestation Results and re-assess posture with this updated policy, summarizing with a remote attestation to the new policy or level, or</t>
        </li>
        <li>
          <t>Run remote attestation after modification of the Target Environment as an external validation, or</t>
        </li>
        <li>
          <t>Continue operation of the Target Environment as-is, without verification, potentially increasing risk</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous Reference Values (e.g. TPM PCR values and tokens),</t>
        </li>
        <li>
          <t>framework needs to specify an Appraisal Policy for Evidence that requires fresh Evidence,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous Attestation Results has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare the attested configuration set.
In this case, the creator of the attestation verification measurements would define a set of values for which a message digest would be created and then signed by the attestor.
The expected measurements would include the expected hash value for comparison.</t>
      <t>The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide.</t>
      <t>This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desireable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on system as part of the process to attest to a set of attestations, similar to how attestation is performed for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>Draft section - authors know more work is needed to properly define the registry and claims. This section is here now to assist in understanding the concepts.</t>
      <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between assertions of compliance (or lack thereof) and reporting systems.</t>
      <table>
        <thead>
          <tr>
            <th align="left">MPS Name</th>
            <th align="left">MPS Description</th>
            <th align="left">File with MPS definition</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Ubuntu-CIS-L1</td>
            <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
            <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
          </tr>
        </tbody>
      </table>
      <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8322">
          <front>
            <title>Resource-Oriented Lightweight Information Exchange (ROLIE)</title>
            <author fullname="J. Field" initials="J." surname="Field"/>
            <author fullname="S. Banghart" initials="S." surname="Banghart"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a resource-oriented approach for security automation information publication, discovery, and sharing. Using this approach, producers may publish, share, and exchange representations of software descriptors, security incidents, attack indicators, software vulnerabilities, configuration checklists, and other security automation information as web-addressable resources. Furthermore, consumers and other stakeholders may access and search this security information as needed, establishing a rapid and on-demand information exchange network for restricted internal use or public access repositories. This specification extends the Atom Publishing Protocol and Atom Syndication Format to transport and share security automation resource representations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8322"/>
          <seriesInfo name="DOI" value="10.17487/RFC8322"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 266?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.
Thank you to Henk Birkholz for his review and edits.
Thanks to Thomas Fossati, Michael Richardson, and Eric Voit for their detailed reviews on the mailing list.
Thank you to A.J. Stein for converting the XMLMind workflow to Markdown and GitHub, editorial contributions, and restructuring of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
