<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-moriarty-rats-posture-assessment-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="RPASCA">Remote Posture Assessment for Systems, Containers, and Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-moriarty-rats-posture-assessment-01"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Transforming Information Security LLC</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization abbrev="NIST">National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="03"/>
    <area>Security</area>
    <abstract>
      <?line 62?>

<t>This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://kme.github.io/draft-moriarty-attestationsets/draft-moriarty-rats-posture-assessment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-moriarty-rats-posture-assessment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/kme/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels, local assessment of evidence can be performed to continuousy assess compliance. An example of a form of local attestation is through the Trusted Computing Group's Trusted Platform Module (TPM) format and assessment method. This and other methods provide a secured log for transparency on the results of the assessed evidence against expected values. In order to support continuous monitoring of posture assessment and integrity in an enterprise or large data center, the local assessments and remediation are useful to reduce load on the network and remote resources. This is currently done today for the so called trusted boot process. It is useful to share the results of the compliance to expected values for measurements and policies in order to gain a bigger picture view of the governance, risk, and complaince posture for a network. As such, communiciating a summary result as evidence tied including a link to supporting logs with a remote attestation defined in an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/> provides a way to accomplish that goal. The level of integration for local attestation meeting defined policies and measurements at specific levels, including the ability to remediate makes posture assessment through attestation achievable for organizations of all sizes due to integration being required in existing toolsets and systems, built as an intrinsic capability.
The measurement and policy grouping results summarized in an EAT profile may be provided by the vendor or by a neutral third party to enable ease of use and consistent implementations. The local system or server host performs the assessment of posture and remediation.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.
The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.
This document describes a method to use existing attestation formats and protocols while allowing for defined profiles of policies, benchmarks, and measurements for specific assurance levels to provide transparency on posture assessment results summarized with remote attestations.</t>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks developed with industry experts.
Attestations aligned to the CIS Benchmarks or other configuration guide such as a DISA STIG could be used to assert the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single attestation for a set of benchmarks or policies being met with a link to the verification logs from the local assessments, is the evidence that may be sent to the verifier and then the relying party.
On traditional servers, assurance to NIST SP 800-193 is provable through attestation from a root of trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats. However, this remains local and one knows the policies and measurements have been met if other functions that rely on the assurance are running.</t>
      <t>At boot, policy and measurement expectations are verified against a set of "golden policies" from collected evidence and are verified to meet expected values.  Device identity and measurements can also be attested at runtime.
The attestations on evidence (e.g. hash of boot element) and verification of attestations are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the attestation verification process for boot element.
Event logs and PCR values may be exposed to provide transparency into the verified attestations.  The remote attestation defined in this document provides a summary of a local assessment of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment as evidence. The Relying Party uses the verified evidence to under stand posture of interconnected operating systems, applications, and systems that are communicated in summary results.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, if using the TPM, logs and TPM PCR values may be passed to provide assurance of verification of attestation evidence meeting set requirements.
Providing the set of evidence as assurance to a policy set can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>
and a RESTful interface such as ROLIE <xref target="RFC8832"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed as evidence for the remote attestation. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document to enable interoperability. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide attestation to a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original verified evidence as well as the attestation on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a governance, risk, and compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">MPS</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">LEM</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">PCR</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">FMA</td>
            <td align="left">Format of MPS Attestations</td>
            <td align="left">Format of included attestations</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">HSH</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions within the system and attestation authority to allow for Product modification.</t>
      <t>Over its lifecycle, the Product may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The customer can chose to:</t>
      <ul spacing="normal">
        <li>
          <t>Run remote attestation after product modification, or</t>
        </li>
        <li>
          <t>Not take action and remain un-protected</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous TPM PCR values and tokens,</t>
        </li>
        <li>
          <t>framework needs to collect new measurements,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous attestation has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare the attested configuration set.
In this case, the creator of the attestation verification measurements would define a set of values for which a message digest would be created and then signed by the attestor.
The expected measurements would include the expected hash value for comparison.
The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide. This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desireable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on system as part of the process to attest to a set of attestations, similar to how attestation is performed for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>Draft section - authors know more work is needed to properly define the registry and claims. This section is here now to assist in understanding the concepts.</t>
      <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between assertions of compliance (or lack thereof) and reporting systems.</t>
      <table>
        <thead>
          <tr>
            <th align="left">MPS Name</th>
            <th align="left">MPS Description</th>
            <th align="left">File with MPS definition</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Ubuntu-CIS-L1</td>
            <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
            <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
          </tr>
        </tbody>
      </table>
      <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="25" month="June" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-28"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8832">
          <front>
            <title>WebRTC Data Channel Establishment Protocol</title>
            <author fullname="R. Jesup" initials="R." surname="Jesup"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>The WebRTC framework specifies protocol support for direct interactive rich communication using audio, video, and data between two peers' web browsers. This document specifies a simple protocol for establishing symmetric data channels between the peers. It uses a two-way handshake and allows sending of user data without waiting for the handshake to complete.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8832"/>
          <seriesInfo name="DOI" value="10.17487/RFC8832"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 232?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.
Thank you to Henk Birkholz for his review and edits.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
