<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-posture-assessment-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="RPASCA">Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-01"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Transforming Information Security LLC</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization abbrev="NIST">National Institute of Standards and Technology</organization>
      <address>
        <postal>
          <street>100 Bureau Drive</street>
          <city>Gaithersburg</city>
          <region>MD</region>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
        <uri>https://orcid.org/0000-0003-1092-2642</uri>
      </address>
    </author>
    <author initials="C." surname="Nelogal" fullname="Chandra Nelogal">
      <organization abbrev="Dell">Dell Technologies</organization>
      <address>
        <postal>
          <street>176 South Street</street>
          <region>MA</region>
          <code>01748</code>
          <country>USA</country>
        </postal>
        <email>chandra.nelogal@dell.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <abstract>
      <?line 72?>

<t>This document establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls that are defined and grouped by an external entity, eliminating the need to send over individual attestations for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT). While the discussion below pertains mostly to TPM, other Roots of Trust such as TCG DICE, and non-TCG defined components will also be included.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://kme.github.io/draft-moriarty-attestationsets/draft-moriarty-rats-posture-assessment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-moriarty-rats-posture-assessment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/kme/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels, local assessment of evidence can be performed to continuously assess compliance.</t>
      <t>For example, the Trusted Computing Group's Trusted Platform Module (TPM) format and assessment method can provide this kind of compliance.  This and other methods employ a secured log for transparency on the results of the assessed evidence against expected values.</t>
      <t>In order to support continuous monitoring of posture assessment and integrity in an enterprise or large data center, the local assessments and remediation are useful to reduce load on the network and remote resources.
This is currently done today in measured boot mechanisms.</t>
      <t>It is useful to be able to share these results in order to gain a big picture view of the governance, risk, and compliance posture for a network.</t>
      <t>As such, communicating a summary result as evidence tied including a link to supporting logs with a remote attestation defined in an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/> provides a way to accomplish that goal.</t>
      <t>This level of integration, which includes the ability to remediate, makes posture assessment through remote attestation achievable for organizations of all sizes.  This is enabled through integration with existing toolsets and systems, built as an intrinsic capability.</t>
      <t>The measurement and policy grouping results summarized in an EAT profile may be provided by the vendor or by a neutral third party to enable ease of use and consistent implementations.</t>
      <t>The local system or server host performs the assessment of posture and remediation.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.</t>
      <t>The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.</t>
      <t>This document describes a method to use existing remote attestation formats and protocols.
The method described allows for defined profiles of policies, benchmarks, and measurements for specific assurance levels.
This provides transparency on posture assessment results summarized with remote attestations.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="posture-assessment-scenarios">
      <name>Posture Assessment Scenarios</name>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks developed with industry experts.
Attestations aligned to the CIS Benchmarks or other configuration guide such as a DISA STIG could be used to assert the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single attestation for a set of benchmarks or policies being met with a link to the verification logs from the local assessments, is the evidence that may be sent to the verifier and then the relying party.
On traditional servers, assurance to NIST SP 800-193 is provable through attestation from a root of trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats. However, this remains local and one knows the policies and measurements have been met if other functions that rely on the assurance are running.</t>
      <t>At boot, policy and measurement expectations are verified against a set of "golden policies" from collected evidence and are verified to meet expected values.  Device identity and measurements can also be attested at runtime.
The attestations on evidence (e.g. hash of boot element) and verification of attestations are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the attestation verification process for boot element.
Event logs and PCR values may be exposed to provide transparency into the verified attestations.  The remote attestation defined in this document provides a summary of a local assessment of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment as evidence. The Relying Party uses the verified evidence to under stand posture of interconnected operating systems, applications, and systems that are communicated in summary results.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, if using the TPM, logs and TPM PCR values may be passed to provide assurance of verification of attestation evidence meeting set requirements.
Providing the set of evidence as assurance to a policy set can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>
and a RESTful interface such as ROLIE <xref target="RFC8322"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed as evidence for the remote attestation. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document to enable interoperability. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide attestation to a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original verified evidence as well as the attestation on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a Governance, Risk, and Compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mps</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">lem</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">pcr</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">fma</td>
            <td align="left">Format of MPS Attestations</td>
            <td align="left">Format of included attestations</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">hsh</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions for a Verifier Owner and Relying Party Owner to declare an Appraisal Policy for Attestation Results and Evidence that allows for modification of the Target Environment (e.g. a product, system, or service).</t>
      <t>Over its lifecycle, the Target Environment may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The Relying Party Owner managing the Target Environment (e.g. customer using the product) can chose to:</t>
      <ul spacing="normal">
        <li>
          <t>Update the Appraisal Policy for Attestation Results and re-assess posture with this updated policy, summarizing with a remote attestation to the new policy or level, or</t>
        </li>
        <li>
          <t>Run remote attestation after modification of the Target Environment as an external validation, or</t>
        </li>
        <li>
          <t>Continue operation of the Target Environment as-is, without verification, potentially increasing risk</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous Reference Values (e.g. TPM PCR values and tokens),</t>
        </li>
        <li>
          <t>framework needs to specify an Appraisal Policy for Evidence that requires fresh Evidence,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous Attestation Results has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare the attested configuration set.
In this case, the creator of the attestation verification measurements would define a set of values for which a message digest would be created and then signed by the attestor.
The expected measurements would include the expected hash value for comparison.</t>
      <t>The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide.</t>
      <t>This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desireable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on system as part of the process to attest to a set of attestations, similar to how attestation is performed for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby a remote attestation could be issued for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to send over individual attestations for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>Draft section - authors know more work is needed to properly define the registry and claims. This section is here now to assist in understanding the concepts.</t>
      <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between assertions of compliance (or lack thereof) and reporting systems.</t>
      <table>
        <thead>
          <tr>
            <th align="left">MPS Name</th>
            <th align="left">MPS Description</th>
            <th align="left">File with MPS definition</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Ubuntu-CIS-L1</td>
            <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
            <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
          </tr>
        </tbody>
      </table>
      <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestations</td>
              <td align="left">Format of included attestations</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8322">
          <front>
            <title>Resource-Oriented Lightweight Information Exchange (ROLIE)</title>
            <author fullname="J. Field" initials="J." surname="Field"/>
            <author fullname="S. Banghart" initials="S." surname="Banghart"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a resource-oriented approach for security automation information publication, discovery, and sharing. Using this approach, producers may publish, share, and exchange representations of software descriptors, security incidents, attack indicators, software vulnerabilities, configuration checklists, and other security automation information as web-addressable resources. Furthermore, consumers and other stakeholders may access and search this security information as needed, establishing a rapid and on-demand information exchange network for restricted internal use or public access repositories. This specification extends the Atom Publishing Protocol and Atom Syndication Format to transport and share security automation resource representations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8322"/>
          <seriesInfo name="DOI" value="10.17487/RFC8322"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 266?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.
Thank you to Henk Birkholz for his review and edits.
Thanks to Thomas Fossati, Michael Richardson, and Eric Voit for their detailed reviews on the mailing list.
Thank you to A.J. Stein for converting the XMLMind workflow to Markdown and GitHub, editorial contributions, and restructuring of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
