<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-ietf-iotops-security-summary-01" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT networking security summary">A summary of security-enabling technologies for IoT devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2023" month="October" day="23"/>

    <area>Security</area>
    <workgroup>IOTOPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This memo serves as an entry-point to detail which technologies are available for use in IoT networks and to enable IoT designers to discover technologies that may solve their problems. This draft addresses.</t>

<t>Many baseline security requirements documents have been drafted by standards setting organisations, however these documents typically do not specify the technologies available to satisfy those requirements. They also do not express the next steps if an implementor wants to go above and beyond the baseline in order to differentiate their products and enable even better security. This memo defines the mapping from some IoT baseline security requirements definitions to ietf and related security technologies. It also highlights some gaps in those IoT baseline security requirements.</t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="survey-of-baseline-security-requirements"><name>Survey of baseline security requirements</name>

<t>At time of writing, there are IoT baseline security requirements provided by several organisations:</t>

<t><list style="symbols">
  <t>ENISA's Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (<xref target="ENISA-Baseline"/>)</t>
  <t>ETSI's Cyber Security for Consumer Internet of Things: Baseline Requirements <xref target="ETSI-Baseline"/></t>
  <t>NIST's IoT Device Cybersecurity Capability Core Baseline <xref target="NIST-Baseline"/></t>
</list></t>

</section>
<section anchor="requirement-mapping"><name>Requirement Mapping</name>

<t>Requirements that pertain to hardware, procedure, and policy compliance are noted, but do not map to ietf and related technologies. NIST's requirements (<xref target="NIST-Baseline"/>) are very broad and already have mappings to ENISA baseline security recommendations.</t>

<section anchor="hardware-security"><name>Hardware Security</name>

<section anchor="identity"><name>Identity</name>

<t>ENISA GP-PS-10: Establish and maintain asset management procedures and configuration controls for key network and information systems.</t>

<t>NIST Device Identification: The IoT device can be uniquely identified logically and physically.</t>

<t>ETSI Provision 5.4-2: Where a hard-coded unique per device identity is used in a device for security purposes, it shall be implemented in such a way that it resists tampering by means such as physical, electrical or software.</t>

<t>These requirements are architectural requirements, however <xref target="RFC4122"/> can be used for identifiers.</t>

</section>
<section anchor="hardware-immutable-root-of-trust"><name>Hardware Immutable Root of Trust</name>

<t>ENISA GP-TM-01: Employ a hardware-based immutable root of trust.</t>

<t>This is an architectural requirement.</t>

</section>
<section anchor="hardware-backed-secret-storage"><name>Hardware-Backed Secret Storage</name>

<t>ENISA GP-TM-02: Use hardware that incorporates security features to strengthen the protection and integrity of the device - for example, specialized security chips / coprocessors that integrate security at the transistor level, embedded in the processor, providing, among other things, a trusted storage of device identity and authentication means, protection of keys at rest and in use, and preventing unprivileged from accessing to security sensitive code. Protection against local and physical attacks can be covered via functional security.</t>

<t>NIST Data Protection: The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>

<t>ETSI Provision 5.4-1: Sensitive security parameters in persistent storage shall be stored securely by the device.</t>

<t>This is an architectural requirement.</t>

</section>
</section>
<section anchor="software-integrity-authenticity"><name>Software Integrity &amp; Authenticity</name>

<section anchor="boot-environment-trustworthiness-and-integrity"><name>Boot Environment Trustworthiness and Integrity</name>

<t>ENISA GP-TM-03: Trust must be established in the boot environment before any trust in any other software or executable program can be claimed.</t>

<t>ETSI defines the following boot environment requirements:</t>

<t><list style="symbols">
  <t>Provision 5.7-1: The consumer IoT device should verify its software using secure boot mechanisms.</t>
</list></t>

<t>Satisfying this requirement can be done in several ways, increasing in security guarantees:</t>

<t><list style="numbers">
  <t>Implement secure boot to verify the bootloader and boot environment. Trust is established purely by construction: if code is running in the boot environment, it must have been signed, therefore it is trustworthy.</t>
  <t>Record critical measurements of each step of boot in a TPM. Trust is established by evaluating the measurements recorded by the TPM.</t>
  <t>Use Remote Attestation. Remote attestation allows a device to report to third parties the critical measurements it has recorded (either in a TPM or signed by each stage) in order to prove the trustworthiness of the boot environment and running software. Remote Attestation is implemented in <xref target="I-D.ietf-rats-eat"/>.</t>
</list></t>

</section>
<section anchor="code-integrity-and-authenticity"><name>Code Integrity and Authenticity</name>

<t>ENISA GP-TM-04: Sign code cryptographically to ensure it has not been tampered with after signing it as safe for the device, and implement run-time protection and secure execution monitoring to make sure malicious attacks do not overwrite code after it is loaded.</t>

<t>Satisfying this requirement requires a secure invocation mechanism. In monolithic IoT software images, this is accomplished by Secure Boot. In IoT devices with more fully-featured operating systems, this is accomplished with an operating system-specific code signing practice.</t>

<t>Secure Invocation can be achieved using the SUIT Manifest format, which provides for secure invocation procedures. See <xref target="I-D.ietf-suit-manifest"/>.</t>

<t>To satisfy the associated requirement of run-time protection and secure execution monitoring, the use of a TEE is recommended to protect sensitive processes. The TEEP protocol (see <xref target="I-D.ietf-teep-architecture"/>) is recommended for managing TEEs.</t>

</section>
<section anchor="secure-softwarefirmware-update"><name>Secure Software/Firmware Update</name>

<t>Technical requirements for Software Updates are provided for in the SUIT information model (<xref target="RFC9124"/>) and TEEP Architecture (<xref target="RFC9397"/>). Procedural and architectural requirements should be independently assessed by the implementor.</t>

<t>ENISA Software Update Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-05: Control the installation of software in operating systems, to prevent unauthenticated software and files from being loaded onto it.</t>
  <t>GP-TM-18: Ensure that the device software/firmware, its configuration and its applications have the ability to update Over-The-Air (OTA), that the update server is secure, that the update file is transmitted via a secure connection, that it does not contain sensitive data (e.g. hardcoded credentials), that it is signed by an authorised trust entity and encrypted using accepted encryption methods, and that the update package has its digital signature, signing certificate and signing certificate chain, verified by the device before the update process begins.</t>
  <t>GP-TM-19: Offer an automatic firmware update mechanism.</t>
  <t>GP-TM-20: (Procedural / Architectural) Backward compatibility of firmware updates. Automatic firmware updates should not modify user-configured preferences, security, and/or privacy settings without user notification.</t>
</list></t>

<t>NIST Software Update:</t>

<t><list style="numbers">
  <t>The ability to update the device’s software through remote (e.g., network download) and/or local means (e.g., removable media)</t>
  <t>The ability to verify and authenticate any update before installing it</t>
  <t>The ability for authorized entities to roll back updated software to a previous version</t>
  <t>The ability to restrict updating actions to authorized entities only</t>
  <t>The ability to enable or disable updating</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to:</t>
  <t>The ability to configure any remote update mechanisms to be either automatically or manually initiated for update downloads and installations</t>
  <t>The ability to enable or disable notification when an update is available and specify who or what is to be notified</t>
</list></t>

<t>ETSI Keep Software Updated:</t>

<t><list style="symbols">
  <t>Provision 5.3-1 All software components in consumer IoT devices should be securely updateable.</t>
  <t>Provision 5.3-2 When the device is not a constrained device, it shall have an update mechanism for the secure installation of updates.</t>
  <t>Provision 5.3-3 An update shall be simple for the user to apply.</t>
  <t>Provision 5.3-4 Automatic mechanisms should be used for software updates.</t>
  <t>Provision 5.3-5 The device should check after initialization, and then periodically, whether security updates are available.</t>
  <t>Provision 5.3-6 If the device supports automatic updates and/or update notifications, these should be enabled in the initialized state and configurable so that the user can enable, disable, or postpone installation of security updates and/or update notifications.</t>
  <t>Provision 5.3-7 The device shall use best practice cryptography to facilitate secure update mechanisms.</t>
  <t>Provision 5.3-8 Security updates shall be timely.</t>
  <t>Provision 5.3-9 The device should verify the authenticity and integrity of software updates.</t>
  <t>Provision 5.3-10 Where updates are delivered over a network interface, the device shall verify the authenticity and integrity of each update via a trust relationship.</t>
  <t>Provision 5.3-11 The manufacturer should inform the user in a recognizable and apparent manner that a security update is required together with information on the risks mitigated by that update.</t>
  <t>Provision 5.3-12 The device should notify the user when the application of a software update will disrupt the basic functioning of the device.</t>
  <t>Provision 5.3-13 The manufacturer shall publish, in an accessible way that is clear and transparent to the user, the defined support period.</t>
  <t>Provision 5.3-14 For constrained devices that cannot have their software updated, the rationale for the absence of software updates, the period and method of hardware replacement support and a defined support period should be published by the manufacturer in an accessible way that is clear and transparent to the user.</t>
  <t>Provision 5.3-15 For constrained devices that cannot have their software updated, the product should be isolable and the hardware replaceable.</t>
  <t>Provision 5.3-16 The model designation of the consumer IoT device shall be clearly recognizable, either by labelling on the device or via a physical interface.</t>
  <t>Provision 5.5-3 Cryptographic algorithms and primitives should be updateable.</t>
</list></t>

<t>Many fully-featured operating systems have dedicated means of implementing this requirement. The SUIT manifest (See <xref target="I-D.ietf-suit-manifest"/>) is recommended as a means of providing secure, authenticated software update, including for constrained devices. Where the software is deployed to a TEE, TEEP (See <xref target="I-D.ietf-teep-protocol"/>) is recommended for software update and management.</t>

</section>
<section anchor="configuration"><name>Configuration</name>

<t>NIST Device Configuration:</t>

<t><list style="numbers">
  <t>The ability to change the device’s software configuration settings</t>
  <t>The ability to restrict configuration changes to authorized entities only</t>
  <t>The ability for authorized entities to restore the device to a secure configuration defined by an authorized entity</t>
</list></t>

<t>ETSI defines the following configuration requirements:</t>

<t><list style="symbols">
  <t>Provision 5.12-1: Installation and maintenance of consumer IoT should involve minimal decisions by the user and should follow security best practice on usability.</t>
  <t>Provision 5.12-2 The manufacturer should provide users with guidance on how to securely set up their device.</t>
  <t>Provision 5.12-3 The manufacturer should provide users with guidance on how to check whether their device is securely set up.</t>
</list></t>

<t>Configuration can be delivered to a device either via a firmware update, such as in <xref target="I-D.ietf-suit-manifest"/>, or via a runtime configuration interface, such as <xref target="LwM2M"/>.</t>

</section>
<section anchor="resilience-to-failure"><name>Resilience to Failure</name>

<t>ENISA GP-TM-06: Enable a system to return to a state that was known to be secure, after a security breach has occured or if an upgrade has not been successful.</t>

<t>ETSI defines the following resilience requirements:</t>

<t><list style="symbols">
  <t>Provision 5.9-1: Resilience should be built in to consumer IoT devices and services, taking into account the possibility of outages of data networks and power.</t>
  <t>Provision 5.9-2: Consumer IoT devices should remain operating and locally functional in the case of a loss of network access and should recover cleanly in the case of restoration of a loss of power.</t>
  <t>Provision 5.9-3: The consumer IoT device should connect to networks in an expected, operational and stable state and in an orderly fashion, taking the capability of the infrastructure into consideration.</t>
</list></t>

<t>While there is no specificaiton for this, it is also required in <xref target="RFC9019"/></t>

</section>
<section anchor="trust-anchor-management"><name>Trust Anchor Management</name>

<t>ENISA GP-TM-07: Use protocols and mechanisms able to represent and manage trust and trust relationships.</t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships).</t>

</section>
</section>
<section anchor="default-security-privacy"><name>Default Security &amp; Privacy</name>

<section anchor="security-on-by-default"><name>Security ON by Default</name>

<t>ENISA GP-TM-08: Any applicable security features should be enabled by default, and any unused or insecure functionalities should be disabled by default.</t>

<t>NIST Logical Access to Interfaces:</t>

<t><list style="numbers">
  <t>The ability to logically or physically disable any local and network interfaces that are not necessary for the core functionality of the device</t>
  <t>The ability to logically restrict access to each network interface to only authorized entities (e.g., device authentication, user authentication)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability to enable, disable, and adjust thresholds for any ability the device might have to lock or disable an account or to delay additional authentication attempts after too many failed authentication attempts</t>
</list></t>

<t>ETSI Minimize exposed attack surfaces:</t>

<t><list style="symbols">
  <t>Provision 5.6-1: All unused network and logical interfaces shall be disabled.</t>
  <t>Provision 5.6-2: In the initialized state, the network interfaces of the device shall minimize the unauthenticated disclosure of security-relevant information.</t>
  <t>Provision 5.6-5: The manufacturer should only enable software services that are used or required for the intended use or operation of the device.</t>
  <t>Provision 5.6-6: Code should be minimized to the functionality necessary for the service/device to operate.</t>
  <t>Provision 5.6-7: Software should run with least necessary privileges, taking account of both security and functionality.</t>
</list></t>

<t>These are procedural requirements, rather than a protocol or document requirement.</t>

</section>
<section anchor="default-unique-passwords"><name>Default Unique Passwords</name>

<t>ENISA GP-TM-09: Establish hard to crack, device-individual default passwords.</t>

<t>ETSI Provision 5.1-1: Where passwords are used and in any state other than the factory default, all consumer IoT device passwords shall be unique per device or defined by the user.</t>

<t>This is a procedural requirement, rather than a protocol or document requirement.</t>

</section>
</section>
<section anchor="data-protection"><name>Data Protection</name>

<t>The data protection requirements are largely procedural/architectural. While this memo can recommend using TEEs to protect data, and TEEP (<xref target="I-D.ietf-teep-architecture"/>) to manage TEEs, implementors must choose to architect their software in such a way that TEEs are helpful in meeting these requirements.</t>

<t>ENISA Data Protection requirements:</t>

<t><list style="symbols">
  <t>GP-TM-10: Personal data must be collected and processed fairly and lawfully, it should never be collected and processed without the data subject's consent.</t>
  <t>GP-TM-11: Make sure that personal data is used for the specified purposes for which they were collected, and that any further processing of personal data is compatible and that the data subjects are well informed.</t>
  <t>GP-TM-12: Minimise the data collected and retained.</t>
  <t>GP-TM-13: IoT stakeholders must be compliant with the EU General Data Protection Regulation (GDPR).</t>
  <t>GP-TM-14: Users of IoT products and services must be able to exercise their rights to information, access, erasure, rectification, data portability, restriction of processing, objection to processing, and their right not to be evaluated on the basis of automated processing.</t>
</list></t>

<t>NIST Data Protection:</t>

<t><list style="numbers">
  <t>The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>
  <t>The ability for authorized entities to render all data on the device inaccessible by all entities, whether previously authorized or not (e.g., through a wipe of internal storage, destruction of cryptographic keys for encrypted data)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability for authorized entities to configure the cryptography use itself, such as choosing a key length</t>
</list></t>

<t>ETSI Data Protection requirements:</t>

<t><list style="symbols">
  <t>Provision 5.8-3: All external sensing capabilities of the device shall be documented in an accessible way that is clear and transparent for the user.</t>
  <t>Provision 5.11-1: The user shall be provided with functionality such that user data can be erased from the device in a simple manner.</t>
  <t>Provision 5.11-2: The consumer should be provided with functionality on the device such that personal data can be removed from associated services in a simple manner.</t>
  <t>Provision 5.11-3: Users should be given clear instructions on how to delete their personal data.</t>
  <t>Provision 5.11-4: Users should be provided with clear confirmation that personal data has been deleted from services, devices and applications.</t>
  <t>Provision 6-1: The manufacturer shall provide consumers with clear and transparent information about what personal data is processed, how it is being used, by whom, and for what purposes, for each device and service. This also applies to third parties that can be involved, including advertisers.</t>
  <t>Provision 6-2: Where personal data is processed on the basis of consumers' consent, this consent shall be obtained in a valid way.</t>
  <t>Provision 6-3: Consumers who gave consent for the processing of their personal data shall have the capability to withdraw it at any time.</t>
  <t>Provision 6-4: If telemetry data is collected from consumer IoT devices and services, the processing of personal data should be kept to the minimum necessary for the intended functionality.</t>
  <t>Provision 6-5: If telemetry data is collected from consumer IoT devices and services, consumers shall be provided with information on what telemetry data is collected, how it is being used, by whom, and for what purposes.</t>
</list></t>

</section>
<section anchor="system-safety-and-reliability"><name>System Safety and Reliability</name>

<t>Safety and reliability requirements are procedural/architectural. Implementors should ensure they have processes and architectures in place to meet these requirements.</t>

<t>ENISA Safety and Reliability requirements:</t>

<t><list style="symbols">
  <t>GP-TM-15: Design with system and operational disruption in mind, preventing the system from causing an unacceptable risk of injury or physical damage.</t>
  <t>GP-TM-16: Mechanisms for self-diagnosis and self-repair/healing to recover from failure, malfunction or a compromised state.</t>
  <t>GP-TM-17: Ensure standalone operation - essential features should continue to work with a loss of communications and chronicle negative impacts from compromised devices or cloud-based systems.</t>
</list></t>

</section>
<section anchor="authentication"><name>Authentication</name>

<t>ETSI architectural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.1-4 Where a user can authenticate against a device, the device shall provide to the user or an administrator a simple mechanism to change the authentication value used.</t>
  <t>Provision 5.1-5 When the device is not a constrained device, it shall have a mechanism available which makes brute-force attacks on authentication mechanisms via network interfaces impracticable.</t>
</list></t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships) and perform other forms of credential management (Provision 5.1-4).</t>

<section anchor="align-authentication-schemes-with-threat-models"><name>Align Authentication Schemes with Threat Models</name>

<t>ENISA GP-TM-21: Design the authentication and authorisation schemes (unique per device) based on the system-level threat models.</t>

<t>This is a procedural / architectural requirement.</t>

</section>
<section anchor="password-rules"><name>Password Rules</name>

<t>ENISA applies the following requirements to Password-based authentication:</t>

<t><list style="symbols">
  <t>GP-TM-22: Ensure that default passwords and even default usernames are changed during the initial setup, and that weak, null or blank passwords are not allowed.</t>
  <t>GP-TM-23: Authentication mechanisms must use strong passwords or personal identification numbers (PINs), and should consider using two-factor authentication (2FA) or multi-factor authentication (MFA) like Smartphones, Biometrics, etc., on top of certificates.</t>
  <t>GP-TM-24: Authentication credentials shall be salted, hashed and/or encrypted.</t>
  <t>GP-TM-25: Protect against 'brute force' and/or other abusive login attempts. This protection should also consider keys stored in devices.</t>
  <t>GP-TM-26: Ensure password recovery or reset mechanism is robust and does not supply an attacker with information indicating a valid account. The same applies to key update and recovery mechanisms.</t>
</list></t>

<t>ETSI applies a the following requirements to password-based authentication:</t>

<t><list style="symbols">
  <t>Provision 5.1-1: Where passwords are used and in any state other than the factory default, all consumer IoT device passwords shall be unique per device or defined by the user.</t>
  <t>Provision 5.1-2 Where pre-installed unique per device passwords are used, these shall be generated with a mechanism that reduces the risk of automated attacks against a class or type of device.</t>
</list></t>

<t>As an alternative, implementors are encouraged to consider passwordless schemes, such as FIDO.</t>

</section>
</section>
<section anchor="authorisation"><name>Authorisation</name>

<section anchor="principle-of-least-privilege"><name>Principle of Least Privilege</name>

<t>ENISA GP-TM-27: Limit the actions allowed for a given system by Implementing fine-grained authorisation mechanisms and using the Principle of least privilege (POLP): applications must operate at the lowest privilege level possible.</t>

<t>This is a procedural / architectural requirement, however at the network level, this can be implemented using Manufacturer Usage Descriptions (see <xref target="RFC8520"/>).</t>

</section>
<section anchor="software-isolation"><name>Software Isolation</name>

<t>ENISA GP-TM-28: Device firmware should be designed to isolate privileged code, processes and data from portions of the firmware that do not need access to them. Device hardware should provide isolation concepts to prevent unprivileged from accessing security sensitive code.</t>

<t>Implementors should use TEEs to address this requirement. The provisioning and management of TEEs can be accomplished using TEEP (see <xref target="I-D.ietf-teep-architecture"/>).</t>

<t>ETSI Provision 5.6-8: The device should include a hardware-level access control mechanism for memory.</t>

<t>Implementors should enable and correctly configure the MPU(s) and MMU(s) that are present in most devices.</t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t>ENISA Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-29: Data integrity and confidentiality must be enforced by access controls. When the subject requesting access has been authorised to access particular processes, it is necessary to enforce the defined security policy.</t>
  <t>GP-TM-30: Ensure a context-based security and privacy that reflects different levels of importance.</t>
</list></t>

<t>These requirements are complex and require a variety of technologies to implement. Use of TEEs can provide a building block for these requirements, but is not sufficient in itself to meet these requiremnents.</t>

<t>ETSI Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-4: Access to device functionality via a network interface in the initialized state should only be possible after authentication on that interface.</t>
  <t>Provision 5.5-5: Device functionality that allows security-relevant changes in configuration via a network interface shall only be accessible after authentication. The exception is for network service protocols that are relied upon by the device and where the manufacturer cannot guarantee what configuration will be required for the device to operate.</t>
  <t>Provision 5.5-5: Device functionality that allows security-relevant changes in configuration via a network interface shall only be accessible after authentication. The exception is for network service protocols that are relied upon by the device and where the manufacturer cannot guarantee what configuration will be required for the device to operate.</t>
</list></t>

</section>
</section>
<section anchor="environmental-and-physical-security"><name>Environmental and Physical Security</name>

<t>ENISA defines the following physical security requirements. These are hardware-architectural requirements and not covered by protocol and format specifications.</t>

<t><list style="symbols">
  <t>GP-TM-31: Measures for tamper protection and detection. Detection and reaction to hardware
tampering should not rely on network connectivity.</t>
  <t>GP-TM-32: Ensure that the device cannot be easily disassembled and that the data storage medium is encrypted at rest and cannot be easily removed.</t>
  <t>GP-TM-33: Ensure that devices only feature the essential physical external ports (such as USB) necessary for them to function and that the test/debug modes are secure, so they cannot be used to maliciously access the devices. In general, lock down physical ports to only trusted connections.</t>
</list></t>

<t>ETSI defines the following physical security requirements:</t>

<t><list style="symbols">
  <t>Provision 5.6-3: Device hardware should not unnecessarily expose physical interfaces to attack.</t>
  <t>Provision 5.6-4: Where a debug interface is physically accessible, it shall be disabled in software.</t>
</list></t>

</section>
<section anchor="cryptography"><name>Cryptography</name>

<t>ENISA makes the following architectural cryptography requirements for IoT devices:</t>

<t><list style="symbols">
  <t>GP-TM-34: Ensure a proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of data and information (including control messages), in transit and in rest. Ensure the proper selection of standard and strong encryption algorithms and strong keys, and disable insecure protocols. Verify the robustness of the implementation.</t>
  <t>GP-TM-35: Cryptographic keys must be securely managed.</t>
  <t>GP-TM-36: Build devices to be compatible with lightweight encryption and security techniques.</t>
  <t>GP-TM-37: Support scalable key management schemes.</t>
</list></t>

<t>ETSI makes the following architectural cryptography requirement for IoT devices:</t>

<t><list style="symbols">
  <t>Provision 5.1-3: Authentication mechanisms used to authenticate users against a device shall use best practice cryptography, appropriate to the properties of the technology, risk and usage.</t>
  <t>Provision 5.4-3: Hard-coded critical security parameters in device software source code shall not be used.</t>
  <t>Provision 5.4-4: Any critical security parameters used for integrity and authenticity checks of software updates and for protection of communication with associated services in device software shall be unique per device and shall be produced with a mechanism that reduces the risk of automated attacks against classes of devices.</t>
  <t>Provision 5.5-3: Cryptographic algorithms and primitives should be updateable.</t>
</list></t>

</section>
<section anchor="secure-and-trusted-communications"><name>Secure and Trusted Communications</name>

<section anchor="data-security"><name>Data Security</name>

<t>ENISA GP-TM-38: Guarantee the different security aspects -confidentiality (privacy), integrity, availability and authenticity- of the information in transit on the networks or stored in the IoT application or in the Cloud.</t>

<t>ETSI Data Security Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-6: Critical security parameters should be encrypted in transit, with such encryption appropriate to the properties of the technology, risk and usage.</t>
  <t>Provision 5.5-7 The consumer IoT device shall protect the confidentiality of critical security parameters that are communicated via remotely accessible network interfaces.</t>
  <t>Provision 5.5-8 The manufacturer shall follow secure management processes for critical security parameters that relate to the device.</t>
  <t>Provision 5.8-1 The confidentiality of personal data transiting between a device and a service, especially associated services, should be protected, with best practice cryptography.</t>
  <t>Provision 5.8-2 The confidentiality of sensitive personal data communicated between the device and associated services shall be protected, with cryptography appropriate to the properties of the technology and usage.</t>
</list></t>

<t>This Data Security requirement can be fulfilled using COSE <xref target="RFC8152"/> for ensuring the authenticity, integrity, and confidentiality of data either in transit or at rest. Secure Transport (see <xref target="secure-transport"/>) technologies can be used to protect data in transit.</t>

</section>
<section anchor="secure-transport"><name>Secure Transport</name>

<t>ENISA Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-39: Ensure that communication security is provided using state-of-the-art, standardised security protocols, such as TLS for encryption.</t>
  <t>GP-TM-40: Ensure credentials are not exposed in internal or external network traffic.</t>
</list></t>

<t>ETSI Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-1: The consumer IoT device shall use best practice cryptography to communicate securely.</t>
  <t>Provision 5.5-2: The consumer IoT device should use reviewed or evaluated implementations to deliver network and security functionalities, particularly in the field of cryptography.</t>
  <t>Provision 5.5-4: Access to device functionality via a network interface in the initialized state should only be possible after authentication on that interface.</t>
</list></t>

<t>This requirement is satisfied by several standards:</t>

<t><list style="symbols">
  <t>TLS (<xref target="RFC8446"/>).</t>
  <t>DTLS (<xref target="RFC9147"/>).</t>
  <t>QUIC (<xref target="RFC9000"/>).</t>
  <t>OSCORE (<xref target="RFC9203"/>).</t>
</list></t>

</section>
<section anchor="data-authenticity"><name>Data Authenticity</name>

<t>ENISA GP-TM-41: Guarantee data authenticity to enable reliable exchanges from data emission to data reception. Data should always be signed whenever and wherever it is captured and stored.</t>

<t>The authenticity of data can be protected using COSE <xref target="RFC8152"/>.</t>

<t>ENISA GP-TM-42: Do not trust data received and always verify any interconnections. Discover, identify and verify/authenticate the devices connected to the network before trust can be established, and preserve
their integrity for reliable solutions and services.</t>

<t>Verifying communication partners can be done in many ways. Key technologies supporting authentication of communication partners are:</t>

<t><list style="symbols">
  <t>RATS: Remote attestation of a communication partner (See <xref target="I-D.ietf-rats-architecture"/>).</t>
  <t>TLS/DTLS: Mutual authentication of communication partners (See <xref target="RFC8446"/> / <xref target="RFC9147"/>).</t>
  <t>ATLS: Application-layer TLS for authenticating a connection that may traverse multiple secure transport connections.</t>
  <t>Attested TLS: The use of attestation in session establishment in TLS (See <xref target="I-D.fossati-tls-attestation"/>).</t>
</list></t>

</section>
<section anchor="least-privilege-communication"><name>Least Privilege Communication</name>

<t>ENISA GP-TM-43: IoT devices should be restrictive rather than permissive in communicating.</t>

<t>This Requirement can be enabled and enforced using Manufacturer Usage Descriptions, which codify expected communication (See <xref target="RFC8520"/>)</t>

<t>ENISA GP-TM-44: Make intentional connections. Prevent unauthorised connections to it or other devices the
product is connected to, at all levels of the protocols.</t>

<t>This requirement can be satisfied through authenticating connections (TLS / DTLS mutual authentication. See <xref target="RFC8446"/> / <xref target="RFC9147"/>) and declaring communication patterns (Manufacturer Usage Descriptions. See <xref target="RFC8520"/>)</t>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-45: Disable specific ports and/or network connections for selective connectivity.</t>
  <t>ENISA GP-TM-46: Rate limiting. Controlling the traffic sent or received by a network to reduce the risk of automated attacks.</t>
</list></t>

</section>
</section>
<section anchor="secure-interfaces-and-network-services"><name>Secure Interfaces and network services</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>GP-TM-47: Risk Segmentation. Splitting network elements into separate components to help isolate security breaches and minimise the overall risk.</t>
  <t>GP-TM-48: Protocols should be designed to ensure that, if a single device is compromised, it does not affect the whole set.</t>
  <t>GP-TM-49: Avoid provisioning the same secret key in an entire product family, since compromising a single device would be enough to expose the rest of the product family.</t>
  <t>GP-TM-50: Ensure only necessary ports are exposed and available.</t>
  <t>GP-TM-51: Implement a DDoS-resistant and Load-Balancing infrastructure.</t>
  <t>GP-TM-53: Avoid security issues when designing error messages.</t>
</list></t>

<t>ETSI Architectural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.1-5 When the device is not a constrained device, it shall have a mechanism available which makes brute-force attacks on authentication mechanisms via network interfaces impracticable.</t>
</list></t>

<section anchor="encrypted-user-sessions"><name>Encrypted User Sessions</name>

<t>ENISA GP-TM-52: Ensure web interfaces fully encrypt the user session, from the device to the backend services, and that they are not susceptible to XSS, CSRF, SQL injection, etc.</t>

<t>This requirement can be partially satisfied through use of TLS or QUIC (See <xref target="RFC8446"/> and <xref target="RFC9000"/>)</t>

</section>
</section>
<section anchor="secure-input-and-output-handling"><name>Secure input and output handling</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-54: Data input validation (ensuring that data is safe prior to use) and output filtering.</t>

<t>ETSI Provision 5.13-1: The consumer IoT device software shall validate data input via user interfaces or transferred via Application Programming Interfaces (APIs) or between networks in services and devices.</t>

</section>
<section anchor="logging"><name>Logging</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-55: Implement a logging system that records events relating to user authentication, management of accounts and access rights, modifications to security rules, and the functioning of the system. Logs must be preserved on durable storage and retrievable via authenticated connections.</t>

<t>NIST Cybersecurity State Awareness</t>

<t><list style="numbers">
  <t>The ability to report the device’s cybersecurity state</t>
  <t>The ability to differentiate between when a device will likely operate as expected from when it may be in a degraded cybersecurity state</t>
  <t>The ability to restrict access to the state indicator so only authorized entities can view it</t>
  <t>The ability to prevent any entities (authorized or unauthorized) from editing the state except for those entities that are responsible for maintaining the device’s state information</t>
  <t>The ability to make the state information available to a service on another device, such as an event/state log server</t>
</list></t>

<t>ETSI defines the following logging requirements:</t>

<t><list style="symbols">
  <t>Provision 5.7-2: If an unauthorized change is detected to the software, the device should alert the user and/or administrator to the issue and should not connect to wider networks than those necessary to perform the alerting function.</t>
</list></t>

<t>Certain logs and indicators of cybersecurity state can be transported via RATS: See <xref target="I-D.ietf-rats-eat"/>. Where associated with SUIT firmware updates, logs can be transported using SUIT Reports. See <xref target="I-D.ietf-suit-report"/>.</t>

</section>
<section anchor="monitoring-and-auditing"><name>Monitoring and Auditing</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-56: Implement regular monitoring to verify the device behaviour, to detect malware and to discover integrity errors.</t>
  <t>ENISA GP-TM-57: Conduct periodic audits and reviews of security controls to ensure that the controls are effective. Perform penetration tests at least biannually.</t>
</list></t>

<t>ETSI Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.2-1: The manufacturer shall make a vulnerability disclosure policy publicly available.</t>
  <t>Provision 5.2-2: Disclosed vulnerabilities should be acted on in a timely manner.</t>
  <t>Provision 5.2-3: Manufacturers should continually monitor for, identify and rectify security vulnerabilities within products and services they sell, produce, have produced and services they operate during the defined support period.</t>
  <t>Provision 5.6-9: The manufacturer should follow secure development processes for software deployed on the device.</t>
  <t>Provision 5.10-1 If telemetry data is collected from consumer IoT devices and services, such as usage and measurement data, it should be examined for security anomalies.</t>
</list></t>

<t>Supply Chain Integrity, Transparency, and Trust (<xref target="I-D.ietf-scitt-architecture"/>) enables monitoring for inclusion of disclosed vulnerabilities within products and services, so can be used to satisfy Provision 5.2-3.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>No additional security considerations are required; they are laid out in the preceeding sections.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC4122'>
  <front>
    <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
    <author fullname='P. Leach' initials='P.' surname='Leach'/>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <author fullname='R. Salz' initials='R.' surname='Salz'/>
    <date month='July' year='2005'/>
    <abstract>
      <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
      <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4122'/>
  <seriesInfo name='DOI' value='10.17487/RFC4122'/>
</reference>

<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC8995'>
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname='M. Pritikin' initials='M.' surname='Pritikin'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='T. Eckert' initials='T.' surname='Eckert'/>
    <author fullname='M. Behringer' initials='M.' surname='Behringer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8995'/>
  <seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>

<reference anchor='RFC7030'>
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'/>
    <author fullname='P. Yee' initials='P.' role='editor' surname='Yee'/>
    <author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'/>
    <date month='October' year='2013'/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7030'/>
  <seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>

<reference anchor='RFC8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC9019'>
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='M. Meriac' initials='M.' surname='Meriac'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9019'/>
  <seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>

<reference anchor='RFC9203'>
  <front>
    <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
    <author fullname='F. Palombini' initials='F.' surname='Palombini'/>
    <author fullname='L. Seitz' initials='L.' surname='Seitz'/>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <author fullname='M. Gunnarsson' initials='M.' surname='Gunnarsson'/>
    <date month='August' year='2022'/>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9203'/>
  <seriesInfo name='DOI' value='10.17487/RFC9203'/>
</reference>

<reference anchor='RFC8152'>
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname='J. Schaad' initials='J.' surname='Schaad'/>
    <date month='July' year='2017'/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8152'/>
  <seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>

<reference anchor='RFC9000'>
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname='J. Iyengar' initials='J.' role='editor' surname='Iyengar'/>
    <author fullname='M. Thomson' initials='M.' role='editor' surname='Thomson'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9000'/>
  <seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>

<reference anchor='RFC9124'>
  <front>
    <title>A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <date month='January' year='2022'/>
    <abstract>
      <t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.</t>
      <t>One component of such a firmware update is a concise and machine-processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9124'/>
  <seriesInfo name='DOI' value='10.17487/RFC9124'/>
</reference>

<reference anchor='RFC9147'>
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='N. Modadugu' initials='N.' surname='Modadugu'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9147'/>
  <seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>

<reference anchor='RFC9397'>
  <front>
    <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
    <author fullname='M. Pei' initials='M.' surname='Pei'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Thaler' initials='D.' surname='Thaler'/>
    <author fullname='D. Wheeler' initials='D.' surname='Wheeler'/>
    <date month='July' year='2023'/>
    <abstract>
      <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment. This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9397'/>
  <seriesInfo name='DOI' value='10.17487/RFC9397'/>
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.0-20201202.html">
  <front>
    <title>FIDO Device Onboarding</title>
    <author initials="" surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="LwM2M" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
  <front>
    <title>LwM2M Core Specification</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISA-Baseline" target="https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/">
  <front>
    <title>Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures</title>
    <author initials="" surname="ENISA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-Baseline" target="https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf">
  <front>
    <title>Cyber Security for Consumer Internet of Things: Baseline Requirements</title>
    <author initials="" surname="ETSI">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NIST-Baseline" target="https://www.nist.gov/publications/iot-device-cybersecurity-capability-core-baseline">
  <front>
    <title>IoT Device Cybersecurity Capability Core Baseline</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='14' month='October' year='2023'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.  Software updates and Trusted Invocation both tend to
   use sequences of common operations, so the manifest encodes those
   sequences of operations, rather than declaring the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-24'/>
   
</reference>


<reference anchor='I-D.ietf-sacm-coswid'>
   <front>
      <title>Concise Software Identification Tags</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Jessica Fitzgerald-McKay' initials='J.' surname='Fitzgerald-McKay'>
         <organization>National Security Agency</organization>
      </author>
      <author fullname='Charles Schmidt' initials='C.' surname='Schmidt'>
         <organization>The MITRE Corporation</organization>
      </author>
      <author fullname='David Waltermire' initials='D.' surname='Waltermire'>
         <organization>National Institute of Standards and Technology</organization>
      </author>
      <date day='24' month='February' year='2023'/>
      <abstract>
	 <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-24'/>
   
</reference>


<reference anchor='I-D.birkholz-rats-corim'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>arm</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>arm</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies Concise Reference Integrity Manifests (CoRIM) that
   represent Endorsements and Reference Values in CBOR format.
   Composite devices or systems are represented by a collection of
   Concise Module Identifiers (CoMID) and Concise Software Identifiers
   (CoSWID) bundled in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-03'/>
   
</reference>


<reference anchor='I-D.ietf-teep-architecture'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment.  This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-19'/>
   
</reference>


<reference anchor='I-D.ietf-teep-protocol'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Protocol</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Akira Tsukamoto' initials='A.' surname='Tsukamoto'>
         <organization>ALAXALA Networks Corp.</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   This document specifies a protocol that installs, updates, and
   deletes Trusted Components in a device with a Trusted Execution
   Environment (TEE).  This specification defines an interoperable
   protocol for managing the lifecycle of Trusted Components.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-protocol-17'/>
   
</reference>


<reference anchor='I-D.ietf-rats-architecture'>
   <front>
      <title>Remote ATtestation procedureS (RATS) Architecture</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='28' month='September' year='2022'/>
      <abstract>
	 <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-report'>
   <front>
      <title>Secure Reporting of Update Status</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day='11' month='September' year='2023'/>
      <abstract>
	 <t>   The Software Update for the Internet of Things (SUIT) manifest
   provides a way for many different update and boot workflows to be
   described by a common format.  However, this does not provide a
   feedback mechanism for developers in the event that an update or boot
   fails.

   This specification describes a lightweight feedback mechanism that
   allows a developer in possession of a manifest to reconstruct the
   decisions made and actions performed by a manifest processor.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-report-07'/>
   
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   Attestation is the process by which an entity produces evidence about
   itself that another party can use to evaluate the trustworthiness of
   that entity.

   In use cases that require the use of remote attestation, such as
   confidential computing or device onboarding, an attester has to
   convey evidence or attestation results to a relying party.  This
   information exchange may happen at different layers in the protocol
   stack.

   This specification provides a generic way of passing evidence and
   attestation results in the TLS handshake.  Functionality-wise this is
   accomplished with the help of key attestation.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-04'/>
   
</reference>


<reference anchor='I-D.ietf-scitt-architecture'>
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Antoine Delignat-Lavaud' initials='A.' surname='Delignat-Lavaud'>
         <organization>Microsoft Research</organization>
      </author>
      <author fullname='Cedric Fournet' initials='C.' surname='Fournet'>
         <organization>Microsoft Research</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>ARM</organization>
      </author>
      <author fullname='Steve Lasker' initials='S.' surname='Lasker'>
         <organization>RKVST</organization>
      </author>
      <date day='16' month='October' year='2023'/>
      <abstract>
	 <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.
   Producers can register their Signed Statements on any Transparency
   Service, with the guarantee that all Consumers will be able to verify
   them.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-scitt-architecture-03'/>
   
</reference>


<reference anchor="IoTopia" target="https://globalplatform.org/iotopia/mud-file-service/">
  <front>
    <title>Global Platform Iotopia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

