<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-birkholz-scitt-software-use-cases-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SCITT SW Supply Chain">Detailed Software Supply Chain Uses Cases for SCITT</title>
    <seriesInfo name="Internet-Draft" value="draft-birkholz-scitt-software-use-cases-00"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer Institute for Secure Information Technology</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="D." surname="Brooks" fullname="Dick Brooks">
      <organization>REA</organization>
      <address>
        <email>dick@reliableenergyanalytics.com</email>
      </address>
    </author>
    <author initials="R." surname="Martin" fullname="Robert Martin">
      <organization>MITRE</organization>
      <address>
        <email>ramartin@mitre.org</email>
      </address>
    </author>
    <author initials="B." surname="Knight" fullname="Brian Knight">
      <organization>Microsoft</organization>
      <address>
        <email>brianknight@microsoft.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="25"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Generalized Software Supply Chain Use Case Descriptions</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-birkholz-scitt-software-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-scitt/draft-birkholz-scitt-software-supply-chain-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Modern software applications are an intricate mix of first-party and third-party code, development practices and tools, deployment methods and infrastructure, and interfaces and protocols. The software supply chain comprises all elements associated with an application's design, development, deployment, and maintenance throughout its entire lifecycle. The complexity of software coupled with a lack of lifecycle visibility increases the risks associated with system attack surface and the number of cyber threats capable of harmful impacts, such as exfiltration of data, disruption of operations, and loss of reputation, intellectual property, and financial assets. There is a need for a platform architecture that will allow consumers to know that suppliers maintained appropriate security practices without requiring access to proprietary intellectual property. SCITT-enabled products and analytics solutions will assist in managing compliance and assessing risk to help prevent and detect supply chain attacks across the entire software lifecycle while prioritizing data privacy.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="generic-problem-statement">
      <name>Generic Problem Statement</name>
      <t>Supply chain security is paramount to protecting critical infrastructure, aerospace, and defense and avoiding impacts on security, the economy, public health, and safety. It has historically focused on risk management practices to safeguard logistics, meet compliance regulations, demand forecasts, and optimize inventory. While these elements are foundational to a healthy supply chain, an integrated cyber security-based perspective of the software supply chains remains broadly undefined. Recently, the global community has experienced numerous supply chain attacks by cybercriminals targeting weaknesses in software supply chains. As illustrated in <xref target="lifecycle-threats"/>, a software supply chain attack may leverage one or more lifecycle stages and directly or indirectly target the component.</t>
      <!-- ![SCITT_SW_Use_Case](https://user-images.githubusercontent.com/100775190/197196387-f8f835ba-7023-4223-98c9-3d8ec197e658.svg) -->
<figure anchor="lifecycle-threats">
        <name>Example Lifecycle Threats</name>
        <artwork><![CDATA[
generic supply chain threats diagram here
]]></artwork>
      </figure>
      <t>DevSecOps relies on third-party and open-source solutions, expanding supply chain complexity, and reducing the visibility of the lifecycle compliance. One solution approach is to enhance the auditability and accountability of Digital Supply Chain Artifacts (DSCA) by using an interoperable, scalable, and flexible decentralized architecture with a transparent registry. The required software artifacts are highly variable based on community policy requirements, and the solution approach should be artifact agnostic to enable adaptation to these broad policies. Example artifacts may include commit signatures, build environment and parameters, software bill of materials, static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.</t>
    </section>
    <section anchor="notational-implementation">
      <name>Notational Implementation</name>
      <t>TBD</t>
      <figure anchor="deployment-chain">
        <name>Deployment Example of SCITT in Software Development</name>
        <artwork><![CDATA[
deployment chain diagram here
]]></artwork>
      </figure>
    </section>
    <section anchor="software-supply-chain-use-cases">
      <name>Software Supply Chain Use Cases</name>
      <section anchor="software-bill-of-material">
        <name>Software Bill of Material</name>
        <t>Micro Coding Wizards (MCW) is a small, fictional, software development company providing software solutions to help manage a fleet of electric vehicles (EV) for corporations.
MCW's software solution, MCWManager, is an asset management platform specifically designed to manage electric vehicle fleets.
MCWManager tracks usage, charge level, range, and other important characteristics of each EV in the fleet.
The US Department of the Interior (DOI), a government agency has expressed interest in licensing the MCWManager software to manage a fleet of 20 Electric Vehicles, spread across the Western Region, which includes States west of the Rocky Mountains.</t>
        <t>MCW has been informed by DOI that their software will be subject to Cybersecurity Executive Order (EO) 14028 recommendations from NIST and will need to supply "Software Bill of Materials" (SBOM) and a "Vulnerability Disclosure Report" (VDR) NIST attestation to the DOI prior to procurement.</t>
        <section anchor="producer-mcw-actions">
          <name>Producer (MCW) Actions</name>
          <t>A software producer, in this case MCW, creates a digitally signed SBOM, listing all the components contained in the final "distribution package" which a software consumer downloads in preparation for deployment within their digital ecosystem.
The following steps are performed by the Software Producer:</t>
          <ol spacing="normal" type="1">
            <li>Create the "final SBOM" listing all the components contained in the final distribution package of a software product, which the customer will install into their environment.
The SBOM must follow NTIA minimum elements for SBOM's and other NTIA and NIST recommendations for SBOM, to meet Executive Order 14028 and OMB M-22-18 requirements.
(Co)SWID, SPDX or CycloneDX SBOM formats are acceptable for this artifact.&nbsp;</li>
            <li>Digitally sign the SBOM artifact.</li>
            <li>Place the SBOM and digital signature artifacts within an access-controlled location, i.e. a customer portal, and provide the end consumer with a link to these artifacts for downloading to the customers environment.</li>
          </ol>
        </section>
        <section anchor="consumer-actions">
          <name>Consumer Actions</name>
          <t>A software consumer, in this case DOI, obtains a digitally signed SBOM artifact from a software vendor, which initiates the following risk assessment process:</t>
          <ol spacing="normal" type="1">
            <li>Produce a SHA-256 hash value for the SBOM artifact.</li>
            <li>Verify the digital signature over the SBOM artifact and identify the signing key used to sign the SBOM, referred to as the SKID (Secret Key ID), assuming the signature is verified successfully.</li>
            <li>Submit an inquiry to a trusted SCITT Registry requesting confirmation that a trust declaration is present in the registry for the combination of SHA-256 hash value and SKID associated with the SBOM.</li>
            <li>If a trust declaration is on file with the SCITT trusted registry then continue with the risk assessment, otherwise inform the consumer that the SBOM hash and SKID combination are not registered, and the risk assessment ceases.</li>
            <li>Continue with the risk assessment by performing a vulnerability search for each SBOM component, identifying any CVE's that are reported.</li>
          </ol>
          <figure anchor="implement-scenario">
            <name>Potential SCITT Implementation Scenario</name>
            <artwork><![CDATA[
deployment scenario diagram here
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="vulnerability-disclosure-report">
        <name>Vulnerability Disclosure Report</name>
        <t>MCW has been informed by DOI that their software will be subject to Cybersecurity Executive Order (EO) 14028 recommendations from NIST and will need to supply "Software Bill of Materials" (SBOM) and a "Vulnerability Disclosure Report" (VDR) NIST attestation to the DOI prior to procurement.</t>
        <section anchor="producer-mcw-actions-1">
          <name>Producer (MCW) Actions</name>
          <t>A software producer, in this case MCW, participates in a Vulnerability Disclosure Program, and generates a Vulnerability Disclosure Report listing all the known vulnerabilities and mitigations, which a software consumer downloads in preparation for deployment within their digital ecosystem.
The following steps are performed by the Software Producer:</t>
          <ol spacing="normal" type="1">
            <li>Participate in a Vulnerability Disclosure program.</li>
            <li>Generate a Vulnerability Disclosure Report (VDR) listing all the known vulnerabilities and mitigation plans to meet Executive Order 14028 and OMB M-22-18 requirements.</li>
            <li>Digitally sign the VDR artifact.</li>
            <li>Place the VDR and digital signature artifacts within an access-controlled location, i.e., a customer portal, and provide the end consumer with a link to these artifacts for downloading to the customers environment.&nbsp;</li>
          </ol>
        </section>
        <section anchor="consumer-actions-1">
          <name>Consumer Actions</name>
          <t>A software consumer, in this case DOI, obtains a digitally signed VDR artifact from a software vendor, which initiates the following risk assessment process:</t>
          <ol spacing="normal" type="1">
            <li>Produce a SHA-256 hash value for the VDR artifact.</li>
            <li>Verify the digital signature over the VDR artifact and identify the signing key used to sign the VDR, referred to as the SKID (Secret Key ID), assuming the signature is verified successfully.</li>
            <li>Submit an inquiry to a trusted SCITT Registry requesting confirmation that a trust declaration is present in the registry for the combination of SHA-256 hash value and SKID associated with the SBOM.</li>
            <li>Consumer checks SBOM against NIST NVD. If vulnerabilities have been reported within NVD and not in the producer provided VDR, then raise an issue with the producer for report accuracy.</li>
            <li>If a trust declaration is on file with the SCITT trusted registry then continue with the risk assessment, otherwise inform the consumer that the VDR hash and SKID combination are not registered, and the risk assessment ceases.</li>
            <li>Continue with the risk assessment by performing a vulnerability search for each SBOM component, identifying any CVE's that are reported.</li>
          </ol>
        </section>
      </section>
      <section anchor="nist-self-attestation-ssdf-framework">
        <name>NIST self-attestation: SSDF Framework</name>
        <t>Consistent with the NIST Guidance and by the timelines identified below, agencies are required to obtain a self-attestation from the software producer before using the software.</t>
        <section anchor="producer-mcw-actions-2">
          <name>Producer (MCW) Actions</name>
          <t>An acceptable self-attestation must include the following minimum requirements:</t>
          <ol spacing="normal" type="1">
            <li>The software producer's name.</li>
            <li>A description of which product or products the statement refers to (preferably focused at the company or product line level and inclusive of all unclassified products sold to Federal agencies).</li>
            <li>A statement attesting that the software producer follows secure development practices and tasks that are itemized in the standard self-attestation form.</li>
            <li>Self-attestation is the minimum level required; however, agencies may make risk-based determinations that a third-party assessment is required due to the criticality of the service or product that is being acquired, as defined in M-21-30.</li>
          </ol>
        </section>
        <section anchor="consumer-actions-2">
          <name>Consumer Actions</name>
          <t>TBD</t>
        </section>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="BCP" value="14"/>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="BCP" value="14"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
      </reference>
    </references>
    <!--
Contributors
============
{: numbered="no"}

Add reference to [TIME] once available.

Ben Gamari suggested being able to use decimally scaled fractional
seconds in CBOR time.
 -->

<!--
Acknowledgements
================
{: numbered="false"}
-->

<!--  LocalWords:  SCIIT uscase SBOM NIST
 -->

<section anchor="todo-list">
      <name>TODO List</name>
      <ul spacing="normal">
        <li>Promotion Scenario: '3rd party lab validates the detail instead of their own test'</li>
        <li>Endorsement Scenario: Audit downstream independent of issuer and provide an endorsement</li>
        <li>CI/CD SCITT interaction - Create a model before talking to Github (Statements about SW could be listed. Policy management can be done via SCITT through SW development lifecycle)</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
