<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.8 (Ruby 2.6.8) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-fdb-rats-psa-endorsements-01" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="PSA Endorsements">Arm's Platform Security Architecture (PSA) Attestation Verifier Endorsements</title>

    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Arm Ltd</organization>
      <address>
        <email>thomas.fossati@arm.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>Arm Ltd</organization>
      <address>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>

    <date />

    <area>Security</area>
    <workgroup>RATS</workgroup>
    

    <abstract>


<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device.  This memo defines such PSA
Endorsements as a profile of the CoRIM data model.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>PSA Endorsements include reference values, cryptographic key material and
certification status information that a Verifier needs in order to appraise
attestation Evidence produced by a PSA device <xref target="PSA-TOKEN"/>.  This memo defines
such PSA Endorsements as a profile of the CoRIM data model <xref target="CoRIM"/>.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>The reader is assumed to be familiar with the terms defined in Section 2.1 of
<xref target="PSA-TOKEN"/> and in Section 4 of <xref target="RATS-ARCH"/>.</t>

</section>
<section anchor="sec-psa-endorsements"><name>PSA Endorsements</name>

<t>PSA Endorsements describe an attesting device in terms of the hardware and
firmware components that make up its PSA Root of Trust (RoT). This includes
the identification and expected state of the device as well as the
cryptographic key material needed to verify Evidence signed by the device's PSA
RoT. Additionally, PSA Endorsements can include information related to the
certification status of the attesting device.</t>

<t>There are five types of PSA Endorsements:</t>

<t><list style="symbols">
  <t>Reference Values (<xref target="sec-ref-values"/>), i.e., measurements of the PSA RoT
firmware;</t>
  <t>Attestation Verification Claims (<xref target="sec-keys"/>), i.e., cryptographic keys
that can be used to verify signed Evidence produced by the PSA RoT, along
with the identifiers that bind the keys to their device instances;</t>
  <t>Certification Claims (<xref target="sec-certificates"/>), i.e., metadata that describe
the certification status associated with a PSA device.</t>
  <t>Software Relations (<xref target="sec-swrel"/>), used to model upgrade and patch
relationships between software components;</t>
  <t>Endorsements Block List (<xref target="sec-endorsements-block-list"/>), used to invalidate
previously provisioned Endorsements.</t>
</list></t>

<section anchor="psa-endorsement-profile"><name>PSA Endorsement Profile</name>

<t>PSA Endorsements are carried in one or more CoMIDs inside a CoRIM.</t>

<t>The profile attribute in the CoRIM MUST be present and MUST have a single entry
set to the uri <spanx style="verb">http://arm.com/psa/iot/1</spanx> as shown in <xref target="ex-psa-iot-profile"/>.</t>

<figure title="PSA IoT version 1, CoRIM profile" anchor="ex-psa-iot-profile"><artwork><![CDATA[
/ corim-map / {
  / corim.profile / 3: [ 
    32("http://arm.com/psa/iot/1")
  ]
  / ... /
}
]]></artwork></figure>

</section>
<section anchor="sec-psa-rot-id"><name>PSA Endorsements to PSA RoT Linkage</name>

<t>Each PSA Endorsement - be it a Reference Value, Attestation Verification Claim
or Certification Claim - is associated with an immutable PSA RoT.  A PSA
Endorsement is associated to its PSA RoT by means of the unique PSA RoT
identifier known as Implementation ID (see Section 3.2.2 of <xref target="PSA-TOKEN"/>).</t>

<t>In order to support PSA Implementation IDs, the CoMID type
<spanx style="verb">$class-id-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
; from draft-tschofenig-rats-psa-token
psa-implementation-id-type = bytes .size 32

tagged-implementation-id-type = #6.600(implementation-id-type)

$class-id-type-choice /= tagged-implementation-id-type
]]></artwork></figure>

<t>Besides, a PSA Endorsement can be associated with a specific instance of a
certain PSA RoT - as in the case of Attestation Verification Claims.  A PSA
Endorsement is associated with a PSA RoT instance by means of the Instance ID
(see Section 3.2.1 of <xref target="PSA-TOKEN"/>) and its "parent" Implementation ID.</t>

<t>These identifiers are typically found in the subject of a CoMID triple, encoded
in an <spanx style="verb">environment-map</spanx> as shown in <xref target="ex-psa-rot-id"/>.</t>

<figure title="Example PSA RoT Identification" anchor="ex-psa-rot-id"><artwork><![CDATA[
/ environment-map / {
  / comid.class / 0 : {
    / comid.class-id / 0 :
      / tagged-impl-id-type / 600(
        h'61636d652d696d706c656d656e746174
          696f6e2d69642d303030303030303031'
      ),
      / comid.vendor / 1 : "ACME Ltd.",
      / comid.model /  2 : "Roadrunner 1.0"
  },
  / comid.instance / 1 :
    / tagged-ueid-type / 550(
      h'01
        4ca3e4f50bf248c39787020d68ffd05c
        88767751bf2645ca923f57a98becd296'
    )
}
]]></artwork></figure>

<t>Optional <spanx style="verb">vendor</spanx> and <spanx style="verb">model</spanx> can be specified as well.  Together, they are
interpreted as a unique identifier of the product that embeds the PSA RoT.
Consistently providing a product identifier is RECOMMENDED.</t>

</section>
<section anchor="sec-ref-values"><name>Reference Values</name>

<t>Reference Values carry measurements and other metadata associated with the
updatable firmware in a PSA RoT.  When appraising Evidence, the Verifier
compares Reference Values against the values found in the Software Components
of the PSA token (see Section 3.4.1 of <xref target="PSA-TOKEN"/>).</t>

<t>Each measurement is encoded in a <spanx style="verb">measurement-map</spanx> of a CoMID
<spanx style="verb">reference-triple-record</spanx>.  Since a <spanx style="verb">measurement-map</spanx> can encode one or more
measurements, a single <spanx style="verb">reference-triple-record</spanx> can carry as many measurements
as needed, provided they belong to the same PSA RoT identified in the subject of
the "reference value" triple.  A single <spanx style="verb">reference-triple-record</spanx> SHALL
completely describe the updatable PSA RoT.</t>

<t>The identifier of a measured software component is encoded in a <spanx style="verb">psa-swcomp-id</spanx>
object as follows:</t>

<figure><artwork><![CDATA[
psa-swcomp-id = {
  psa.measurement-type => text
  psa.version => text
  psa.signer-id => psa.hash-type
}

psa.hash-type = bytes .size 32 / bytes .size 48 / bytes .size 64

psa.measurement-type = 1
psa.version = 4
psa.signer-id = 5
]]></artwork></figure>

<t>The semantics of the codepoints in the <spanx style="verb">psa-swcomp-id</spanx> map are equivalent to
those in the <spanx style="verb">psa-software-component</spanx> map defined in Section 3.4.1 of
<xref target="PSA-TOKEN"/>.  The <spanx style="verb">psa-swcomp-id</spanx> MUST uniquely identify a given software
component within the PSA RoT / product.</t>

<t>In order to support PSA Reference Value identifiers, the CoMID type
<spanx style="verb">$measured-element-type-choice</spanx> is extended as follows:</t>

<figure><artwork><![CDATA[
tagged-psa-swcomp-id = #6.601(psa-swcomp-id)

$measured-element-type-choice /= tagged-psa-swcomp-id
]]></artwork></figure>

<t>and automatically bound to the <spanx style="verb">comid.mkey</spanx> in the <spanx style="verb">measurement-map</spanx>.</t>

<t>The raw measurement is encoded in a <spanx style="verb">digests-type</spanx> object in the
<spanx style="verb">measurement-values-map</spanx>.  The <spanx style="verb">digests-type</spanx> array MUST contain at least one
entry.  The <spanx style="verb">digests-type</spanx> array MAY contain more than one entry if multiple
digests (obtained with different hash algorithms) of the same measured
component exist.</t>

<t>The example in <xref target="ex-reference-value"/> shows a CoMID a PSA Endorsement of type
Reference Value for a firmware measurement associated with Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx>.</t>

<figure title="Example Reference Value" anchor="ex-reference-value"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.reference-triples / 0 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          }
        },
        [
          / measurement-map / {
            / comid.mkey / 0 : 601({
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                            05523ce4ce1a245a
                                            e1a239ae3c6bfd9e
                                            7871f7e5d8bae86b'
            }),
            / comid.mval / 1 : {
              / comid.digests / 2 : [
                / hash-alg-id / 1, / sha256 /
                / hash-value /  h'44aa336af4cb14a8
                                  79432e53dd6571c7
                                  fa9bccafb75f4882
                                  59262d6ea3a4d91b'
              ]
            }
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

<section anchor="sec-swrel"><name>Software Upgrades and Patches</name>

<t>In order to model software lifecycle events such as updates and patches, this
profile defines a new triple that conveys the following semantics:</t>

<t><list style="symbols">
  <t>SUBJECT: a software component</t>
  <t>PREDICATE: (non-critically / critically) (updates / patches)</t>
  <t>OBJECT: another software component</t>
</list></t>

<t>The triple is reified and used as the object of another triple,
<spanx style="verb">psa-swrel-triple-record</spanx>, whose subject is the embedding environment.</t>

<figure><artwork><![CDATA[
comid.psa-swrel-triples = 5

$$triples-map-extension //= (
  comid.psa-swrel-triples => [ + psa-swrel-triple-record ]
)

psa.updates = 1
psa.patches = 2

psa-swrel-rel = [
  type: psa.updates / psa.patches
  security-critical: bool ; true means it's a fix for a security bug
]

sw-rel = [
  new: psa-swcomp-id ; identifier of the "new" firmware
  rel: psa-swrel-rel ; patches, updates and the security flag
  old: psa-swcomp-id ; identifier of the "old" firmware
]

psa-swrel-triple-record = [
  environment-map
  sw-rel
]
]]></artwork></figure>

<t>An example of a security critical update involving versions "1.3.5" and "1.4.0"
of software component "PRoT" within the target environment associated with
Implementation ID <spanx style="verb">acme-implementation-id-000000001</spanx> is shown in
<xref target="ex-psa-swrel-update-crit"/>.</t>

<figure title="Example Critical Software Upgrade" anchor="ex-psa-swrel-update-crit"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.psa-swrel-triples / 5 : [
      [
        / environment-map / {
          / comid.class-id / 0 :
          / tagged-impl-id-type / 600(
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031'
          ),
          / comid.vendor / 1 : "ACME Ltd.",
          / comid.model /  2 : "Roadrunner 1.0"
        },

        / sw-rel / [
          / new / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.4.0",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          },

          / rel / [
            / type / 1, / psa.updates /
            / security-critical / true
          ],

          / old / {
            / psa.measurement-type / 1 : "PRoT",
            / psa.version /          4 : "1.3.5",
            / psa.signer-id /        5 : h'acbb11c7e4da2172
                                           05523ce4ce1a245a
                                           e1a239ae3c6bfd9e
                                           7871f7e5d8bae86b'
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="sec-keys"><name>Attestation Verification Claims</name>

<t>An Attestation Verification Claim carries the verification key associated with
the Initial Attestation Key (IAK) of a PSA device.  When appraising Evidence,
the Verifier uses the Implementation ID and Instance ID claims (see
<xref target="sec-psa-rot-id"/>) to retrieve the verification key that it SHALL use to check
the signature on the Evidence.  This allows the Verifier to prove (or disprove)
the Attester's claimed identity.</t>

<t>Each verification key is provided alongside the corresponding device Instance
and Implementation IDs (and, possibly, a product identifier) in an
<spanx style="verb">attest-key-triple-record</spanx>.  Specifically:</t>

<t><list style="symbols">
  <t>The Instance and Implementation IDs are encoded in the environment-map as
shown in <xref target="ex-psa-rot-id"/>;</t>
  <t>The IAK public key is carried in the <spanx style="verb">comid.key</spanx> entry in the
<spanx style="verb">verification-key-map</spanx>.  The IAK public key is a PEM-encoded
SubjectPublicKeyInfo <xref target="RFC5280"/>.  There MUST be only one
<spanx style="verb">verification-key-map</spanx> in an <spanx style="verb">attest-key-triple-record</spanx>;</t>
  <t>The optional <spanx style="verb">comid.keychain</spanx> entry MUST NOT be set by a CoMID producer that
uses the profile described in this document, and MUST be ignored by a CoMID
consumer that is parsing according to this profile.</t>
</list></t>

<t>The example in <xref target="ex-attestation-verification-claim"/> shows the PSA Endorsement
of type Attestation Verification Claim carrying a secp256r1 EC public IAK
associated with Instance ID <spanx style="verb">4ca3...d296</spanx>.</t>

<figure title="Example Attestation Verification Claim" anchor="ex-attestation-verification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  },
  / comid.triples / 4 : {
    / comid.attest-key-triples / 3 : [
      [
        / environment-map / {
          / comid.class / 0 : {
            / comid.class-id / 0 :
              / tagged-impl-id-type / 600(
                h'61636d652d696d706c656d656e746174
                  696f6e2d69642d303030303030303031'
              ),
              / comid.vendor / 1 : "ACME Ltd.",
              / comid.model /  2 : "Roadrunner 1.0"
          },
          / comid.instance / 1 :
            / tagged-ueid-type / 550(
              h'01
                4ca3e4f50bf248c39787020d68ffd05c
                88767751bf2645ca923f57a98becd296'
            )
        },
        [
          / verification-key-map / {
            / comid.key / 0 :
              "MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgA
              ETl4iCZ47zrRbRG0TVf0dw7VFlHtv18HInY
              hnmMNybo+A1wuECyVqrDSmLt4QQzZPBECV8
              ANHS5HgGCCSr7E/Lg=="
          }
        ]
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-certificates"><name>Certification Claims</name>

<t>PSA Certified <xref target="PSA-CERTIFIED"/> defines a certification scheme for the PSA
ecosystem.  A product - either a hardware component, a software component, or
an entire device - that is verified to meet the security criteria established
by the PSA Certified scheme is warranted a PSA Certified Security Assurance
Certificate (SAC).  A SAC contains information about the certification of a
certain product (e.g., the target system, the attained certification level, the
test lab that conducted the evaluation, etc.), and has a unique Certificate
Number.</t>

<t>The linkage between a PSA RoT -- comprising the immutable part as well as zero
or more of the mutable components -- and the associated SAC is provided by a
Certification Claim, which binds the PSA RoT Implementation ID and the software
component identifiers with the SAC unique Certificate Number.  When appraising
Evidence, the Verifier can use the Certification Claims associated with the
identified Attester as ancillary input to the Appraisal Policy, or to enrich
the produced Attestation Result.</t>

<t>A Certification Claim is encoded in an <spanx style="verb">psa-cert-triple-record</spanx>, which extends
the <spanx style="verb">$$triples-map-extension</spanx> socket, as follows:</t>

<figure><artwork><![CDATA[
comid.psa-cert-triples = 4

$$triples-map-extension //= (
  comid.psa-cert-triples => [ + psa-cert-triple-record ]
)

psa.immutable-rot = 1
psa.mutable-rot = 2

psa-rot-descriptor = {
  psa.immutable-rot => psa-implementation-id-type
  psa.mutable-rot => [ * psa-swcomp-id ]
}

psa-cert-triple-record = [
  psa-rot-descriptor
  psa-cert-num-type
]

psa-cert-num-type = text .regexp "[0-9]{13} - [0-9]{5}"
]]></artwork></figure>

<t><list style="symbols">
  <t>The Implementation ID of the immutable PSA RoT to which the SAC applies is
encoded as a <spanx style="verb">tagged-impl-id-type</spanx> in the <spanx style="verb">psa.immutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>Any software component that is part of the certified PSA RoT is encoded as a
<spanx style="verb">psa-swcomp-id</spanx> (see <xref target="sec-ref-values"/>) in the <spanx style="verb">psa.mutable-rot</spanx> of the
<spanx style="verb">psa-rot-descriptor</spanx>;</t>
  <t>The unique SAC Certificate Number is encoded in the <spanx style="verb">psa-cert-num-type</spanx>.</t>
</list></t>

<t>A single CoMID can carry one or more Certification Claims.</t>

<t>The example in <xref target="ex-certification-claim"/> shows a Certification Claim that
associates Certificate Number <spanx style="verb">1234567890123 - 12345</spanx> to Implementation ID
<spanx style="verb">acme-implementation-id-000000001</spanx> and a single "PRoT" software component with
version "1.3.5".</t>

<figure title="Example Certification Claim with `supplement` Link-Relation" anchor="ex-certification-claim"><artwork><![CDATA[
/ concise-mid-tag / {
  / comid.tag-identity / 1 : {
    / comid.tag-id / 0 : h'3f06af63a93c11e4979700505690773f'
  }, 
  / comid.triples / 4 : {
    / comid.psa-cert-triples / 4 : [
      [
        / psa-rot-descriptor / {
          / psa.immutable-rot / 1 :
            h'61636d652d696d706c656d656e746174
              696f6e2d69642d303030303030303031',
          / psa.mutable-rot / 2 : [
            / psa-swcomp-id / {
              / psa.measurement-type / 1 : "PRoT",
              / psa.version /          4 : "1.3.5",
              / psa.signer-id /        5 : h'acbb11c7e4da2172
                                             05523ce4ce1a245a
                                             e1a239ae3c6bfd9e
                                             7871f7e5d8bae86b'
            }
          ]
        },
        / psa-cert-num-type / "1234567890123 - 12345"
      ]
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sec-endorsements-block-list"><name>Endorsements Block List</name>

<t><cref>This is work in progress.  It may change or be removed in the future.</cref></t>

<t>The following three "blocklist" claims:</t>

<t><list style="symbols">
  <t><spanx style="verb">reference-blocklist-triple</spanx></t>
  <t><spanx style="verb">attest-key-blocklist-triple</spanx></t>
  <t><spanx style="verb">cert-blocklist-triple</spanx></t>
</list></t>

<t>are defined with the same syntax but opposite semantics with regards to their
"positive" counterparts to allow invalidating previously provisioned endorsements
from the acceptable set.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t><cref>TODO</cref></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="cbor-tag-registrations"><name>CBOR Tag Registrations</name>

<t>IANA is requested to allocate the following tag in the "CBOR Tags" registry
<xref target="IANA.cbor-tags"/>, preferably with the specified value:</t>

<texttable title="CoRIM CBOR Tags" anchor="tbl-psa-cbor-tag">
      <ttcol align='left'>Tag</ttcol>
      <ttcol align='left'>Data Item</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c>600</c>
      <c>tagged bytes</c>
      <c>PSA Implementation ID (<xref target="sec-psa-rot-id"/> of RFCTHIS)</c>
      <c>601</c>
      <c>tagged map</c>
      <c>PSA Software Component Identifier (<xref target="sec-ref-values"/> of RFCTHIS)</c>
</texttable>

</section>
<section anchor="corim-profile-registration"><name>CoRIM Profile Registration</name>

<t>IANA is requested to register the following profile value in the
<cref>TODO</cref> CoRIM registry.</t>

<texttable title="PSA profile for CoRIM" anchor="tbl-psa-corim-profile">
      <ttcol align='left'>Profile Value</ttcol>
      <ttcol align='left'>Type</ttcol>
      <ttcol align='left'>Semantics</ttcol>
      <c><spanx style="verb">http://arm.com/psa/iot/1</spanx></c>
      <c>uri</c>
      <c>The CoRIM profile specified by this document</c>
</texttable>

</section>
<section anchor="comid-codepoints"><name>CoMID Codepoints</name>

<t>IANA is requested to register the following codepoints to the "CoMID Triples
Map" registry.</t>

<texttable title="PSA CoMID Triples" anchor="tbl-psa-comid-triples">
      <ttcol align='left'>Index</ttcol>
      <ttcol align='left'>Item Name</ttcol>
      <ttcol align='left'>Specification</ttcol>
      <c>4</c>
      <c>comid.psa-cert-triples</c>
      <c>RFCTHIS</c>
      <c>5</c>
      <c>comid.psa-swrel-triples</c>
      <c>RFCTHIS</c>
</texttable>

</section>
</section>
<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t><cref>TODO</cref></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor='PSA-TOKEN'>
   <front>
      <title>Arm&#39;s Platform Security Architecture (PSA) Attestation Token</title>
      <author fullname='Hannes Tschofenig'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Simon Frost'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Mathias Brossard'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Adrian Shaw'>
	 <organization>HP Labs</organization>
      </author>
      <author fullname='Thomas Fossati'>
	 <organization>Arm Limited</organization>
      </author>
      <date day='7' month='March' year='2022'/>
      <abstract>
	 <t>   The Platform Security Architecture (PSA) is a family of hardware and
   firmware security specifications, as well as open-source reference
   implementations, to help device makers and chip manufacturers build
   best-practice security into products.  Devices that are PSA compliant
   are able to produce attestation tokens as described in this memo,
   which are the basis for a number of different protocols, including
   secure provisioning and network access control.  This document
   specifies the PSA attestation token structure and semantics.

   The PSA attestation token is a profiled Entity Attestation Token
   (EAT).

   This specification describes what claims are used in an attestation
   token generated by PSA compliant systems, how these claims get
   serialized to the wire, and how they are cryptographically protected.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-tschofenig-rats-psa-token-09'/>
   <format target='https://www.ietf.org/archive/id/draft-tschofenig-rats-psa-token-09.txt' type='TXT'/>
</reference>


<reference anchor='CoRIM'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz'>
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande'>
	 <organization>Arm Limited</organization>
      </author>
      <author fullname='Ned Smith'>
	 <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='26' month='January' year='2022'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to put
   trust in the trustworthiness of a remote Attester and therefore to
   decide if to engage in secure interactions with it - or not.
   Evidence about trustworthiness can be rather complex, voluminous or
   Attester-specific.  As it is deemed unrealistic that every Relying
   Party is capable of the appraisal of Evidence, that burden is taken
   on by a Verifier.  In order to conduct Evidence appraisal procedures,
   a Verifier requires not only fresh Evidence from an Attester, but
   also trusted Endorsements and Reference Values from Endorsers, such
   as manufacturers, distributors, or owners.  This document specifies
   Concise Reference Integrity Manifests (CoRIM) that represent
   Endorsements and Reference Values in CBOR format.  Composite devices
   or systems are represented by a collection of Concise Module
   Identifiers (CoMID) and Concise Software Identifiers (CoSWID) bundled
   in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-02'/>
   <format target='https://www.ietf.org/archive/id/draft-birkholz-rats-corim-02.txt' type='TXT'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<reference anchor='IANA.cbor-tags' target='https://www.iana.org/assignments/cbor-tags'>
<front>
<title>Concise Binary Object Representation (CBOR) Tags</title>
<author><organization>IANA</organization></author>
<date/>
</front>
</reference>




    </references>

    <references title='Informative References'>




<reference anchor='RATS-ARCH'>
   <front>
      <title>Remote Attestation Procedures Architecture</title>
      <author fullname='Henk Birkholz'>
	 <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler'>
	 <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith'>
	 <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='8' month='February' year='2022'/>
      <abstract>
	 <t>   In network protocol exchanges it is often useful for one end of a
   communication to know whether the other end is in an intended
   operating state.  This document provides an architectural overview of
   the entities involved that make such tests possible through the
   process of generating, conveying, and evaluating evidentiary claims.
   An attempt is made to provide for a model that is neutral toward
   processor architectures, the content of claims, and protocols.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-15'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-rats-architecture-15.txt' type='TXT'/>
</reference>


<reference anchor="PSA-CERTIFIED" target="https://www.psacertified.org">
  <front>
    <title>PSA Certified</title>
    <author >
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

