<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-11"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization>DataTrails</organization>
      <address>
        <postal>
          <city>Seattle</city>
          <region>WA</region>
          <code>98199</code>
          <country>United States</country>
        </postal>
        <email>steve.lasker@datatrails.ai</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 155?>

<t>Traceability of physical and digital Artifacts in supply chains is a long-standing, but increasingly serious security concern.
The rise in popularity of verifiable data structures as a mechanism to make actors more accountable for breaching their compliance promises has found some successful applications to specific use cases (such as the supply chain for digital certificates) but lacks a generic and scalable architecture that can address a wider range of use cases.</t>
      <t>This document defines a generic, interoperable and scalable architecture to enable transparency across any supply chain with minimum adoption barriers.
It provides flexibility, enabling interoperability across different implementations of Transparency Services with various auditing and compliance requirements.
Issuers can register their Signed Statements on one or more Transparency Services, with the guarantee that any Relying Parties will be able to verify them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 164?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document describes the generic, interoperable, and scalable SCITT architecture.
Its goal is to enhance auditability and accountability across supply chains.</t>
      <t>In supply chains, downstream Artifacts are built upon upstream Artifacts.
The complexity of traceability and quality control for these supply chains increases with the number of Artifacts and parties contributing to them.
There are many parties who publish information about Artifacts:
For example, the original manufacturer may provide information about the state of the Artifact when it left the factory.
The shipping company may add information about the transport environment of the Artifact.
Compliance Auditors may provide information about their compliance assessment of the Artifact.
Security companies may publish vulnerability information about an Artifact.
The original manufacturer may subsequently provide additional information about the manufacturing process they discovered after the Artifact left the factory.
Some of these parties may publish information about their analysis or use of an Artifact.</t>
      <t>SCITT provides a way for Relying Parties to obtain this information in a way that is "transparent", that is, parties cannot lie about the information that they publish without it being detected.
SCITT achieves this by having producers publish information in a Transparency Service, where Relying Parties can check the information.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-exemplary-software-supply-chain-ssc-use-cases">
      <name>Exemplary Software Supply Chain (SSC) Use Cases</name>
      <t>To illustrate the applicability of the SCITT architecture and its messages this section details the exemplary context of software supply chain (SSC) use cases.
The building blocks provided by the SCITT architecture and related documents (e.g., <xref target="I-D.draft-ietf-scitt-scrapi"/>) are not restricted to software supply chain use cases.
Software supply chains serve as a useful application guidance and first usage scenario.</t>
      <section anchor="sec-generic-ssc-problem-statement">
        <name>Generic SSC Problem Statement</name>
        <t>Supply chain security is a prerequisite to protecting consumers and minimizing economic, public health, and safety threats.
Supply chain security has historically focused on risk management practices to safeguard logistics, meet compliance regulations, forecast demand, and optimize inventory.
While these elements are foundational to a healthy supply chain, an integrated cyber security-based perspective of the software supply chains remains broadly undefined.
Recently, the global community has experienced numerous supply chain attacks targeting weaknesses in software supply chains.
As illustrated in <xref target="lifecycle-threats"/>, a software supply chain attack may leverage one or more life-cycle stages and directly or indirectly target the component.</t>
        <figure anchor="lifecycle-threats">
          <name>Example SSC Life-Cycle Threats</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="520" viewBox="0 0 520 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,80 L 8,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 8,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 8,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,720" fill="none" stroke="black"/>
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 56,144 L 56,176" fill="none" stroke="black"/>
                <path d="M 56,240 L 56,272" fill="none" stroke="black"/>
                <path d="M 56,336 L 56,368" fill="none" stroke="black"/>
                <path d="M 56,432 L 56,464" fill="none" stroke="black"/>
                <path d="M 56,528 L 56,560" fill="none" stroke="black"/>
                <path d="M 56,624 L 56,656" fill="none" stroke="black"/>
                <path d="M 104,80 L 104,144" fill="none" stroke="black"/>
                <path d="M 104,176 L 104,240" fill="none" stroke="black"/>
                <path d="M 104,272 L 104,336" fill="none" stroke="black"/>
                <path d="M 104,368 L 104,432" fill="none" stroke="black"/>
                <path d="M 104,464 L 104,528" fill="none" stroke="black"/>
                <path d="M 104,560 L 104,624" fill="none" stroke="black"/>
                <path d="M 104,656 L 104,720" fill="none" stroke="black"/>
                <path d="M 8,80 L 104,80" fill="none" stroke="black"/>
                <path d="M 8,144 L 104,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 104,176" fill="none" stroke="black"/>
                <path d="M 8,240 L 104,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 104,272" fill="none" stroke="black"/>
                <path d="M 8,336 L 104,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 104,368" fill="none" stroke="black"/>
                <path d="M 8,432 L 104,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 104,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 104,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 104,560" fill="none" stroke="black"/>
                <path d="M 8,624 L 104,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 104,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 104,720" fill="none" stroke="black"/>
                <g class="text">
                  <text x="60" y="36">Dependencies</text>
                  <text x="208" y="36">Malicious</text>
                  <text x="288" y="36">3rd-party</text>
                  <text x="360" y="36">package</text>
                  <text x="404" y="36">or</text>
                  <text x="448" y="36">version</text>
                  <text x="52" y="116">Code</text>
                  <text x="212" y="116">Compromise</text>
                  <text x="284" y="116">source</text>
                  <text x="344" y="116">control</text>
                  <text x="208" y="196">Malicious</text>
                  <text x="284" y="196">plug-ins</text>
                  <text x="52" y="212">Commit</text>
                  <text x="208" y="212">Malicious</text>
                  <text x="276" y="212">commit</text>
                  <text x="196" y="292">Modify</text>
                  <text x="248" y="292">build</text>
                  <text x="296" y="292">tasks</text>
                  <text x="332" y="292">or</text>
                  <text x="360" y="292">the</text>
                  <text x="400" y="292">build</text>
                  <text x="472" y="292">environment</text>
                  <text x="56" y="308">Build</text>
                  <text x="196" y="308">Poison</text>
                  <text x="240" y="308">the</text>
                  <text x="280" y="308">build</text>
                  <text x="364" y="308">agent/compiler</text>
                  <text x="196" y="324">Tamper</text>
                  <text x="244" y="324">with</text>
                  <text x="288" y="324">build</text>
                  <text x="336" y="324">cache</text>
                  <text x="212" y="388">Compromise</text>
                  <text x="276" y="388">test</text>
                  <text x="320" y="388">tools</text>
                  <text x="60" y="404">Test</text>
                  <text x="224" y="404">Falsification</text>
                  <text x="292" y="404">of</text>
                  <text x="324" y="404">test</text>
                  <text x="376" y="404">results</text>
                  <text x="184" y="484">Use</text>
                  <text x="216" y="484">bad</text>
                  <text x="268" y="484">packages</text>
                  <text x="56" y="500">Package</text>
                  <text x="212" y="500">Compromise</text>
                  <text x="288" y="500">package</text>
                  <text x="364" y="500">repository</text>
                  <text x="196" y="580">Modify</text>
                  <text x="256" y="580">release</text>
                  <text x="312" y="580">tasks</text>
                  <text x="56" y="596">Release</text>
                  <text x="196" y="596">Modify</text>
                  <text x="248" y="596">build</text>
                  <text x="292" y="596">drop</text>
                  <text x="336" y="596">prior</text>
                  <text x="372" y="596">to</text>
                  <text x="416" y="596">release</text>
                  <text x="52" y="692">Deploy</text>
                  <text x="196" y="692">Tamper</text>
                  <text x="244" y="692">with</text>
                  <text x="308" y="692">versioning</text>
                  <text x="368" y="692">and</text>
                  <text x="412" y="692">update</text>
                  <text x="472" y="692">process</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
      Dependencies        Malicious 3rd-party package or version
           |
           |
     +-----+-----+
     |           |
     |   Code    |        Compromise source control
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Malicious plug-ins
     |  Commit   |        Malicious commit
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify build tasks or the build environment
     |   Build   |        Poison the build agent/compiler
     |           |        Tamper with build cache
     +-----+-----+
           |
     +-----+-----+
     |           |        Compromise test tools
     |    Test   |        Falsification of test results
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Use bad packages
     |  Package  |        Compromise package repository
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify release tasks
     |  Release  |        Modify build drop prior to release
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |
     |  Deploy   |        Tamper with versioning and update process
     |           |
     +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>DevSecOps often depends on third-party and open-source software.
These dependencies can be quite complex throughout the supply chain and render the checking of lifecycle compliance difficult.
There is a need for manageable auditability and accountability of digital products.
Typically, the range of types of statements about digital products (and their dependencies) is vast, heterogeneous, and can differ between community policy requirements.
Taking the type and structure of all statements about digital and products into account might not be possible.
Examples of statements may include commit signatures, build environment and parameters, software bill of materials, static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.
In consequence, instead of trying to understand and describe the detailed syntax and semantics of every type of statement about digital products, the SCITT architecture focuses on ensuring statement authenticity, visibility/transparency, and intends to provide scalable accessibility.
Threats and practical issues can also arise from unintended side-effects of using security techniques outside their proper bounds.
For instance digital signatures may fail to verify past their expiry date even though the signed item itself remains completely valid.
Or a signature may verify even though the information it is securing is now found unreliable but fine-grained revocation is too hard.</t>
        <t>Lastly, where data exchange underpins serious business decision-making, it is important to hold the producers of those data to a higher standard of accountability.
The SCITT architecture provides mechanisms and structures for ensuring that the makers of authoritative statements can be held accountable and not hide or shred the evidence when it becomes inconvenient later.</t>
        <t>The following use cases illustrate the scope of SCITT and elaborate on the generic problem statement above.</t>
      </section>
      <section anchor="sec-eclectic-ssc-use-cases">
        <name>Eclectic SSC Use Cases</name>
        <t>The three following use cases are a specialization derived from the generic problem statement above.</t>
        <section anchor="sec-security-analysis-of-a-software-product">
          <name>Security Analysis of a Software Product</name>
          <t>A released software product is often accompanied by a set of complementary statements about its security compliance.
This gives enough confidence to both producers and consumers that the released software meets the expected security standards and is suitable to use.</t>
          <t>Subsequently, multiple security researchers often run sophisticated security analysis tools on the same product.
The intention is to identify any security weaknesses or vulnerabilities in the package.</t>
          <t>Initially, a particular analysis can identify a simple weakness in a software component.
Over a period of time, a statement from a third-party illustrates that the weakness is exposed in a way that represents an exploitable vulnerability.
The producer of the software product provides a statement that confirms the linking of a software component vulnerability with the software product by issuing a product vulnerability disclosure report and also issues an advisory statement on how to mitigate the vulnerability.
At first, the producer provides an updated software product that still uses the vulnerable software component but shields the issue in a fashion that inhibits exploitation.
Later, a second update of the software product includes a security patch to the affected software component from the software producer.
Finally, a third update includes a new release (updated version) of the formerly insecure software component.
For this release, both the software product and the affected software component are deemed secure by the producer and consumers.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>
              <t>know where to get these security statements from producers and third-parties related to the software product in a timely and unambiguous fashion</t>
            </li>
            <li>
              <t>attribute them to an authoritative issuer</t>
            </li>
            <li>
              <t>associate the statements in a meaningful manner via a set of well-known semantic relationships</t>
            </li>
            <li>
              <t>consistently, efficiently, and homogeneously check their authenticity</t>
            </li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>
              <t>know the various sources of statements</t>
            </li>
            <li>
              <t>express the provenance and historicity of statements</t>
            </li>
            <li>
              <t>relate and link various heterogeneous statements in a simple fashion</t>
            </li>
            <li>
              <t>check that the statement comes from a source with authority to issue that statement</t>
            </li>
            <li>
              <t>confirm that sources provide a complete history of statements related to a given component</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-promotion-of-a-software-component-by-multiple-entities">
          <name>Promotion of a Software Component by Multiple Entities</name>
          <t>A software component (e.g., a library or software product) released by a trusted producer is common practice for both open-source and commercial offerings.
The released software component is accompanied by a statement of authenticity.
Over time, due to its enhanced applicability to various products, there has been an increasing number of multiple providers of the same software component version on the internet.</t>
          <t>Some providers include this particular software component as part of their release product/package bundle and provide the package with proof of authenticity using their issuer authority.
Some packages include the original statement of authenticity, and some do not.
Over time, some providers no longer offer the exact same software component source code but pre-compiled software component binaries.
Some sources do not provide the exact same software component, but include patches and fixes produced by third-parties, as these emerge faster than solutions from the original producer.
Due to complex distribution and promotion life-cycle scenarios, the original software component takes myriad forms.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>
              <t>understand if a particular provider is a trusted originating producer or an alternative party</t>
            </li>
            <li>
              <t>know if and how the source, or resulting binary, of a promoted software component differs from the original software component</t>
            </li>
            <li>
              <t>check the provenance and history of a software component's source back to its origin</t>
            </li>
            <li>
              <t>assess whether to trust a component or product based on a downloaded package location and source supplier</t>
            </li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>
              <t>reliably discern if a provider is the original, trusted producer or is a trustworthy alternative provider or is an illegitimate provider</t>
            </li>
            <li>
              <t>track the provenance path from an original producer to a particular provider</t>
            </li>
            <li>
              <t>check the trustworthiness of a provider</t>
            </li>
            <li>
              <t>check the integrity of modifications or transformations applied by a provider</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-software-integrator-assembling-a-software-product-for-an-autonomous-vehicle">
          <name>Software Integrator Assembling a Software Product for an Autonomous Vehicle</name>
          <t>Software Integration is a complex activity.
This typically involves getting various software components from multiple suppliers, producing an integrated package deployed as part of device assembly.
For example, car manufacturers source integrated software for their autonomous vehicles from third parties that integrate software components from various sources.
Integration complexity creates a higher risk of security vulnerabilities to the delivered software.</t>
          <t>Consumers of integrated software want:</t>
          <ul spacing="normal">
            <li>
              <t>all components presents in a software product listed</t>
            </li>
            <li>
              <t>the ability to identify and retrieve all components from a secure and tamper-proof location</t>
            </li>
            <li>
              <t>to receive an alert when a vulnerability scan detects a known security issue on a running software component</t>
            </li>
            <li>
              <t>verifiable proofs on build process and build environment with all supplier tiers to ensure end to end build quality and security</t>
            </li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>
              <t>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated software at both component and product level before installation</t>
            </li>
            <li>
              <t>notify software integrators of vulnerabilities identified during security scans of running software</t>
            </li>
            <li>
              <t>provide valid annotations on build integrity to ensure conformance</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="RFC9052"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl anchor="mybody">
        <dt>Statement Sequence:</dt>
        <dd>
          <t>a sequence of Signed Statements captured by a Verifiable Data Structure.
see Verifiable Data Structure</t>
        </dd>
        <dt>Append-only Log:</dt>
        <dd>
          <t>a Statement Sequence comprising the entire registration history of the Transparency Service.
To make the Append-only property verifiable and transparent, the Transparency Service defines how Signed Statements are made available to Auditors.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements, or the transparent Statement Sequence, issued by a Transparency Service.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where a Transparency Service provides inconsistent proofs to Relying Parties, containing conflicting claims about the Signed Statement bound at a given position in the Verifiable Data Structure <xref target="EQUIVOCATION"/>.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where all proofs provided by the Transparency Service to Relying Parties are produced from a Single Verifiable Data Structure describing a unique sequence of Signed Statements and are therefore consistent.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Verifiable Data Structure.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for implementations
Receipts are signed proofs of verifiable data-structure properties.
The types of Receipts <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other proof types, such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Verifiable Data Structure, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>a Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version, or any content an Issuer wishes to publish about an Artifact.
The additional Statements about an Artifact are correlated by the Subject defined in the <xref target="CWT_CLAIMS"/> protected header.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, which represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Verifiable Data Structure and endorses its state.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure which supports one or more proof types, such as "inclusion proofs" or "consistency proofs", for Signed Statements as they are Registered to a Transparency Service.
SCITT supports multiple Verifiable Data Structures and Receipt formats as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, accommodating different Transparency Service implementations.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-definition-of-transparency">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.
SCITT supports multiple Verifiable Data Structures, as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the Verifiable Data Structure of a Transparency Service.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their registered sequence of Signed Statements and Verifiable Data Structure using a combination of trusted hardware, consensus protocols, and cryptographic evidence.
A Receipt is a signature over one or more Verifiable Data Structure Proofs that a Signed Statement is registered in the Verifiable Data Structure.
It is universally verifiable without online access to the TS.
Requesting a Receipt can result in the production of a new Receipt for the same Signed Statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Verifiable Data Structure, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency (CT) <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>
          <t>CAs (Issuers) sign the ASN.1 DER encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</t>
        </li>
        <li>
          <t>CAs submit the certificates to one or more CT logs (Transparency Services)</t>
        </li>
        <li>
          <t>CT logs produce Signed Certificate Timestamps (Transparent Statements)</t>
        </li>
        <li>
          <t>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</t>
        </li>
        <li>
          <t>The Verifiable Data Structure can be checked by Auditors</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture consists of a very loose federation of Transparency Services, and a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
The remaining details of the Receipt's contents are specified in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a Transparency Service independent of any one use case:</t>
      <ul spacing="normal">
        <li>
          <t>Issuers that use their credentials to create Signed Statements about Artifacts</t>
        </li>
        <li>
          <t>Transparency Services that evaluate Signed Statements against Registration Policies, producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</t>
        </li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>
              <t>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</t>
            </li>
            <li>
              <t>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g. verification);</t>
            </li>
            <li>
              <t>or replay all the Transparent Statements to check for the consistency and correctness of the Transparency Service's Verifiable Data Structure (e.g. auditing)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple Transparency Services and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more Transparency Service.
Each Transparency Service produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple Transparency Services.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="536" viewBox="0 0 536 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,448 L 32,480" fill="none" stroke="black"/>
              <path d="M 40,352 L 40,368" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,200" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,328" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,408" fill="none" stroke="black"/>
              <path d="M 120,288 L 120,328" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 152,352 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,448 L 160,480" fill="none" stroke="black"/>
              <path d="M 208,272 L 208,288" fill="none" stroke="black"/>
              <path d="M 216,464 L 216,496" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,320" fill="none" stroke="black"/>
              <path d="M 224,384 L 224,408" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,144" fill="none" stroke="black"/>
              <path d="M 288,272 L 288,288" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,88" fill="none" stroke="black"/>
              <path d="M 304,304 L 304,320" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,272" fill="none" stroke="black"/>
              <path d="M 344,384 L 344,408" fill="none" stroke="black"/>
              <path d="M 344,464 L 344,496" fill="none" stroke="black"/>
              <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
              <path d="M 384,176 L 384,200" fill="none" stroke="black"/>
              <path d="M 384,448 L 384,480" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,88" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,64" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,200" fill="none" stroke="black"/>
              <path d="M 440,336 L 440,360" fill="none" stroke="black"/>
              <path d="M 440,376 L 440,408" fill="none" stroke="black"/>
              <path d="M 472,208 L 472,272" fill="none" stroke="black"/>
              <path d="M 488,256 L 488,336" fill="none" stroke="black"/>
              <path d="M 504,160 L 504,352" fill="none" stroke="black"/>
              <path d="M 512,448 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 288,32 L 408,32" fill="none" stroke="black"/>
              <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
              <path d="M 288,64 L 408,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 384,96 L 472,96" fill="none" stroke="black"/>
              <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
              <path d="M 240,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 368,128 L 456,128" fill="none" stroke="black"/>
              <path d="M 448,144 L 488,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 304,160 L 368,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 128,224 L 336,224" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 272,256" fill="none" stroke="black"/>
              <path d="M 472,256 L 488,256" fill="none" stroke="black"/>
              <path d="M 136,272 L 208,272" fill="none" stroke="black"/>
              <path d="M 296,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 472,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 272,304" fill="none" stroke="black"/>
              <path d="M 200,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 56,336 L 136,336" fill="none" stroke="black"/>
              <path d="M 240,336 L 288,336" fill="none" stroke="black"/>
              <path d="M 368,336 L 488,336" fill="none" stroke="black"/>
              <path d="M 152,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 360,368 L 488,368" fill="none" stroke="black"/>
              <path d="M 56,384 L 136,384" fill="none" stroke="black"/>
              <path d="M 24,416 L 176,416" fill="none" stroke="black"/>
              <path d="M 200,416 L 368,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 8,448 L 160,448" fill="none" stroke="black"/>
              <path d="M 368,448 L 512,448" fill="none" stroke="black"/>
              <path d="M 176,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 32,480 L 160,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 216,496 L 344,496" fill="none" stroke="black"/>
              <path d="M 8,448 L 24,416" fill="none" stroke="black"/>
              <path d="M 240,128 L 256,96" fill="none" stroke="black"/>
              <path d="M 160,448 L 176,416" fill="none" stroke="black"/>
              <path d="M 328,128 L 344,96" fill="none" stroke="black"/>
              <path d="M 176,464 L 200,416" fill="none" stroke="black"/>
              <path d="M 368,128 L 384,96" fill="none" stroke="black"/>
              <path d="M 456,128 L 472,96" fill="none" stroke="black"/>
              <path d="M 344,464 L 368,416" fill="none" stroke="black"/>
              <path d="M 368,448 L 384,416" fill="none" stroke="black"/>
              <path d="M 512,448 L 528,416" fill="none" stroke="black"/>
              <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
              <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
              <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
              <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
              <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
              <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
              <path d="M 448,144 C 439.16936,144 432,136.83064 432,128" fill="none" stroke="black"/>
              <path d="M 488,144 C 496.83064,144 504,151.16936 504,160" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 304,160 C 295.16936,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 368,160 C 376.83064,160 384,167.16936 384,176" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 344,240 C 335.16936,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 224,256 C 215.16936,256 208,263.16936 208,272" fill="none" stroke="black"/>
              <path d="M 272,256 C 280.83064,256 288,263.16936 288,272" fill="none" stroke="black"/>
              <path d="M 136,272 C 127.16936,272 120,279.16936 120,288" fill="none" stroke="black"/>
              <path d="M 312,272 C 320.83064,272 328,264.83064 328,256" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 168,288 C 176.83064,288 184,295.16936 184,304" fill="none" stroke="black"/>
              <path d="M 288,288 C 296.83064,288 304,295.16936 304,304" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 272,304 C 280.83064,304 288,296.83064 288,288" fill="none" stroke="black"/>
              <path d="M 200,320 C 191.16936,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 56,336 C 47.16936,336 40,343.16936 40,352" fill="none" stroke="black"/>
              <path d="M 136,336 C 144.83064,336 152,343.16936 152,352" fill="none" stroke="black"/>
              <path d="M 240,336 C 231.16936,336 224,328.83064 224,320" fill="none" stroke="black"/>
              <path d="M 288,336 C 296.83064,336 304,328.83064 304,320" fill="none" stroke="black"/>
              <path d="M 208,368 C 216.83064,368 224,375.16936 224,384" fill="none" stroke="black"/>
              <path d="M 360,368 C 351.16936,368 344,375.16936 344,384" fill="none" stroke="black"/>
              <path d="M 488,368 C 496.83064,368 504,360.83064 504,352" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,376.83064 40,368" fill="none" stroke="black"/>
              <path d="M 136,384 C 144.83064,384 152,376.83064 152,368" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="448,408 436,402.4 436,413.6" fill="black" transform="rotate(90,440,408)"/>
              <path class="jump" d="M 440,376 C 446,376 446,360 440,360" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="440,200 428,194.4 428,205.6" fill="black" transform="rotate(90,432,200)"/>
              <polygon class="arrowhead" points="400,88 388,82.4 388,93.6" fill="black" transform="rotate(90,392,88)"/>
              <polygon class="arrowhead" points="392,200 380,194.4 380,205.6" fill="black" transform="rotate(90,384,200)"/>
              <polygon class="arrowhead" points="352,408 340,402.4 340,413.6" fill="black" transform="rotate(90,344,408)"/>
              <polygon class="arrowhead" points="344,224 332,218.4 332,229.6" fill="black" transform="rotate(0,336,224)"/>
              <polygon class="arrowhead" points="320,320 308,314.4 308,325.6" fill="black" transform="rotate(180,312,320)"/>
              <polygon class="arrowhead" points="312,88 300,82.4 300,93.6" fill="black" transform="rotate(90,304,88)"/>
              <polygon class="arrowhead" points="304,272 292,266.4 292,277.6" fill="black" transform="rotate(180,296,272)"/>
              <polygon class="arrowhead" points="232,408 220,402.4 220,413.6" fill="black" transform="rotate(90,224,408)"/>
              <polygon class="arrowhead" points="128,328 116,322.4 116,333.6" fill="black" transform="rotate(90,120,328)"/>
              <polygon class="arrowhead" points="104,408 92,402.4 92,413.6" fill="black" transform="rotate(90,96,408)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6" fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="80,328 68,322.4 68,333.6" fill="black" transform="rotate(90,72,328)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6" fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,88 52,82.4 52,93.6" fill="black" transform="rotate(90,56,88)"/>
              <g class="text">
                <text x="60" y="52">Artifact</text>
                <text x="348" y="52">Issuer</text>
                <text x="56" y="116">Statement</text>
                <text x="292" y="116">sign</text>
                <text x="420" y="116">verify</text>
                <text x="68" y="228">Signed</text>
                <text x="404" y="228">Transparency</text>
                <text x="72" y="244">Statement</text>
                <text x="400" y="260">Service</text>
                <text x="248" y="276">Receipt</text>
                <text x="428" y="292">Transparency</text>
                <text x="264" y="324">Receipt</text>
                <text x="424" y="324">Service</text>
                <text x="96" y="356">Transparent</text>
                <text x="96" y="372">Statement</text>
                <text x="56" y="436">Collect</text>
                <text x="124" y="436">Receipts</text>
                <text x="228" y="436">Verify</text>
                <text x="304" y="436">Transparent</text>
                <text x="428" y="436">Replay</text>
                <text x="472" y="436">Log</text>
                <text x="272" y="452">Statement</text>
                <text x="72" y="468">Relying</text>
                <text x="128" y="468">Party</text>
                <text x="424" y="468">Relying</text>
                <text x="480" y="468">Party</text>
                <text x="256" y="484">Relying</text>
                <text x="312" y="484">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 .----------.                      +--------------+
|  Artifact  |                     |    Issuer    |
 '----+-----'                      +-+----------+-+
      v                              v          v
 .----+----.                   .-----+----.    .+---------.
| Statement |                 /   sign   /    /  verify  /
 '----+----'                 '-----+----+    '-------+--+
      |                            |                 |'------.
      |    .----------------------' '---------.      |        |
      |   |                                    |     |        |
      v   v                                    v     v        |
 .----+---+---.                           +----+----+-----+   |
|    Signed    +------------------------->+ Transparency  |   |
|   Statement  |                         .+               |   |
 '------+-----'           .-------.     | |   Service     +-+ |
        |      .---------+ Receipt +<--'  +--+------------+ | |
        |     |.-----.   |         +.        | Transparency | |
        |     |       |   '+------'  |       |              | |
        v     v        '---+ Receipt +<------+   Service    | |
     .--+-----+--.          '-------'        +--------+-----+ |
    | Transparent |                                   |       |
    |  Statement  +-------.                .----------)------'
     '-----+-----'         |              |           |
           v               v              v           v
  .--------+---------.  .--+--------------+--. .------+----------.
 / Collect Receipts /  / Verify Transparent / /   Replay Log    /
'--+---------------+  /      Statement     / '-+---------------+
   | Relying Party | '----+---------------+    | Relying Party |
   +---------------+      | Relying Party |    +---------------+
                          +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely Transparency Service, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature a Verifiable Data Structure.
The Verifiable Data Structure records registered Signed Statements and supports the production of Receipts.</t>
        <t>All Transparency Services <bcp14>MUST</bcp14> expose APIs (<xref target="I-D.draft-ietf-scitt-scrapi"/> for the Registration of Signed Statements and issuance of Receipts.</t>
        <t>Transparency Services <bcp14>MAY</bcp14> support additional APIs for auditing, for instance querying the history of Signed Statements.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example</tt> may have a distinct Issuer identity for each sub domain, such as <tt>customer1.ts.example</tt> and <tt>customer2.ts.example</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is accepted to be registered to the Verifiable Data Structure.</t>
          <t>Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.
Transparency Services <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>) in order to check the signatures of Signed Statements, either separately, or inside Registration Policies.
Transparency Services <bcp14>MUST</bcp14> authenticate Signed Statements as part of a Registration Policy.
For instance, a trust anchor could be an X.509 root certificate (directly or its thumbprint), a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.</t>
          <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made transparent and available to all Relying Parties of the Transparency Service by registering them as Signed Statements on the Verifiable Data Structure and distributing the associated Receipts.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="RFC9052"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>When using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates currently registered as a trust anchor by the Transparency Service.</t>
            <t>The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently committed to the Verifiable Data Structure at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>
              <t>Pre-configured Registration Policy and trust anchors;</t>
            </li>
            <li>
              <t>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</t>
            </li>
            <li>
              <t>An out-of-band authenticated management interface</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-verifiable-data-structure">
          <name>Verifiable Data Structure</name>
          <t>The security properties are determined by the choice of the Verifiable Data Structure (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) used by the Transparency Service implementation.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>a property required for a verifiable data structure to be applicable to SCITT, ensuring that the Statement Sequence cannot be modified, deleted, or reordered.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the registered sequence of Signed Statements accepted by the Transparency Service and committed to the Verifiable Data Structure.
Everyone with access to its content sees the same ordered collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Verifiable Data Structure includes sufficient information to enable authorized actors with access to its content to check that each data structure representing each Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non-inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that supports a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-signed-statements">
      <name>Signed Statements</name>
      <t>This specification prioritizes conformance to <xref target="RFC9052"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissibility of conforming messages.
This specification is left intentionally open to allow implementations to make Registration restrictions that make the most sense for their operational use cases.</t>
      <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="COSWID"/></t>
        </li>
        <li>
          <t><xref target="CycloneDX"/></t>
        </li>
        <li>
          <t><xref target="in-toto"/></t>
        </li>
        <li>
          <t><xref target="SPDX-CBOR"/></t>
        </li>
        <li>
          <t><xref target="SPDX-JSON"/></t>
        </li>
        <li>
          <t><xref target="SLSA"/></t>
        </li>
        <li>
          <t><xref target="SWID"/></t>
        </li>
      </ul>
      <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.</t>
      <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
      <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header) for different Artifacts or sign all Signed Statements under the same key.</t>
      <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
      <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
      <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
      <t>Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
      <ul spacing="normal">
        <li>
          <t>When using x.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</t>
        </li>
        <li>
          <t>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</t>
        </li>
      </ul>
      <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, <tt>iss</tt> <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in length.</t>
      <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out-of-scope of this document.</t>
      <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="CWT_CLAIMS_COSE"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
      <t>A Receipt is a Signed Statement, (COSE_Sign1), with additional Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <section anchor="sec-signed-statement-examples">
        <name>Signed Statement Examples</name>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition <xref target="RFC8610"/> for the protected header and unprotected header of Signed Statements and Receipts.</t>
        <t>The SCITT architecture specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl"><![CDATA[
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &(CWT_Claims: 15) => CWT_Claims
  ? &(alg: 1) => int
  ? &(content_type: 3) => tstr / uint
  ? &(kid: 4) => bstr
  ? &(x5t: 34) => COSE_CertHash
  * int => any
}

CWT_Claims = {
  &(iss: 1) => tstr
  &(sub: 2) => tstr
  * int => any
}

Unprotected_Header = {
  ? &(x5chain: 33) => COSE_X509
  ? &(receipts: TBD_0)  => [+ Receipt]
  * int => any
}
]]></sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1      /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)
]]></sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-registration-of-signed-statements">
        <name>Registration of Signed Statements</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Client authentication:</strong> A Client authenticates with the Transparency Service before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation-specific and out of scope of the SCITT architecture.</t>
          </li>
          <li>
            <t><strong>TS Signed Statement Verification and Validation:</strong> The Transparency Service <bcp14>MUST</bcp14> perform signature verification per <xref section="4.4" sectionFormat="of" target="RFC9052"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The Transparency Service <bcp14>MUST</bcp14> also check the Signed Statement includes the required protected headers.
The Transparency Service <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain specific registration policies that apply to specific content types.</t>
          </li>
          <li>
            <t><strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope and may use information contained in the attributes of named policies.</t>
          </li>
          <li>
            <t><strong>Register the Signed Statement</strong></t>
          </li>
          <li>
            <t><strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</t>
          </li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the Verifiable Data Structure.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>A Transparency Service <bcp14>MAY</bcp14> accept a Signed Statement with content in its unprotected header, and <bcp14>MAY</bcp14> use values from that unprotected header during verification and registration policy evaluation.</t>
        <t>However, the unprotected header of a Signed Statement <bcp14>MUST</bcp14> be set to an empty map before the Signed Statement can be included in a Statement Sequence.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
      </section>
    </section>
    <section anchor="Receipt">
      <name>Transparent Statements</name>
      <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
      <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
      <t>Receipts are based on Signed Inclusion Proofs as described in COSE Receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> that also provides the COSE header parameter semantics for label TBD_0.</t>
      <t>The Registration time is recorded as the timestamp when the Transparency Service added the Signed Statement to its Verifiable Data Structure.</t>
      <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.
See <xref target="fig-signed-statement-cddl"/> for the CDDL rule that defines 'COSE_Sign1' as specified in <xref section="4.2" sectionFormat="of" target="RFC9052"/></t>
      <figure anchor="fig-transparent-statement-cddl">
        <name>CDDL definition for a Transparent Statement</name>
        <sourcecode type="cddl"><![CDATA[
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &(receipts: TBD_0)  => [+ Receipt]
}
]]></sourcecode>
      </figure>
      <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label TBD_0 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
      <figure anchor="fig-transparent-statement-edn">
        <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
        <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1               /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        TBD_0: [                    / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)
]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Per the COSE Verifiable Data Structure Registry documented in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, the COSE key type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
      <figure anchor="fig-receipt-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
        <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE Sign 1               /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)
]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-protected-header-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
        <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}
]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Verifiable Data Structure was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-inclusion-proof-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
        <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]
]]></sourcecode>
      </figure>
      <section anchor="validation">
        <name>Validation</name>
        <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in Section 4.4 of RFC9052, when checking the signature of Signed Statements and Receipts.</t>
        <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
        <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
        <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
        <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
        <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Interactions with Transparency Services are expected to use appropriately strong encryption and authorization technologies.</t>
      <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Issuers and Clients are responsible for verifying that the Transparency Service's privacy and security posture is suitable for the contents of the Signed Statements they submit prior to Registration.
Issuers must carefully review the inclusion of private, confidential, or personally identifiable information (PII) in their Statements against the Transparency Service's privacy posture.</t>
      <t>In some deployments a special role such as an Auditor might require and be given access to both the Transparency Service and related Adjacent Services.</t>
      <t>Transparency Services can leverage Verifiable Data Structures which only retain cryptographic metadata (e.g. a hash), rather than the complete Signed Statement, as part of a defense in depth approach to maintaining confidentiality.
By analyzing the relationship between data stored in the Transparency Service and data stored in Adjacent Services, it is possible to perform metadata analysis, which could reveal the order in which artifacts were built, signed, and uploaded.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>On its own, verifying a Transparent Statement does not guarantee that its Envelope or contents are trustworthy.
Just that they have been signed by the apparent Issuer and counter-signed by the Transparency Service.
If the Relying Party trusts the Issuer, after validation of the Issuer identity, it can infer that an Issuer's Signed Statement was issued with this Envelope and contents, which may be interpreted as the Issuer saying the Artifact is fit for its intended purpose.
If the Relying Party trusts the Transparency Service, it can independently infer that the Signed Statement passed the Transparency Service Registration Policy and that has been persisted in the Verifiable Data Structure.
Unless advertised in the Transparency Service Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the Verifiable Data Structure matches the ordering of their issuance.</t>
      <t>Similarly, the fact that an Issuer can be held accountable for its Transparent Statements does not on its own provide any mitigation or remediation mechanism in case one of these Transparent Statements turned out to be misleading or malicious.
Just that signed evidence will be available to support them.</t>
      <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      <t>Issuers <bcp14>MUST</bcp14> ensure that the Statement payloads in their Signed Statements are correct and unambiguous, for example by avoiding ill-defined or ambiguous formats that may cause Relying Parties to interpret the Signed Statement as valid for some other purpose.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> carefully protect their private signing keys and avoid these keys being used for any purpose not described in this architecture document.
In cases where key re-use is unavoidable, keys <bcp14>MUST NOT</bcp14> sign any other message that may be verified as an Envelope as part of a Signed Statement.</t>
      <t>For instance, the code for the Registration Policy evaluation and endorsement may be protected by running in a Trusted Execution Environment (TEE).</t>
      <t>The Transparency Service may be replicated with a consensus algorithm, such as Practical Byzantine Fault Tolerance <xref target="PBFT"/> and may be used to protect against malicious or vulnerable replicas.
Threshold signatures may be use to protect the service key, etc.</t>
      <t>Issuers and Transparency Services <bcp14>MUST</bcp14> rotate their keys in well-defined cryptoperiods, see <xref target="KEY-MANAGEMENT"/>.</t>
      <t>A Transparency Service <bcp14>MAY</bcp14> provide additional authenticity assurances about its secure implementation and operation, enabling remote attestation of the hardware platforms and/or software Trusted Computing Bases (TCB) that run the Transparency Service.
If present, these additional authenticity assurances <bcp14>MUST</bcp14> be registered in the Verifiable Data Structure and <bcp14>MUST</bcp14> always be exposed by the Transparency Services' APIs.
An example of Signed Statement's payloads that can improve authenticity assurances are trustworthiness assessments that are RATS Conceptual Messages, such as Evidence, Endorsements, or corresponding Attestation Results (see <xref target="RFC9334"/>).</t>
      <t>For example, if a Transparency Service is implemented using a set of redundant replicas, each running within its own hardware-protected trusted execution environments (TEEs), then each replica can provide fresh Evidence or fresh Attestation Results about its TEEs.
The respective Evidence can show, for example, the binding of the hardware platform to the software that runs the Transparency Service, the long-term public key of the service, or the key used by the replica for signing Receipts.
The respective Attestation Result, for example, can show that the remote attestation Evidence was appraised by a Relying Party and complies with well-known Reference Values and Endorsements.</t>
      <t>Auditors should be aware that the certification path information included in an unprotected <tt>x5chain</tt> header of a to-be-registered Signed Statement can be tampered with by a malicious Transparency Service (e.g., one that does not incorporate remote attestation), which may replace the intermediate certificates and ultimately connect to an unexpected root.
This modification helps protect against person-in-the-middle attacks, but not denial-of-service.
Auditors <bcp14>MUST</bcp14> perform certification path validation in accordance with PKIX rules specified in <xref target="RFC5280"/>.
Auditors <bcp14>MUST</bcp14> verify that certification paths chain to one or more trust anchors (often represented as root certificates).</t>
      <section anchor="sec-security-guarantees">
        <name>Security Guarantees</name>
        <t>SCITT provides the following security guarantees:</t>
        <ol spacing="normal" type="1"><li>
            <t>Statements made by Issuers about supply chain Artifacts are identifiable, can be authenticated, and once authenticated, are non-repudiable</t>
          </li>
          <li>
            <t>Statement provenance and history can be independently and consistently audited</t>
          </li>
          <li>
            <t>Issuers can efficiently prove that their Statement is logged by a Transparency Service</t>
          </li>
        </ol>
        <t>The first guarantee is achieved by requiring Issuers to sign their Statements and associated metadata using a distributed public key infrastructure.
The second guarantee is achieved by committing the Signed Statement to a Verifiable Data Structure.
The third guarantee is achieved by the combination of both of these acts.</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, Transparency Services, and Auditors) are corrupt or compromised.</t>
        <t>This threat model may need to be refined to account for specific supply chain use cases.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
These guarantees are meant to hold for extensive periods of time, possibly decades.</t>
        <t>It can never be assumed that some Issuers and some Transparency Services will not be corrupt.</t>
        <t>SCITT entities explicitly trust one another on the basis of their long-term identity, which maps to shorter-lived cryptographic credentials.
A Relying Party <bcp14>SHOULD</bcp14> validate a Transparent Statement originating from a given Issuer, registered at a given Transparency Service (both identified in the Relying Party's local authorization policy) and would not depend on any other Issuer or Transparency Services.</t>
        <t>Issuers cannot be stopped from producing Signed Statements including false assertions in their Statement payload (either by mistake or by corruption), but these Issuers can made accountable by ensuring their Signed Statements are systematically registered at a Transparency Service.</t>
        <t>Similarly, providing strong residual guarantees against faulty/corrupt Transparency Services is a SCITT design goal.
Preventing a Transparency Service from registering Signed Statements that do not meet its stated Registration Policy, or to issue Receipts that are not consistent with their Verifiable Data Structure is not possible.
In contrast, Transparency Services can be held accountable and blamed by an Auditor that replays the Sequence of Signed Statements captured in their Verifiable Data Structure to confirm that a contested Receipt is valid and was correctly registered.</t>
        <t>Transparency Services can provide consistency proofs allowing Auditors to check if a set of Receipts were issued from a single Verifiable Data Structure, without replaying individual Signed Statements.</t>
        <t>Certain Verifiable Data Structures enable a Transparency Service to prove the properties of its Statement Sequence.
For example, proving a specific Signed Statement is included in the sequence, or that the sequence has only been extended (Append-only property) since the last time such a proof was created.</t>
        <t>Note that the SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.</t>
        <t>In both cases, the SCITT architecture provides generic, universally-verifiable cryptographic proofs to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
So long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
        <section anchor="sec-verifiable-data-structure-1">
          <name>Verifiable Data Structure</name>
          <t>If a Transparency Service is honest, then a Transparent Statement including a correct Receipt ensures that the associated Signed Statement passed its Registration Policy and was registered appropriately.</t>
          <t>Conversely, a corrupt Transparency Service may:</t>
          <ol spacing="normal" type="1"><li>
              <t>refuse or delay the Registration of Signed Statements</t>
            </li>
            <li>
              <t>register Signed Statements that do not pass its Registration Policy (e.g., Signed Statement with Issuer identities and signatures that do not verify)</t>
            </li>
            <li>
              <t>issue verifiable Receipts for Signed Statements that do not match its Verifiable Data Structure</t>
            </li>
            <li>
              <t>refuse access to its Transparency Service (e.g., to Auditors, possibly after storage loss)</t>
            </li>
          </ol>
          <t>An Auditor granted (partial) access to a Transparency Service and to a collection of disputed Receipts will be able to replay it, detect any invalid Registration (2) or incorrect Receipt in this collection (3), and blame the Transparency Service for them.
This ensures any Relying Party that trusts at least one such Auditor that (2, 3) will be blamed to the Transparency Service.</t>
          <t>Due to the operational challenge of maintaining a globally consistent Verifiable Data Structure, some Transparency Services may provide limited support for historical queries on the Signed Statements they have registered and accept the risk of being blamed for inconsistent Registration or Issuer Equivocation.</t>
          <t>Relying Parties and Auditors may also witness (1, 4) but may not be able to collect verifiable evidence for it.</t>
        </section>
        <section anchor="sec-availability-of-receipts">
          <name>Availability of Receipts</name>
          <t>Networking and Storage are trusted only for availability.</t>
          <t>Auditing may involve access to data beyond what is persisted in the Transparency Services.
For example, the registered Transparency Service may include only the hash of a detailed SBOM, which may limit the scope of auditing.</t>
          <t>Resistance to denial-of-service is implementation specific.</t>
          <t>Actors may want to independently keep their own record of the Signed Statements they issue, endorse, verify, or audit.</t>
        </section>
        <section anchor="sec-cryptographic-agility">
          <name>Cryptographic Agility</name>
          <t>The SCITT Architecture supports cryptographic agility.
The actors depend only on the subset of signing and Receipt schemes they trust.
This enables the gradual transition to stronger algorithms, including e.g. post-quantum signature algorithms.</t>
        </section>
        <section anchor="sec-transparency-service-client-applications">
          <name>Transparency Service Client Applications</name>
          <t>Authentication of Client applications is out of scope for this document.
Transparency Services <bcp14>MUST</bcp14> authenticate both Client applications and the Issuer of Signed Statements in order to ensure that implementation of specific authentication and authorization policies are enforced.
The specification of authentication and authorization policies is out of scope for this document.</t>
        </section>
        <section anchor="sec-impersonation">
          <name>Impersonation</name>
          <t>The identity resolution mechanism is trusted to associate long-term identifiers with their public signature-verification keys.
Transparency Services and other parties may record identity-resolution evidence to facilitate its auditing.</t>
          <t>If one of the credentials of an Issuer gets compromised, the SCITT Architecture still guarantees the authenticity of all Signed Statements signed with this credential that have been registered on a Transparency Service before the compromise.
It is up to the Issuer to notify Transparency Services of credential revocation to stop Relying Parties from accepting Signed Statements signed with compromised credentials.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="sec-cose-receipts-header-parameter">
        <name>COSE Receipts Header Parameter</name>
        <t>TBD_0 is requested in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      </section>
      <section anchor="sec-media-type-registration">
        <name>Media Type Registration</name>
        <t>Pending WG discussion.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="COSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9393"/>
          <seriesInfo name="DOI" value="10.17487/RFC9393"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="20" month="February" year="2025"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-08"/>
        </reference>
        <reference anchor="I-D.draft-ietf-scitt-scrapi">
          <front>
            <title>SCITT Reference APIs Draft-ietf-scitt-scrapi-03</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jon Geater" initials="J." surname="Geater">
              <organization>DataTrails Inc.</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document describes a REST API that supports the normative
   requirements of the SCITT Architecture.  Optional key discovery and
   query interfaces are provided to support interoperability with X.509
   Certificates, alternative methods commonly used to support public key
   discovery and Artifact Repositories.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-scrapi-03"/>
        </reference>
        <reference anchor="CWT_CLAIMS_COSE">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="29" month="November" year="2023"/>
            <abstract>
              <t>   This document describes how to include CBOR Web Token (CWT) claims in
   the header parameters of any COSE structure.  This functionality
   helps to facilitate applications that wish to make use of CBOR Web
   Token (CWT) claims in encrypted COSE structures and/or COSE
   structures featuring detached signatures, while having some of those
   claims be available before decryption and/or without inspecting the
   detached payload.  Another use case is using CWT claims with payloads
   that are not CWT Claims Sets, including payloads that are not CBOR at
   all.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cwt-claims-in-headers-10"/>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
        </reference>
        <reference anchor="NIST.SP.800-63-3" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf">
          <front>
            <title>Digital identity guidelines: revision 3</title>
            <author fullname="Paul A Grassi" surname="Grassi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael E Garcia" surname="Garcia">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="James L Fenton" surname="Fenton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization abbrev="NIST">National Institute of Standards and Technology</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="22" month="June" year="2017"/>
          </front>
          <seriesInfo name="NIST Special Publications (General)" value="800-63-3"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-63-3"/>
        </reference>
        <reference anchor="FIPS.201">
          <front>
            <title>Personal identity verification (PIV) of federal employees and contractors</title>
            <author>
              <organization/>
            </author>
            <date month="January" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.201-3"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="NIST_EO14028" target="https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf">
          <front>
            <title>Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="February" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="CWT_CLAIMS" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION">
          <front>
            <title>Attested append-only memory: making adversaries stick to their word</title>
            <author fullname="Byung-Gon Chun" initials="B." surname="Chun">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="Petros Maniatis" initials="P." surname="Maniatis">
              <organization>Intel Research Berkeley, Berkeley</organization>
            </author>
            <author fullname="Scott Shenker" initials="S." surname="Shenker">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <author fullname="John Kubiatowicz" initials="J." surname="Kubiatowicz">
              <organization>UC Berkeley, Berkeley</organization>
            </author>
            <date month="October" year="2007"/>
          </front>
          <seriesInfo name="ACM SIGOPS Operating Systems Review" value="vol. 41, no. 6, pp. 189-204"/>
          <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PBFT">
          <front>
            <title>Practical byzantine fault tolerance and proactive recovery</title>
            <author fullname="Miguel Castro" initials="M." surname="Castro">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Barbara Liskov" initials="B." surname="Liskov">
              <organization>MIT Laboratory for Computer Science</organization>
            </author>
            <date month="November" year="2002"/>
          </front>
          <seriesInfo name="ACM Transactions on Computer Systems" value="vol. 20, no. 4, pp. 398-461"/>
          <seriesInfo name="DOI" value="10.1145/571637.571640"/>
          <refcontent>Association for Computing Machinery (ACM)</refcontent>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="KEY-MANAGEMENT">
          <front>
            <title>Recommendation for key management:: part 2 -- best practices for key management organizations</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="William C Barker" initials="W." surname="Barker">
              <organization/>
            </author>
            <date month="May" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-57pt2r1"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 1082?>

<section anchor="sec-common-terminology-disambiguation">
      <name>Common Terminology Disambiguation</name>
      <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups.</t>
      <t>This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
      <t>The terms "verifier" and "Relying Party" are used interchangeably through the document.
While these terms are related to "Verifier" and "Relying Party" as used in <xref target="RFC9334"/>, they do not imply the processing of RATS conceptual messages, such as Evidence or Attestation Results that are specific to remote attestation.
A SCITT "verifier" and "Relying Party" and "Issuer" of Receipts or Statements might take on the role of a RATS "Attester".
Correspondingly, all RATS conceptual messages, such as Evidence and Attestation Results, can be the content of SCITT Statements and a SCITT "verifier" can also take on the role of a RATS "Verifier" to, for example, conduct the procedure of Appraisal of Evidence as a part of a SCITT "verifier"'s verification capabilities.</t>
      <t>The terms "Claim" and "Statement" are used throughout this document, where Claim is consistent with the usage in <xref target="I-D.draft-ietf-rats-eat"/> and <xref target="RFC7523"/>, and Statement is reserved for any arbitrary bytes, possibly identified with a media type, about which the Claims are made.</t>
      <t>The term "Subject" provides an identifier of the Issuer's choosing to refer to a given Artifact and ensures that all associated Statements can be attributed to the identifier chosen by the Issuer.</t>
      <t>In simpler language, a SCITT Statement could be some vendor-specific software bill of materials (SBOM), results from a model checker, static analyzer, or RATS Evidence about the authenticity of an SBOM creation process, where the Issuer identifies themselves using the <tt>iss</tt> Claim, and the specific software that was analyzed as the Subject using the <tt>sub</tt> Claim.</t>
      <t>In <xref target="RFC7523"/>, the Authorization Server (AS) verifies Private Key JWT client authentication requests, and issues access tokens to clients configured to use "urn:ietf:params:oauth:client-assertion-type:jwt-bearer".
This means the AS initially acts as a "verifier" of the authentication credentials in form of a JWT, and then later as an "Issuer" of access and refresh tokens.
This mirrors how Signed Statements are verified before Receipts are issued by a Transparency Service.
Note that the use of <xref target="RFC7523"/> is only one possible approach for client authentication in OAuth.</t>
      <t><xref target="FIPS.201"/> defines "assertion" as "A verifiable statement from an IdP to an RP that contains information about an end user".</t>
      <t><xref target="NIST.SP.800-63-3"/> defines "assertion" as "A statement from a verifier to an RP that contains information about a subscriber.
Assertions may also contain verified attributes."</t>
      <t>This document uses the term Statement to refer to potentially unsecured data and associated Claims, and Signed Statement and Receipt to refer to assertions from an Issuer, or the Transparency Service.</t>
      <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."</t>
      <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="NIST_EO14028"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.".
In the RATS context, a "NIST attestation" is similar to a RATS "Endorsement".
Occasionally, RATS Evidence and RATS Attestation Results or the procedures of creating these conceptual messages are referred to as "attestation" or (in cases of the use as a verb) "to attest".
The stand-alone use of "attestation" and "to attest" is discouraged outside a well-defined context, such as specification text that highlights the application of terminology, explicitly.
Correspondingly, it is often useful for the intended audience to qualify the term "attestation" to avoid confusion and ambiguity.</t>
    </section>
    <section anchor="sec-signing-statements-remotely">
      <name>Signing Statements Remotely</name>
      <t>Statements about digital Artifacts, containing digital Artifacts, or structured data regarding any type of Artifacts, can be too large or too sensitive to be send to a remote Transparency Services over the Internet.
In these cases a Statement can also be hash, which becomes the payload included in COSE to-be-signed bytes.
A Signed Statement (COSE_Sign1) <bcp14>MUST</bcp14> be produced from the to-be-signed bytes according to <xref section="4.4" sectionFormat="of" target="RFC9052"/>.</t>
      <artset>
        <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
            <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
            <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
            <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
            <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
            <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
            <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
            <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
            <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
            <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
            <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
            <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
            <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
            <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
            <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
            <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
            <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
            <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
            <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
            <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
            <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
            <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
            <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
            <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
            <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
            <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
            <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
            <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
            <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
            <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
            <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
            <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
            <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
            <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
            <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
            <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
            <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
            <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
            <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
            <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
            <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
            <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
            <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
            <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
            <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
            <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
            <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
            <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
            <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
            <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
            <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
            <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
            <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
            <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
            <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
            <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
            <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
            <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
            <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
            <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
            <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
            <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
            <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
            <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
            <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
            <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
            <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
            <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
            <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
            <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
            <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
            <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
            <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
            <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
            <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
            <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
            <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
            <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
            <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
            <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
            <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
            <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
            <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
            <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
            <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
            <polygon class="arrowhead" points="336,584 324,578.4 324,589.6" fill="black" transform="rotate(90,328,584)"/>
            <polygon class="arrowhead" points="280,584 268,578.4 268,589.6" fill="black" transform="rotate(90,272,584)"/>
            <polygon class="arrowhead" points="280,520 268,514.4 268,525.6" fill="black" transform="rotate(90,272,520)"/>
            <polygon class="arrowhead" points="248,176 236,170.4 236,181.6" fill="black" transform="rotate(0,240,176)"/>
            <polygon class="arrowhead" points="176,176 164,170.4 164,181.6" fill="black" transform="rotate(0,168,176)"/>
            <polygon class="arrowhead" points="152,624 140,618.4 140,629.6" fill="black" transform="rotate(180,144,624)"/>
            <polygon class="arrowhead" points="64,680 52,674.4 52,685.6" fill="black" transform="rotate(90,56,680)"/>
            <polygon class="arrowhead" points="64,584 52,578.4 52,589.6" fill="black" transform="rotate(90,56,584)"/>
            <polygon class="arrowhead" points="64,456 52,450.4 52,461.6" fill="black" transform="rotate(270,56,456)"/>
            <polygon class="arrowhead" points="64,104 52,98.4 52,109.6" fill="black" transform="rotate(90,56,104)"/>
            <polygon class="arrowhead" points="48,200 36,194.4 36,205.6" fill="black" transform="rotate(90,40,200)"/>
            <g class="text">
              <text x="76" y="52">Artifact</text>
              <text x="60" y="132">Hash</text>
              <text x="196" y="180">OR</text>
              <text x="296" y="180">Payload</text>
              <text x="72" y="228">Statement</text>
              <text x="104" y="292">...</text>
              <text x="164" y="292">Producer</text>
              <text x="232" y="292">Network</text>
              <text x="280" y="292">...</text>
              <text x="192" y="324">...</text>
              <text x="104" y="356">...</text>
              <text x="164" y="356">Issuer</text>
              <text x="224" y="356">Network</text>
              <text x="272" y="356">...</text>
              <text x="52" y="420">Identity</text>
              <text x="168" y="420">(iss,</text>
              <text x="212" y="420">x5t)</text>
              <text x="52" y="436">Document</text>
              <text x="48" y="500">Private</text>
              <text x="96" y="500">Key</text>
              <text x="268" y="548">Header</text>
              <text x="76" y="628">Sign</text>
              <text x="220" y="628">To</text>
              <text x="244" y="628">Be</text>
              <text x="284" y="628">Signed</text>
              <text x="336" y="628">Bytes</text>
              <text x="36" y="708">COSE</text>
              <text x="76" y="708">Sign</text>
              <text x="104" y="708">1</text>
            </g>
          </svg>
        </artwork>
        <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
      </artset>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Transmute</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@transmute.industries</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
      <contact initials="D." surname="Brooks" fullname="Dick Brooks">
        <organization>Business Cyber Guardian (TM)</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>dick@businesscyberguardian.com</email>
        </address>
      </contact>
      <t>Dick contributed to the software supply chain use cases.</t>
      <contact initials="B." surname="Knight" fullname="Brian Knight">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>brianknight@microsoft.com</email>
        </address>
      </contact>
      <t>Brian contributed to the software supply chain use cases.</t>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <t>Robert contributed to the software supply chain use cases.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
