<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nobuo-scitt-use-cases-extension-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="SCITT Extension Supply Chain">Supply Chain Use Cases to Design Secure Computing Systems for SCITT Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-nobuo-scitt-use-cases-extension-00"/>
    <author initials="N." surname="Aoki" fullname="Nobuo Aoki">
      <organization abbrev="SOKENDAI">The Graduate University for Advanced　Studies (SOKENDAI)</organization>
      <address>
        <postal>
          <country>Japan</country>
        </postal>
        <email>n_aoki@ieee.org</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 63?>

<t>This document includes a collection of representative Computational Supply Chain Use Cases.
These use cases aim to identify computational supply chain problems that the industry faces today and act as a guideline for developing a comprehensive security architecture  and solutions for these scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nobuo-scitt-use-cases-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aoki-n1/draft-nobuo-scitt-use-cases-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 68?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>Supply chain for components that make up a computer system consists of the entire lifecycle, including hardware selection, system design, development, build, integration, deployment, and maintenance.
In the software supply chain, SBOM and SCITT architecture are exemplary initiatives that enhance software transparency.
Discussions focusing on hardware and its interfaces are also beginning.
These supply chain security measures are expected to reduce the complexity of software and provide visibility into its lifecycle, thereby reducing the number of cyber threats that can cause harmful effects such as risks related to the system's attack surface, data leaks, business disruptions, damage to reputation, intellectual property, and financial assets.
On the other hand, thorough supply chain security for computer systems can only be achieved by integrating support from hardware to the software stack, enabling effective risk assessment and mitigation.
Modern computer systems are influenced by evolving computer architectures and increasingly complex software stacks, making the integrated management of components not always straightforward.
End users, such as consumers, need to be able to evaluate whether suppliers maintain appropriate security practices without requiring access to proprietary intellectual property, necessitating an evolutionary extension of the SCITT specification.
Post-SCITT compliant products support compliance management with legal, regulatory, and technical requirements (often differing but overlapping and interrelated), risk assessment, and detection of supply chain attacks throughout the entire lifecycle, prioritizing data privacy.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-generic-problem-statement">
      <name>Generic Problem Statement</name>
      <t>Supply chain security is a crucial requirement for ensuring the stable supply of materials that directly impact consumer survival and those widely used by the majority of consumers, while minimizing threats related to the economy, public health, and safety.
As an extension of discussions in the physical domain, the definition of software supply chain security in the cyber domain, <xref target="SoK-SW-SCS"/>, has been established.
This is due to the numerous supply chain attacks targeting vulnerabilities in the software supply chain that have been experienced globally, as well as the academic progress in analyzing these attack vectors.
This analysis can also be applied to the supply chains of computer systems, which include both hardware and software.
Supply chain attacks on computer systems typically involve attackers gaining initial access, making malicious changes upstream in the supply chain, and exploiting vulnerabilities in the downstream systems that are already in operation.</t>
      <t>The SCITT Architecture <xref target="I-D.draft-ietf-scitt-architecture"/> defines the core objects, identifiers and workflows necessary to interact with a SCITT Transparency Service:</t>
      <ul spacing="normal">
        <li>
          <t>Signed Statements</t>
        </li>
        <li>
          <t>Receipts</t>
        </li>
        <li>
          <t>Transparent Statements</t>
        </li>
        <li>
          <t>Registration Policies</t>
        </li>
      </ul>
      <t>The extended YANG data model with transparency schemers <xref target="RFC9472"/> defines schemers for mapping SBOMs and vulnerability information.</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Lists</t>
        </li>
        <li>
          <t>SBOM Information</t>
        </li>
        <li>
          <t>Vulnerability Information</t>
        </li>
      </ul>
      <t>As described above, specifications for software supply chain security are maturing; however, it remains unclear whether existing standard specifications can be followed while also encompassing a scope that extends beyond software.</t>
      <section anchor="sec-computational-supply-chain-use-cases">
        <name>Computational Supply Chain Use Cases</name>
        <section anchor="sec-multi-software-stack-and-computer-architecture">
          <name>Multi-Software Stack and Computer Architecture</name>
          <t>Software integration is an essential task in building computer systems.
The ecosystemization of software development is advancing, a process that involves procuring various software components from multiple suppliers at different layers and creating packages of varying sizes.
These include a considerable number of third-party components.
Furthermore, depending on the design, there may be cases where components are not strictly separated from one another.
Additionally, modern computer systems adopt a variety of architectures and infrastructures.
Similar to the increasing complexity of software stacks, computer architectures continue to evolve to keep pace with advancements in applications and hardware.</t>
          <t>End-consumers want:</t>
          <ul spacing="normal">
            <li>
              <t>all hardware and software components required to build a computer systems are displayed</t>
            </li>
            <li>
              <t>the ability to identify and retrieve all components from a secure and tamper-proof location  - to receive an alert when a vulnerability scan detects a known security issue on a running component</t>
            </li>
            <li>
              <t>verifiable proofs on build process and build environment with all supplier tiers to ensure end-to-end build quality and security</t>
            </li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>
              <t>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated hardware and software at both component and product level before using</t>
            </li>
            <li>
              <t>notify hardware and software integrators of vulnerabilities identified during security scans of running components</t>
            </li>
            <li>
              <t>provide valid annotations on build integrity to ensure conformance</t>
            </li>
            <li>
              <t>provide an interface that reconciles the division of responsibilities between the software and hardware sides</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations of the SCITT Architecture <xref target="I-D.draft-ietf-scitt-architecture"/> apply.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>The privacy considerations of the SCITT Architecture <xref target="I-D.draft-ietf-scitt-architecture"/> apply.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.draft-ietf-scitt-architecture">
          <front>
            <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft Research</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>ARM</organization>
            </author>
            <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
            <date day="4" month="July" year="2025"/>
            <abstract>
              <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document proposes a
   scalable architecture for single-issuer signed statement transparency
   applicable to any supply chain.  It ensures flexibility,
   interoperability between different transparency services, and
   compliance with various auditing procedures and regulatory
   requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SoK-SW-SCS">
          <front>
            <title>SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties</title>
            <author fullname="Chinenye Okafor" initials="C." surname="Okafor">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Taylor R. Schorlemmer" initials="T." surname="Schorlemmer">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Santiago Torres-Arias" initials="S." surname="Torres-Arias">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="James C. Davis" initials="J." surname="Davis">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <date month="November" year="2022"/>
          </front>
          <seriesInfo name="Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses" value="pp. 15-24"/>
          <seriesInfo name="DOI" value="10.1145/3560835.3564556"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="RFC9472">
          <front>
            <title>A YANG Data Model for Reporting Software Bills of Materials (SBOMs) and Vulnerability Information</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="S. Rose" initials="S." surname="Rose"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>To improve cybersecurity posture, automation is necessary to locate the software a device is using, whether that software has known vulnerabilities, and what, if any, recommendations suppliers may have. This memo extends the Manufacturer User Description (MUD) YANG schema to provide the locations of software bills of materials (SBOMs) and vulnerability information by introducing a transparency schema.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9472"/>
          <seriesInfo name="DOI" value="10.17487/RFC9472"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
