<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-17" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-17"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization/>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="12"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 156?>

<t>Traceability in supply chains is a growing security concern.
While verifiable data structures have addressed specific issues, such as equivocation over digital certificates, they lack a universal architecture for all supply chains.
This document proposes a scalable architecture for single-issuer signed statement transparency applicable to any supply chain.
It ensures flexibility, interoperability between different transparency services, and compliance with various auditing procedures and regulatory requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 163?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document defines an architecture, a base set of extensible message structures, and associated flows to make signed content transparent via verifiable data structures maintained by corresponding transparency services.
The goal of the transparency enabled by the Supply Chain Integrity, Transparency, and Trust (SCITT) architecture is to enhance auditability and accountability for single-issuer signed content (statements) that are about supply chain commodities (artifacts).
Registering signed statements with a transparency service is akin to a notarization procedure.
Transparency services perform notary operations, confirming a policy is met before recording the statement on the ledger.
The SCITT ledger represents a linear and irrevocable history of statements made.
Once the signed statement is registered, the transparency service issues a receipt, just as a notary stamps the document being notarized.
Similar approaches have been implemented for specific classes of artifacts, such as Certificate Transparency <xref target="RFC9162"/>.
The SCITT approach follows a more generic paradigm than previous approaches.
This "content-agnostic" approach allows SCITT transparency services to be either integrated in existing solutions or to be an initial part of new emerging systems.
Extensibility is a vital feature of the SCITT architecture, so that requirements from various applications can be accommodated while always ensuring interoperability with respect to registration procedures and corresponding auditability and accountability.
For simplicity, the scope of this document is limited to use cases originating from the software supply chain domain, but the specification defined is applicable to any other type of supply chain statements (also referred to as value-add graphs), for example, statements about hardware supply chains.</t>
      <t>This document also defines message structures for signed statements and defines a profile for COSE receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, i.e., signed verifiable data structure proofs).
These message structures are based on the Concise Binary Object Representation Standard <xref target="STD94"/> and corresponding signing is facilitated via the CBOR Object Signing and Encryption Standard <xref target="STD96"/>.
The message structures are defined using the Concise Data Definition Language <xref target="RFC8610"/>.
The signed statements and receipts are based on the COSE_Sign1 specification in <xref section="4.2" sectionFormat="of" target="STD96"/>.
As these messages provide the foundation of any transparency service implementation for global and cross-domain application interoperability, they are based on complementary COSE specifications, mainly <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.
Therefore, support of COSE_Sign1 and extensibility of COSE Header Parameters are prerequisites for implementing the interoperable message layer included in this document.</t>
      <t>In summary, this specification supports relying parties obtaining proof that signed statements were recorded and checked for their validity at the time they were registered.
How these statements are managed or stored is out-of-scope of this document.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-software-supply-chain-scope">
      <name>Software Supply Chain Scope</name>
      <t>To illustrate the applicability of the SCITT architecture and its messages, this section details the exemplary context of software supply chain (SSC) use cases.
The building blocks provided by the SCITT architecture are not restricted to software supply chain use cases.
Software supply chains serve as a useful application guidance and first usage scenario.</t>
      <section anchor="sec-generic-ssc-problem-statement">
        <name>Generic SSC Problem Statement</name>
        <t>Supply chain security is a prerequisite to protecting consumers and minimizing economic, public health, and safety threats.
Supply chain security has historically focused on risk management practices to safeguard logistics, meet regulatory requirements, forecast demand, and optimize inventory.
While these elements are foundational to a healthy supply chain, an integrated cyber security-based perspective of the software supply chains remains broadly undefined.
Recently, the global community has experienced numerous supply chain attacks targeting weaknesses in software supply chains.
As illustrated in <xref target="lifecycle-threats"/>, a software supply chain attack may leverage one or more life-cycle stages and directly or indirectly target the component.</t>
        <figure anchor="lifecycle-threats">
          <name>Example SSC Life-Cycle Threats</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="520" viewBox="0 0 520 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,80 L 8,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 8,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 8,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,720" fill="none" stroke="black"/>
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 56,144 L 56,176" fill="none" stroke="black"/>
                <path d="M 56,240 L 56,272" fill="none" stroke="black"/>
                <path d="M 56,336 L 56,368" fill="none" stroke="black"/>
                <path d="M 56,432 L 56,464" fill="none" stroke="black"/>
                <path d="M 56,528 L 56,560" fill="none" stroke="black"/>
                <path d="M 56,624 L 56,656" fill="none" stroke="black"/>
                <path d="M 104,80 L 104,144" fill="none" stroke="black"/>
                <path d="M 104,176 L 104,240" fill="none" stroke="black"/>
                <path d="M 104,272 L 104,336" fill="none" stroke="black"/>
                <path d="M 104,368 L 104,432" fill="none" stroke="black"/>
                <path d="M 104,464 L 104,528" fill="none" stroke="black"/>
                <path d="M 104,560 L 104,624" fill="none" stroke="black"/>
                <path d="M 104,656 L 104,720" fill="none" stroke="black"/>
                <path d="M 8,80 L 104,80" fill="none" stroke="black"/>
                <path d="M 8,144 L 104,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 104,176" fill="none" stroke="black"/>
                <path d="M 8,240 L 104,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 104,272" fill="none" stroke="black"/>
                <path d="M 8,336 L 104,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 104,368" fill="none" stroke="black"/>
                <path d="M 8,432 L 104,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 104,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 104,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 104,560" fill="none" stroke="black"/>
                <path d="M 8,624 L 104,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 104,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 104,720" fill="none" stroke="black"/>
                <g class="text">
                  <text x="60" y="36">Dependencies</text>
                  <text x="208" y="36">Malicious</text>
                  <text x="288" y="36">3rd-party</text>
                  <text x="360" y="36">package</text>
                  <text x="404" y="36">or</text>
                  <text x="448" y="36">version</text>
                  <text x="52" y="116">Code</text>
                  <text x="212" y="116">Compromise</text>
                  <text x="284" y="116">source</text>
                  <text x="344" y="116">control</text>
                  <text x="208" y="196">Malicious</text>
                  <text x="284" y="196">plug-ins</text>
                  <text x="52" y="212">Commit</text>
                  <text x="208" y="212">Malicious</text>
                  <text x="276" y="212">commit</text>
                  <text x="196" y="292">Modify</text>
                  <text x="248" y="292">build</text>
                  <text x="296" y="292">tasks</text>
                  <text x="332" y="292">or</text>
                  <text x="360" y="292">the</text>
                  <text x="400" y="292">build</text>
                  <text x="472" y="292">environment</text>
                  <text x="56" y="308">Build</text>
                  <text x="196" y="308">Poison</text>
                  <text x="240" y="308">the</text>
                  <text x="280" y="308">build</text>
                  <text x="364" y="308">agent/compiler</text>
                  <text x="196" y="324">Tamper</text>
                  <text x="244" y="324">with</text>
                  <text x="288" y="324">build</text>
                  <text x="336" y="324">cache</text>
                  <text x="212" y="388">Compromise</text>
                  <text x="276" y="388">test</text>
                  <text x="320" y="388">tools</text>
                  <text x="60" y="404">Test</text>
                  <text x="224" y="404">Falsification</text>
                  <text x="292" y="404">of</text>
                  <text x="324" y="404">test</text>
                  <text x="376" y="404">results</text>
                  <text x="184" y="484">Use</text>
                  <text x="216" y="484">bad</text>
                  <text x="268" y="484">packages</text>
                  <text x="56" y="500">Package</text>
                  <text x="212" y="500">Compromise</text>
                  <text x="288" y="500">package</text>
                  <text x="364" y="500">repository</text>
                  <text x="196" y="580">Modify</text>
                  <text x="256" y="580">release</text>
                  <text x="312" y="580">tasks</text>
                  <text x="56" y="596">Release</text>
                  <text x="196" y="596">Modify</text>
                  <text x="248" y="596">build</text>
                  <text x="292" y="596">drop</text>
                  <text x="336" y="596">prior</text>
                  <text x="372" y="596">to</text>
                  <text x="416" y="596">release</text>
                  <text x="52" y="692">Deploy</text>
                  <text x="196" y="692">Tamper</text>
                  <text x="244" y="692">with</text>
                  <text x="308" y="692">versioning</text>
                  <text x="368" y="692">and</text>
                  <text x="412" y="692">update</text>
                  <text x="472" y="692">process</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
      Dependencies        Malicious 3rd-party package or version
           |
           |
     +-----+-----+
     |           |
     |   Code    |        Compromise source control
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Malicious plug-ins
     |  Commit   |        Malicious commit
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify build tasks or the build environment
     |   Build   |        Poison the build agent/compiler
     |           |        Tamper with build cache
     +-----+-----+
           |
     +-----+-----+
     |           |        Compromise test tools
     |    Test   |        Falsification of test results
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Use bad packages
     |  Package  |        Compromise package repository
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify release tasks
     |  Release  |        Modify build drop prior to release
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |
     |  Deploy   |        Tamper with versioning and update process
     |           |
     +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>DevSecOps often depends on third-party and open-source software.
These dependencies can be quite complex throughout the supply chain, so checking provenance and traceability throughout their lifecycle is difficult.
There is a need for manageable auditability and accountability of digital products.
Typically, the range of types of statements about digital products (and their dependencies) is vast, heterogeneous, and can differ between community policy requirements.
Taking the type and structure of all statements about digital and products into account might not be possible.
Examples of statements may include commit signatures, build environment and parameters, software bill of materials, static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.
In consequence, instead of trying to understand and describe the detailed syntax and semantics of every type of statement about digital products, the SCITT architecture focuses on ensuring statement authenticity, visibility/transparency, and intends to provide scalable accessibility.
Threats and practical issues can also arise from unintended side-effects of using security techniques outside their proper bounds.
For instance digital signatures may fail to verify past their expiry date even though the signed item itself remains completely valid.
Or a signature may verify even though the information it is securing is now found unreliable but fine-grained revocation is too hard.</t>
        <t>Lastly, where data exchange underpins serious business decision-making, it is important to hold the producers of those data to a higher standard of accountability.
The SCITT architecture provides mechanisms and structures for ensuring that the makers of authoritative statements can be held accountable and not hide or shred the evidence when it becomes inconvenient later.</t>
        <t>The following use cases illustrate the scope of SCITT and elaborate on the generic problem statement above.</t>
      </section>
      <section anchor="sec-eclectic-ssc-use-cases">
        <name>Eclectic SSC Use Cases</name>
        <t>The three following use cases are a specialization derived from the generic problem statement above.</t>
        <section anchor="sec-security-analysis-of-a-software-product">
          <name>Security Analysis of a Software Product</name>
          <t>A released software product is often accompanied by a set of complementary statements about its security properties.
This gives enough confidence to both producers and consumers that the released software meets the expected security standards and is suitable to use.</t>
          <t>Subsequently, multiple security researchers often run sophisticated security analysis tools on the same product.
The intention is to identify any security weaknesses or vulnerabilities in the package.</t>
          <t>Initially, a particular analysis can identify a simple weakness in a software component.
Over a period of time, a statement from a third-party illustrates that the weakness is exposed in a way that represents an exploitable vulnerability.
The producer of the software product provides a statement that confirms the linking of a software component vulnerability with the software product by issuing a product vulnerability disclosure report and also issues an advisory statement on how to mitigate the vulnerability.
At first, the producer provides an updated software product that still uses the vulnerable software component but shields the issue in a fashion that inhibits exploitation.
Later, a second update of the software product includes a security patch to the affected software component from the software producer.
Finally, a third update includes a new release (updated version) of the formerly insecure software component.
For this release, both the software product and the affected software component are deemed secure by the producer and consumers.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>know where to get these security statements from producers and third-parties related to the software product in a timely and unambiguous fashion</li>
            <li>attribute them to an authoritative issuer</li>
            <li>associate the statements in a meaningful manner via a set of well-known semantic relationships</li>
            <li>consistently, efficiently, and homogeneously check their authenticity</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>know the various sources of statements</li>
            <li>express the provenance and historicity of statements</li>
            <li>relate and link various heterogeneous statements in a simple fashion</li>
            <li>check that the statement comes from a source with authority to issue that statement</li>
            <li>confirm that sources provide a complete history of statements related to a given component</li>
          </ul>
        </section>
        <section anchor="sec-promotion-of-a-software-component-by-multiple-entities">
          <name>Promotion of a Software Component by Multiple Entities</name>
          <t>A software component (e.g., a library or software product), open-source or commercial, is often initially released by a single trusted producer, who can choose to attach a statement of authenticity to it.
As that component becomes used in a growing range of other products, providers other than the original trusted producer often re-distribute, or release their own version of that component.</t>
          <t>Some providers include it as part of their release product/package bundle and provide the package with proof of authenticity using their issuer authority.
Some packages include the original statement of authenticity, and some do not.
Over time, some providers no longer offer the exact same software component source code but pre-compiled software component binaries.
Some sources do not provide the exact same software component, but include patches and fixes produced by third-parties, as these emerge faster than solutions from the original producer.
Due to complex distribution and promotion life-cycle scenarios, the original software component takes myriad forms.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>understand if a particular provider is a trusted originating producer or an alternative party</li>
            <li>know if and how the source, or resulting binary, of a promoted software component differs from the original software component</li>
            <li>check the provenance and history of a software component's source back to its origin</li>
            <li>assess whether to trust a component or product based on a downloaded package location and source supplier</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>reliably discern if a provider is the original, trusted producer or is a trustworthy alternative provider or is an illegitimate provider</li>
            <li>track the provenance path from an original producer to a particular provider</li>
            <li>check the trustworthiness of a provider</li>
            <li>check the integrity of modifications or transformations applied by a provider</li>
          </ul>
        </section>
        <section anchor="sec-software-integrator-assembling-a-software-product-for-an-autonomous-vehicle">
          <name>Software Integrator Assembling a Software Product for an Autonomous Vehicle</name>
          <t>Software Integration is a complex activity.
This typically involves getting various software components from multiple suppliers, producing an integrated package deployed as part of device assembly.
For example, car manufacturers source integrated software for their autonomous vehicles from third parties that integrate software components from various sources.
Integration complexity creates a higher risk of security vulnerabilities to the delivered software.</t>
          <t>Consumers of integrated software want:</t>
          <ul spacing="normal">
            <li>a list of all components present in a software product</li>
            <li>the ability to identify and retrieve all components from a secure and tamper-proof location</li>
            <li>verifiable proofs on build process and build environment with all supplier tiers to ensure end to end build quality and security</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated software at both component and product level before installation</li>
            <li>provide valid annotations on build integrity to ensure conformance</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, which are used throughout this document.
When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="STD96"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl anchor="mybody">
        <dt>Append-only Log:</dt>
        <dd>
          <t>a Statement Sequence comprising the entire registration history of the Transparency Service.
To make the Append-only property verifiable and transparent, the Transparency Service defines how Signed Statements are made available to Auditors.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements, or the transparent Statement Sequence, issued by a Transparency Service.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where a Transparency Service provides inconsistent proofs to Relying Parties, containing conflicting claims about the Signed Statement bound at a given position in the Verifiable Data Structure.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where all proofs provided by the Transparency Service to Relying Parties are produced from a Single Verifiable Data Structure describing a unique sequence of Signed Statements and are therefore consistent.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Verifiable Data Structure.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for implementations
Receipts are signed proofs of verifiable data-structure properties.
The types of Receipts <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other proof types, such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Verifiable Data Structure, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>a Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a relevant media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version, or any content an Issuer wishes to publish about an Artifact.
Additional Statements about an Artifact are correlated by the Subject Claim as defined in the IANA CWT <xref target="IANA.cwt"/> registry and used as a protected header parameter as defined in <xref target="RFC9597"/>.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Statement Sequence:</dt>
        <dd>
          <t>a sequence of Signed Statements captured by a Verifiable Data Structure.
See Verifiable Data Structure.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, which represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Verifiable Data Structure and endorses its state.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure which supports one or more proof types, such as "inclusion proofs" or "consistency proofs", for Signed Statements as they are Registered to a Transparency Service.
SCITT supports multiple Verifiable Data Structures and Receipt formats as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, accommodating different Transparency Service implementations.</t>
        </dd>
      </dl>
      <section anchor="sec-common-terminology-disambiguation">
        <name>Common Terminology Disambiguation</name>
        <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups.</t>
        <t>This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
        <t>The terms "Claim" as used in this document is consistent with the usage in <xref target="RFC9711"/> and <xref target="RFC7523"/>.</t>
        <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."</t>
        <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="NIST_EO14028"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.".</t>
        <t>It is often useful for the intended audience to qualify the term "attestation" in their specific context to avoid confusion and ambiguity.</t>
      </section>
    </section>
    <section anchor="sec-definition-of-transparency">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.
SCITT supports multiple Verifiable Data Structures, as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the Verifiable Data Structure of a Transparency Service.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their registered sequence of Signed Statements and Verifiable Data Structure using a combination of trusted hardware, consensus protocols, and cryptographic evidence.
A Receipt is a signature over one or more Verifiable Data Structure Proofs that a Signed Statement is registered in the Verifiable Data Structure.
It is universally verifiable without online access to the TS.
Requesting a Receipt can result in the production of a new Receipt for the same Signed Statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Verifiable Data Structure, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency (CT) <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>CAs (Issuers) sign the ASN.1 DER encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</li>
        <li>CAs submit the certificates to one or more CT logs (Transparency Services)</li>
        <li>CT logs produce Signed Certificate Timestamps (Transparent Statements)</li>
        <li>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</li>
        <li>The Verifiable Data Structure can be checked by Auditors</li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture enables a loose federation of Transparency Services, by providing a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
The remaining details of the Receipt's contents are specified in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a Transparency Service independent of any one use case:</t>
      <ul spacing="normal">
        <li>Issuers that use their credentials to create Signed Statements about Artifacts</li>
        <li>Transparency Services that evaluate Signed Statements against Registration Policies, producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</li>
            <li>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g. verification);</li>
            <li>or replay all the Transparent Statements to check for the consistency and correctness of the Transparency Service's Verifiable Data Structure (e.g. auditing)</li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple Transparency Services and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more Transparency Service.
Each Transparency Service produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple Transparency Services.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="536" viewBox="0 0 536 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,448 L 32,480" fill="none" stroke="black"/>
              <path d="M 40,352 L 40,368" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,200" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,328" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,408" fill="none" stroke="black"/>
              <path d="M 120,288 L 120,328" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 152,352 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,448 L 160,480" fill="none" stroke="black"/>
              <path d="M 208,272 L 208,288" fill="none" stroke="black"/>
              <path d="M 216,464 L 216,496" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,320" fill="none" stroke="black"/>
              <path d="M 224,384 L 224,408" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,144" fill="none" stroke="black"/>
              <path d="M 288,272 L 288,288" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,88" fill="none" stroke="black"/>
              <path d="M 304,304 L 304,320" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,272" fill="none" stroke="black"/>
              <path d="M 344,384 L 344,408" fill="none" stroke="black"/>
              <path d="M 344,464 L 344,496" fill="none" stroke="black"/>
              <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
              <path d="M 384,176 L 384,200" fill="none" stroke="black"/>
              <path d="M 384,448 L 384,480" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,88" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,64" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,200" fill="none" stroke="black"/>
              <path d="M 440,336 L 440,360" fill="none" stroke="black"/>
              <path d="M 440,376 L 440,408" fill="none" stroke="black"/>
              <path d="M 472,208 L 472,272" fill="none" stroke="black"/>
              <path d="M 488,256 L 488,336" fill="none" stroke="black"/>
              <path d="M 504,160 L 504,352" fill="none" stroke="black"/>
              <path d="M 512,448 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 288,32 L 408,32" fill="none" stroke="black"/>
              <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
              <path d="M 288,64 L 408,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 384,96 L 472,96" fill="none" stroke="black"/>
              <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
              <path d="M 240,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 368,128 L 456,128" fill="none" stroke="black"/>
              <path d="M 448,144 L 488,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 304,160 L 368,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 128,224 L 336,224" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 272,256" fill="none" stroke="black"/>
              <path d="M 472,256 L 488,256" fill="none" stroke="black"/>
              <path d="M 136,272 L 208,272" fill="none" stroke="black"/>
              <path d="M 296,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 472,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 272,304" fill="none" stroke="black"/>
              <path d="M 200,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 56,336 L 136,336" fill="none" stroke="black"/>
              <path d="M 240,336 L 288,336" fill="none" stroke="black"/>
              <path d="M 368,336 L 488,336" fill="none" stroke="black"/>
              <path d="M 152,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 360,368 L 488,368" fill="none" stroke="black"/>
              <path d="M 56,384 L 136,384" fill="none" stroke="black"/>
              <path d="M 24,416 L 176,416" fill="none" stroke="black"/>
              <path d="M 200,416 L 368,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 8,448 L 160,448" fill="none" stroke="black"/>
              <path d="M 368,448 L 512,448" fill="none" stroke="black"/>
              <path d="M 176,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 32,480 L 160,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 216,496 L 344,496" fill="none" stroke="black"/>
              <path d="M 8,448 L 24,416" fill="none" stroke="black"/>
              <path d="M 240,128 L 256,96" fill="none" stroke="black"/>
              <path d="M 160,448 L 176,416" fill="none" stroke="black"/>
              <path d="M 328,128 L 344,96" fill="none" stroke="black"/>
              <path d="M 176,464 L 200,416" fill="none" stroke="black"/>
              <path d="M 368,128 L 384,96" fill="none" stroke="black"/>
              <path d="M 456,128 L 472,96" fill="none" stroke="black"/>
              <path d="M 344,464 L 368,416" fill="none" stroke="black"/>
              <path d="M 368,448 L 384,416" fill="none" stroke="black"/>
              <path d="M 512,448 L 528,416" fill="none" stroke="black"/>
              <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
              <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
              <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
              <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
              <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
              <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
              <path d="M 448,144 C 439.16936,144 432,136.83064 432,128" fill="none" stroke="black"/>
              <path d="M 488,144 C 496.83064,144 504,151.16936 504,160" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 304,160 C 295.16936,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 368,160 C 376.83064,160 384,167.16936 384,176" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 344,240 C 335.16936,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 224,256 C 215.16936,256 208,263.16936 208,272" fill="none" stroke="black"/>
              <path d="M 272,256 C 280.83064,256 288,263.16936 288,272" fill="none" stroke="black"/>
              <path d="M 136,272 C 127.16936,272 120,279.16936 120,288" fill="none" stroke="black"/>
              <path d="M 312,272 C 320.83064,272 328,264.83064 328,256" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 168,288 C 176.83064,288 184,295.16936 184,304" fill="none" stroke="black"/>
              <path d="M 288,288 C 296.83064,288 304,295.16936 304,304" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 272,304 C 280.83064,304 288,296.83064 288,288" fill="none" stroke="black"/>
              <path d="M 200,320 C 191.16936,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 56,336 C 47.16936,336 40,343.16936 40,352" fill="none" stroke="black"/>
              <path d="M 136,336 C 144.83064,336 152,343.16936 152,352" fill="none" stroke="black"/>
              <path d="M 240,336 C 231.16936,336 224,328.83064 224,320" fill="none" stroke="black"/>
              <path d="M 288,336 C 296.83064,336 304,328.83064 304,320" fill="none" stroke="black"/>
              <path d="M 208,368 C 216.83064,368 224,375.16936 224,384" fill="none" stroke="black"/>
              <path d="M 360,368 C 351.16936,368 344,375.16936 344,384" fill="none" stroke="black"/>
              <path d="M 488,368 C 496.83064,368 504,360.83064 504,352" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,376.83064 40,368" fill="none" stroke="black"/>
              <path d="M 136,384 C 144.83064,384 152,376.83064 152,368" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="448,408 436,402.4 436,413.6 " fill="black" transform="rotate(90,440,408)"/>
              <path class="jump" d="M 440,376 C 446,376 446,360 440,360" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="440,200 428,194.4 428,205.6 " fill="black" transform="rotate(90,432,200)"/>
              <polygon class="arrowhead" points="400,88 388,82.4 388,93.6 " fill="black" transform="rotate(90,392,88)"/>
              <polygon class="arrowhead" points="392,200 380,194.4 380,205.6 " fill="black" transform="rotate(90,384,200)"/>
              <polygon class="arrowhead" points="352,408 340,402.4 340,413.6 " fill="black" transform="rotate(90,344,408)"/>
              <polygon class="arrowhead" points="344,224 332,218.4 332,229.6 " fill="black" transform="rotate(0,336,224)"/>
              <polygon class="arrowhead" points="320,320 308,314.4 308,325.6 " fill="black" transform="rotate(180,312,320)"/>
              <polygon class="arrowhead" points="312,88 300,82.4 300,93.6 " fill="black" transform="rotate(90,304,88)"/>
              <polygon class="arrowhead" points="304,272 292,266.4 292,277.6 " fill="black" transform="rotate(180,296,272)"/>
              <polygon class="arrowhead" points="232,408 220,402.4 220,413.6 " fill="black" transform="rotate(90,224,408)"/>
              <polygon class="arrowhead" points="128,328 116,322.4 116,333.6 " fill="black" transform="rotate(90,120,328)"/>
              <polygon class="arrowhead" points="104,408 92,402.4 92,413.6 " fill="black" transform="rotate(90,96,408)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6 " fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="80,328 68,322.4 68,333.6 " fill="black" transform="rotate(90,72,328)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6 " fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,88 52,82.4 52,93.6 " fill="black" transform="rotate(90,56,88)"/>
              <g class="text">
                <text x="60" y="52">Artifact</text>
                <text x="348" y="52">Issuer</text>
                <text x="56" y="116">Statement</text>
                <text x="292" y="116">sign</text>
                <text x="420" y="116">verify</text>
                <text x="68" y="228">Signed</text>
                <text x="404" y="228">Transparency</text>
                <text x="72" y="244">Statement</text>
                <text x="400" y="260">Service</text>
                <text x="248" y="276">Receipt</text>
                <text x="428" y="292">Transparency</text>
                <text x="264" y="324">Receipt</text>
                <text x="424" y="324">Service</text>
                <text x="96" y="356">Transparent</text>
                <text x="96" y="372">Statement</text>
                <text x="56" y="436">Collect</text>
                <text x="124" y="436">Receipts</text>
                <text x="228" y="436">Verify</text>
                <text x="304" y="436">Transparent</text>
                <text x="428" y="436">Replay</text>
                <text x="472" y="436">Log</text>
                <text x="272" y="452">Statement</text>
                <text x="72" y="468">Relying</text>
                <text x="128" y="468">Party</text>
                <text x="424" y="468">Relying</text>
                <text x="480" y="468">Party</text>
                <text x="256" y="484">Relying</text>
                <text x="312" y="484">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 .----------.                      +--------------+
|  Artifact  |                     |    Issuer    |
 '----+-----'                      +-+----------+-+
      v                              v          v
 .----+----.                   .-----+----.    .+---------.
| Statement |                 /   sign   /    /  verify  /
 '----+----'                 '-----+----+    '-------+--+
      |                            |                 |'------.
      |    .----------------------' '---------.      |        |
      |   |                                    |     |        |
      v   v                                    v     v        |
 .----+---+---.                           +----+----+-----+   |
|    Signed    +------------------------->+ Transparency  |   |
|   Statement  |                         .+               |   |
 '------+-----'           .-------.     | |   Service     +-+ |
        |      .---------+ Receipt +<--'  +--+------------+ | |
        |     |.-----.   |         +.        | Transparency | |
        |     |       |   '+------'  |       |              | |
        v     v        '---+ Receipt +<------+   Service    | |
     .--+-----+--.          '-------'        +--------+-----+ |
    | Transparent |                                   |       |
    |  Statement  +-------.                .----------)------'
     '-----+-----'         |              |           |
           v               v              v           v
  .--------+---------.  .--+--------------+--. .------+----------.
 / Collect Receipts /  / Verify Transparent / /   Replay Log    /
'--+---------------+  /      Statement     / '-+---------------+
   | Relying Party | '----+---------------+    | Relying Party |
   +---------------+      | Relying Party |    +---------------+
                          +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely Transparency Service, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature a Verifiable Data Structure.
The Verifiable Data Structure records registered Signed Statements and supports the production of Receipts.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example.</tt> may have a distinct Issuer identity for each sub domain, such as <tt>tenant1.ts.example.</tt> and <tt>tenant2.ts.example.</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is registered to the Verifiable Data Structure.
To enable audit-ability, Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.</t>
          <t>Beyond the mandatory Registration checks, the scope of additional checks, including no additional checks, is up to the implementation.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="STD96"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>) in order to check the signatures of Signed Statements, either separately, or inside Registration Policies.
Transparency Services <bcp14>MUST</bcp14> authenticate Signed Statements as part of a Registration Policy.
For instance, a trust anchor could be an X.509 root certificate (directly or its thumbprint), a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.</t>
            <t>When using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates currently registered as a trust anchor by the Transparency Service.
The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made Transparent and available to all Relying Parties of the Transparency Service by Registering them as Signed Statements on the Verifiable Data Structure.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently committed to the Verifiable Data Structure at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>Pre-configured Registration Policy and trust anchors;</li>
            <li>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</li>
            <li>An out-of-band authenticated management interface</li>
          </ul>
        </section>
        <section anchor="sec-verifiable-data-structure">
          <name>Verifiable Data Structure</name>
          <t>The security properties are determined by the choice of the Verifiable Data Structure (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) used by the Transparency Service implementation.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>a property required for a verifiable data structure to be applicable to SCITT, ensuring that the Statement Sequence cannot be modified, deleted, or reordered.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the registered sequence of Signed Statements accepted by the Transparency Service and committed to the Verifiable Data Structure.
Everyone with access to its content sees the same ordered collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Verifiable Data Structure includes sufficient information to enable authorized actors with access to its content to check that each data structure representing each Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non-inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that supports a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
    </section>
    <section anchor="signed-statements">
      <name>Signed Statements</name>
      <t>This specification prioritizes conformance to <xref target="STD96"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissibility of conforming messages.
This specification is left intentionally open to allow implementations to make Registration restrictions that make the most sense for their operational use cases.</t>
      <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
      <ul spacing="normal">
        <li>
          <xref target="CoSWID"/></li>
        <li>
          <xref target="CycloneDX"/></li>
        <li>
          <xref target="in-toto"/></li>
        <li>
          <xref target="SPDX-CBOR"/></li>
        <li>
          <xref target="SPDX-JSON"/></li>
        <li>
          <xref target="SLSA"/></li>
        <li>
          <xref target="SWID"/></li>
      </ul>
      <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.</t>
      <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
      <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header) for different Artifacts or sign all Signed Statements under the same key.</t>
      <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
      <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
      <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
      <t>Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
      <ul spacing="normal">
        <li>When using x.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</li>
        <li>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</li>
      </ul>
      <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, <tt>iss</tt> <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in length.</t>
      <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out-of-scope of this document.</t>
      <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="RFC9597"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
      <t>A Receipt is a Signed Statement, (COSE_Sign1), with additional Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <section anchor="sec-signed-statement-examples">
        <name>Signed Statement Examples</name>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition <xref target="RFC8610"/> for the protected header and unprotected header of Signed Statements and Receipts.</t>
        <t>The SCITT architecture specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl">
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &amp;(CWT_Claims: 15) =&gt; CWT_Claims
  ? &amp;(alg: 1) =&gt; int
  ? &amp;(content_type: 3) =&gt; tstr / uint
  ? &amp;(kid: 4) =&gt; bstr
  ? &amp;(x5t: 34) =&gt; COSE_CertHash
  * int =&gt; any
}

CWT_Claims = {
  &amp;(iss: 1) =&gt; tstr
  &amp;(sub: 2) =&gt; tstr
  * int =&gt; any
}

Unprotected_Header = {
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  ? &amp;(receipts: 394)  =&gt; [+ Receipt]
  * int =&gt; any
}
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
          <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1      /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag">
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}
</sourcecode>
        </figure>
      </section>
      <section anchor="sec-signing-large-or-sensitive-statements">
        <name>Signing Large or Sensitive Statements</name>
        <t>Statements payloads might be too large or too sensitive to be sent to a remote Transparency Service.
In these cases a Statement can be made over the hash of a payload, rather than the full payload bytes.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
              <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
              <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
              <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
              <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
              <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
              <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
              <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
              <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
              <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
              <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
              <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
              <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
              <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
              <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
              <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
              <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
              <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
              <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
              <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
              <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
              <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
              <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
              <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
              <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
              <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
              <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
              <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
              <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
              <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
              <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
              <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
              <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
              <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
              <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
              <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
              <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
              <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
              <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
              <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
              <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
              <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
              <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
              <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
              <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
              <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
              <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
              <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
              <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
              <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
              <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
              <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
              <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
              <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
              <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
              <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
              <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
              <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
              <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
              <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
              <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
              <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
              <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
              <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
              <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
              <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
              <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
              <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
              <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
              <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="336,584 324,578.4 324,589.6 " fill="black" transform="rotate(90,328,584)"/>
              <polygon class="arrowhead" points="280,584 268,578.4 268,589.6 " fill="black" transform="rotate(90,272,584)"/>
              <polygon class="arrowhead" points="280,520 268,514.4 268,525.6 " fill="black" transform="rotate(90,272,520)"/>
              <polygon class="arrowhead" points="248,176 236,170.4 236,181.6 " fill="black" transform="rotate(0,240,176)"/>
              <polygon class="arrowhead" points="176,176 164,170.4 164,181.6 " fill="black" transform="rotate(0,168,176)"/>
              <polygon class="arrowhead" points="152,624 140,618.4 140,629.6 " fill="black" transform="rotate(180,144,624)"/>
              <polygon class="arrowhead" points="64,680 52,674.4 52,685.6 " fill="black" transform="rotate(90,56,680)"/>
              <polygon class="arrowhead" points="64,584 52,578.4 52,589.6 " fill="black" transform="rotate(90,56,584)"/>
              <polygon class="arrowhead" points="64,456 52,450.4 52,461.6 " fill="black" transform="rotate(270,56,456)"/>
              <polygon class="arrowhead" points="64,104 52,98.4 52,109.6 " fill="black" transform="rotate(90,56,104)"/>
              <polygon class="arrowhead" points="48,200 36,194.4 36,205.6 " fill="black" transform="rotate(90,40,200)"/>
              <g class="text">
                <text x="76" y="52">Artifact</text>
                <text x="60" y="132">Hash</text>
                <text x="196" y="180">OR</text>
                <text x="296" y="180">Payload</text>
                <text x="72" y="228">Statement</text>
                <text x="104" y="292">...</text>
                <text x="164" y="292">Producer</text>
                <text x="232" y="292">Network</text>
                <text x="280" y="292">...</text>
                <text x="192" y="324">...</text>
                <text x="104" y="356">...</text>
                <text x="164" y="356">Issuer</text>
                <text x="224" y="356">Network</text>
                <text x="272" y="356">...</text>
                <text x="52" y="420">Identity</text>
                <text x="168" y="420">(iss,</text>
                <text x="212" y="420">x5t)</text>
                <text x="52" y="436">Document</text>
                <text x="48" y="500">Private</text>
                <text x="96" y="500">Key</text>
                <text x="268" y="548">Header</text>
                <text x="76" y="628">Sign</text>
                <text x="220" y="628">To</text>
                <text x="244" y="628">Be</text>
                <text x="284" y="628">Signed</text>
                <text x="336" y="628">Bytes</text>
                <text x="36" y="708">COSE</text>
                <text x="76" y="708">Sign</text>
                <text x="104" y="708">1</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
        </artset>
      </section>
      <section anchor="sec-registration-of-signed-statements">
        <name>Registration of Signed Statements</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1">
          <li>
            <strong>Client authentication:</strong> A Client authenticates with the Transparency Service before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation-specific and out of scope of the SCITT architecture.</li>
          <li>
            <strong>TS Signed Statement Verification and Validation:</strong> The Transparency Service <bcp14>MUST</bcp14> perform signature verification per <xref section="4.4" sectionFormat="of" target="STD96"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The Transparency Service <bcp14>MUST</bcp14> also check the Signed Statement includes the required protected headers.
The Transparency Service <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain specific registration policies that apply to specific content types.</li>
          <li>
            <strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope and may use information contained in the attributes of named policies.</li>
          <li>
            <strong>Register the Signed Statement</strong></li>
          <li>
            <strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the Verifiable Data Structure.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>A Transparency Service <bcp14>MAY</bcp14> accept a Signed Statement with content in its unprotected header, and <bcp14>MAY</bcp14> use values from that unprotected header during verification and registration policy evaluation.</t>
        <t>However, the unprotected header of a Signed Statement <bcp14>MUST</bcp14> be set to an empty map before the Signed Statement can be included in a Statement Sequence.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
        <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      </section>
    </section>
    <section anchor="Receipt">
      <name>Transparent Statements</name>
      <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
      <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
      <t>Receipts are based on Signed Inclusion Proofs as described in COSE Receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> that also provides the COSE header parameter semantics for label 394.</t>
      <t>The Registration time is recorded as the timestamp when the Transparency Service added the Signed Statement to its Verifiable Data Structure.</t>
      <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.
See <xref target="fig-signed-statement-cddl"/> for the CDDL rule that defines 'COSE_Sign1' as specified in <xref section="4.2" sectionFormat="of" target="STD96"/></t>
      <figure anchor="fig-transparent-statement-cddl">
        <name>CDDL definition for a Transparent Statement</name>
        <sourcecode type="cddl">
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ Receipt]
}
</sourcecode>
      </figure>
      <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
      <figure anchor="fig-transparent-statement-edn">
        <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        394:   [                    / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Per the COSE Verifiable Data Structure Registry documented in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, the COSE key type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
      <figure anchor="fig-receipt-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-protected-header-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
        <sourcecode type="cbor-diag">
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Verifiable Data Structure was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-inclusion-proof-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
        <sourcecode type="cbor-diag">
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]
</sourcecode>
      </figure>
      <section anchor="validation">
        <name>Validation</name>
        <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in <xref section="4.4" sectionFormat="of" target="STD96"/>, when checking the signature of Signed Statements and Receipts.</t>
        <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
        <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
        <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
        <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
        <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Interactions with Transparency Services are expected to use appropriately strong encryption and authorization technologies.</t>
      <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Issuers and Clients are responsible for verifying that the Transparency Service's privacy and security posture is suitable for the contents of the Signed Statements they submit prior to Registration.
Issuers must carefully review the inclusion of private, confidential, or personally identifiable information (PII) in their Statements against the Transparency Service's privacy posture.</t>
      <t>In some deployments a special role such as an Auditor might require and be given access to both the Transparency Service and related Adjacent Services.</t>
      <t>Transparency Services can leverage Verifiable Data Structures which only retain cryptographic metadata (e.g. a hash), rather than the complete Signed Statement, as part of a defense in depth approach to maintaining confidentiality.
By analyzing the relationship between data stored in the Transparency Service and data stored in Adjacent Services, it is possible to perform metadata analysis, which could reveal the order in which artifacts were built, signed, and uploaded.</t>
    </section>
    <section anchor="SecConSec">
      <name>Security Considerations</name>
      <t>SCITT provides the following security guarantees:</t>
      <ol spacing="normal" type="1">
        <li>Statements made by Issuers about supply chain Artifacts are identifiable and can be authenticated</li>
        <li>Statement provenance and history can be independently and consistently audited</li>
        <li>Issuers can efficiently prove that their Statement is logged by a Transparency Service</li>
      </ol>
      <t>The first guarantee is achieved by requiring Issuers to sign their Statements.
The second guarantee is achieved by proving a Signed Statement is present in a Verifiable Data Structure.
The third guarantee is achieved by the combination of both of these steps.</t>
      <t>In addition to deciding whether to trust a Transparency Service, Relying Parties can use the history of registered Signed Statements to decide which Issuers they choose to trust.
This decision process is out of scope of this document.</t>
      <section anchor="sec-ordering-of-signed-statements">
        <name>Ordering of Signed Statements</name>
        <t>Statements are signed prior to submitting to a SCITT Transparency service.
Unless advertised in the Transparency Service Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the Verifiable Data Structure matches the ordering of their issuance.</t>
      </section>
      <section anchor="sec-accuracy-of-statements">
        <name>Accuracy of Statements</name>
        <t>Issuers can make false Statements either intentionally or unintentionally, registering a Statement only proves it was produced by an Issuer.
A registered Statement may be superseded by a subsequently submitted Signed Statement from the same Issuer, with the same subject in the cwt_claims protected header.
Other Issuers may make new Statements to reflect new or corrected information.
Relying Parties may choose to include or exclude Statements from Issuers to determine the accuracy of a collection of Statements.</t>
      </section>
      <section anchor="sec-issuer-participation">
        <name>Issuer Participation</name>
        <t>Issuers can refuse to register their Statements with a Transparency Service, or selectively submit some but not all the Statements they issue.
It is important for Relying Parties not to accept Signed Statements for which they cannot discover Receipts issued by a Transparency Service they trust.</t>
      </section>
      <section anchor="sec-key-management">
        <name>Key Management</name>
        <t>Issuers and Transparency Services <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>carefully protect their private signing keys</li>
          <li>avoid using keys for more than one purpose</li>
          <li>rotate their keys in well-defined cryptoperiods, see <xref target="KEY-MANAGEMENT"/></li>
        </ul>
        <section anchor="sec-verifiable-data-structure-1">
          <name>Verifiable Data Structure</name>
          <t>The security considerations for specific Verifiable Data Structures are out of scope for this document.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for the generic security considerations that apply to Verifiable Data Structure and Receipts.</t>
        </section>
        <section anchor="sec-key-compromise">
          <name>Key Compromise</name>
          <t>Revocation strategies for compromised keys are out of scope for this document.
It is important for Issuers and Transparency Services to clearly communicate when keys are compromised, so that Signed Statements can be rejected by Transparency Services or Receipts can be ignored by Relying Parties.</t>
        </section>
        <section anchor="sec-bootstrapping">
          <name>Bootstrapping</name>
          <t>Bootstrapping mechanisms that solely rely on Statement registration to set and update registration policy can be audited without additional implementation-specific knowledge, and are therefore preferable.
Mechanisms that rely on pre-configured values and do not allow updates are unsuitable for use in long-lived service deployments, in which the ability to patch a potentially faulty policy is essential.</t>
        </section>
      </section>
      <section anchor="MediaTypeSecConSec">
        <name>Implications of Media-Type Usage</name>
        <t>The Statement (scitt-statement+cose) and Receipt (scitt-receipt+cose) media types describe the expected content of COSE envelope headers.
The payload media type ('content type') is included in the COSE envelope header.
<xref target="STD96"/> describes the security implications of reliance on this header parameter.</t>
      </section>
      <section anchor="sec-cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>Because the SCITT Architecture leverages <xref target="STD96"/> for Statements and Receipts, it benefits from the format's cryptographic agility.</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, Transparency Services, and Auditors) are either corrupt or compromised.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
Issuers and Transparency Services can both be compromised.</t>
        <t>The SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.
Running multiple, independent Transparency Services provides different organizations to represent consistent or divergent opinions.
It is the role of the relying party to decide which Transparency Services and Issuers they choose to trust for their scenario.</t>
        <t>In both cases, the SCITT architecture provides generic, universally-verifiable cryptographic proofs to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
So long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register:</t>
      <ul spacing="normal">
        <li>the media type application/scitt-statement+cose in the "Media Types" registry, see below.</li>
        <li>the media type application/scitt-receipt+cose in the "Media Types" registry, see below.</li>
      </ul>
      <section anchor="sec-cose-receipts-header-parameter">
        <name>COSE Receipts Header Parameter</name>
        <t>394 is requested in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> and has received an early assignment.</t>
      </section>
      <section anchor="sec-media-type-applicationscitt-statementcose-registration">
        <name>Media Type application/scitt-statement+cose Registration</name>
        <t>IANA is requested to add the following Media-Type to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="new-media-types-scitt-statement">
          <name>SCITT Signed Statement Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-statement+cose</td>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">
                <xref target="signed-statements"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>statement+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to provide an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.scitt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-media-type-applicationscitt-receiptcose-registration">
        <name>Media Type application/scitt-receipt+cose Registration</name>
        <table anchor="new-media-types-receipt">
          <name>SCITT Receipt Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-receipt+cose</td>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">
                <xref target="Receipt"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>receipt+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to establish or verify transparency over Statements. Typically emitted by a Transparency Service, for the benefit of Relying Parties wanting to ensure Non-equivocation over all or part of a Statement Sequence.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.receipt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/> in the 0-255 Range:</t>
        <table anchor="new-content-formats">
          <name>SCITT Content-Formats Registration</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">-</td>
              <td align="left">103</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">-</td>
              <td align="left">104</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <seriesInfo name="DOI" value="10.17487/RFC6838"/>
            <seriesInfo name="RFC" value="6838"/>
            <seriesInfo name="BCP" value="13"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <seriesInfo name="DOI" value="10.17487/RFC9360"/>
            <seriesInfo name="RFC" value="9360"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9597"/>
            <seriesInfo name="RFC" value="9597"/>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-15"/>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9711">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC9711"/>
            <seriesInfo name="RFC" value="9711"/>
            <author fullname="L. Lundblade" initials="L." surname="Lundblade"/>
            <author fullname="G. Mandyam" initials="G." surname="Mandyam"/>
            <author fullname="J. O'Donoghue" initials="J." surname="O'Donoghue"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>An Entity Attestation Token (EAT) provides an attested claims set that describes the state and characteristics of an entity, a device such as a smartphone, an Internet of Things (IoT) device, network equipment, or such. This claims set is used by a relying party, server, or service to determine the type and degree of trust placed in the entity.</t>
              <t>An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT) with attestation-oriented claims.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
            <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST_EO14028" target="https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf">
          <front>
            <title>Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="February" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <seriesInfo name="DOI" value="10.17487/RFC7523"/>
            <seriesInfo name="RFC" value="7523"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="BCP" value="225"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CoSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <seriesInfo name="DOI" value="10.17487/RFC9393"/>
            <seriesInfo name="RFC" value="9393"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="KEY-MANAGEMENT" target="https://csrc.nist.gov/pubs/sp/800/57/pt2/r1/final">
          <front>
            <title>NIST SP 800-57 Part 2 Rev. 1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Tradeverifyd</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@or13.io</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
      <contact initials="A." surname="Chamayou" fullname="Amaury Chamayou">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>amaury.chamayou@microsoft.com</email>
        </address>
      </contact>
      <t>Amaury contributed elemental parts to finalize normative language on registration behavior and the single-issuer design, as well as overall document consistency</t>
      <contact initials="D." surname="Brooks" fullname="Dick Brooks">
        <organization>Business Cyber Guardian (TM)</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>dick@businesscyberguardian.com</email>
        </address>
      </contact>
      <t>Dick contributed to the software supply chain use cases.</t>
      <contact initials="B." surname="Knight" fullname="Brian Knight">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>brianknight@microsoft.com</email>
        </address>
      </contact>
      <t>Brian contributed to the software supply chain use cases.</t>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <t>Robert contributed to the software supply chain use cases.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
