<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 2.5.1) -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-19" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-19"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft Research</organization>
      <address>
        <postal>
          <street>21 Station Road</street>
          <city>Cambridge</city>
          <code>CB1 2FB</code>
          <country>UK</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization/>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="01"/>
    <area>Security</area>
    <workgroup>SCITT</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 160?>

<t>Traceability in supply chains is a growing security concern.
While verifiable data structures have addressed specific issues, such as equivocation over digital certificates, they lack a universal architecture for all supply chains.
This document proposes a scalable architecture for single-issuer signed statement transparency applicable to any supply chain.
It ensures flexibility, interoperability between different transparency services, and compliance with various auditing procedures and regulatory requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 167?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document defines an architecture, a base set of extensible message structures, and associated flows to make signed content transparent via verifiable data structures maintained by corresponding transparency services.
The goal of the transparency enabled by the Supply Chain Integrity, Transparency, and Trust (SCITT) architecture is to enhance auditability and accountability for single-issuer signed content (statements) that are about supply chain commodities (artifacts).
Registering signed statements with a transparency service is akin to a notarization procedure.
Transparency services perform notary operations, confirming a policy is met before recording the statement on the ledger.
The SCITT ledger represents a linear and irrevocable history of statements made.
Once the signed statement is registered, the transparency service issues a receipt, just as a notary stamps the document being notarized.
Similar approaches have been implemented for specific classes of artifacts, such as Certificate Transparency <xref target="RFC9162"/>.
The SCITT approach follows a more generic paradigm than previous approaches.
This "content-agnostic" approach allows SCITT transparency services to be either integrated in existing solutions or to be an initial part of new emerging systems.
Extensibility is a vital feature of the SCITT architecture, so that requirements from various applications can be accommodated while always ensuring interoperability with respect to registration procedures and corresponding auditability and accountability.
For simplicity, the scope of this document is limited to use cases originating from the software supply chain domain, but the specification defined is applicable to any other type of supply chain statements (also referred to as value-add graphs), for example, statements about hardware supply chains.</t>
      <t>This document also defines message structures for signed statements and defines a profile for COSE receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, i.e., signed verifiable data structure proofs).
These message structures are based on the Concise Binary Object Representation Standard <xref target="STD94"/> and corresponding signing is facilitated via the CBOR Object Signing and Encryption Standard <xref target="STD96"/>.
The message structures are defined using the Concise Data Definition Language <xref target="RFC8610"/>.
The signed statements and receipts are based on the COSE_Sign1 specification in <xref section="4.2" sectionFormat="of" target="STD96"/>.
As these messages provide the foundation of any transparency service implementation for global and cross-domain application interoperability, they are based on complementary COSE specifications, mainly <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.
Therefore, support of COSE_Sign1 and extensibility of COSE Header Parameters are prerequisites for implementing the interoperable message layer included in this document.</t>
      <t>In summary, this specification supports relying parties obtaining proof that signed statements were recorded and checked for their validity at the time they were registered.
How these statements are managed or stored is out-of-scope of this document.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="sec-software-supply-chain-scope">
      <name>Software Supply Chain Scope</name>
      <t>To illustrate the applicability of the SCITT architecture and its messages, this section details the exemplary context of software supply chain (SSC) use cases.
The building blocks provided by the SCITT architecture are not restricted to software supply chain use cases.
Software supply chains serve as a useful application guidance and first usage scenario.</t>
      <section anchor="sec-generic-ssc-problem-statement">
        <name>Generic SSC Problem Statement</name>
        <t>Supply chain security is a prerequisite to protecting consumers and minimizing economic, public health, and safety threats.
Supply chain security has historically focused on risk management practices to safeguard logistics, meet regulatory requirements, forecast demand, and optimize inventory.
While these elements are foundational to a healthy supply chain, an integrated cyber security-based perspective of the software supply chains remains broadly undefined.
Recently, the global community has experienced numerous supply chain attacks targeting weaknesses in software supply chains.
As illustrated in <xref target="lifecycle-threats"/>, a software supply chain attack may leverage one or more life-cycle stages and directly or indirectly target the component.</t>
        <figure anchor="lifecycle-threats">
          <name>Example SSC Life-Cycle Threats</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="520" viewBox="0 0 520 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,80 L 8,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 8,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 8,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,720" fill="none" stroke="black"/>
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 56,144 L 56,176" fill="none" stroke="black"/>
                <path d="M 56,240 L 56,272" fill="none" stroke="black"/>
                <path d="M 56,336 L 56,368" fill="none" stroke="black"/>
                <path d="M 56,432 L 56,464" fill="none" stroke="black"/>
                <path d="M 56,528 L 56,560" fill="none" stroke="black"/>
                <path d="M 56,624 L 56,656" fill="none" stroke="black"/>
                <path d="M 104,80 L 104,144" fill="none" stroke="black"/>
                <path d="M 104,176 L 104,240" fill="none" stroke="black"/>
                <path d="M 104,272 L 104,336" fill="none" stroke="black"/>
                <path d="M 104,368 L 104,432" fill="none" stroke="black"/>
                <path d="M 104,464 L 104,528" fill="none" stroke="black"/>
                <path d="M 104,560 L 104,624" fill="none" stroke="black"/>
                <path d="M 104,656 L 104,720" fill="none" stroke="black"/>
                <path d="M 8,80 L 104,80" fill="none" stroke="black"/>
                <path d="M 8,144 L 104,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 104,176" fill="none" stroke="black"/>
                <path d="M 8,240 L 104,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 104,272" fill="none" stroke="black"/>
                <path d="M 8,336 L 104,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 104,368" fill="none" stroke="black"/>
                <path d="M 8,432 L 104,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 104,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 104,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 104,560" fill="none" stroke="black"/>
                <path d="M 8,624 L 104,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 104,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 104,720" fill="none" stroke="black"/>
                <g class="text">
                  <text x="60" y="36">Dependencies</text>
                  <text x="208" y="36">Malicious</text>
                  <text x="288" y="36">3rd-party</text>
                  <text x="360" y="36">package</text>
                  <text x="404" y="36">or</text>
                  <text x="448" y="36">version</text>
                  <text x="52" y="116">Code</text>
                  <text x="212" y="116">Compromise</text>
                  <text x="284" y="116">source</text>
                  <text x="344" y="116">control</text>
                  <text x="208" y="196">Malicious</text>
                  <text x="284" y="196">plug-ins</text>
                  <text x="52" y="212">Commit</text>
                  <text x="208" y="212">Malicious</text>
                  <text x="276" y="212">commit</text>
                  <text x="196" y="292">Modify</text>
                  <text x="248" y="292">build</text>
                  <text x="296" y="292">tasks</text>
                  <text x="332" y="292">or</text>
                  <text x="360" y="292">the</text>
                  <text x="400" y="292">build</text>
                  <text x="472" y="292">environment</text>
                  <text x="56" y="308">Build</text>
                  <text x="196" y="308">Poison</text>
                  <text x="240" y="308">the</text>
                  <text x="280" y="308">build</text>
                  <text x="364" y="308">agent/compiler</text>
                  <text x="196" y="324">Tamper</text>
                  <text x="244" y="324">with</text>
                  <text x="288" y="324">build</text>
                  <text x="336" y="324">cache</text>
                  <text x="212" y="388">Compromise</text>
                  <text x="276" y="388">test</text>
                  <text x="320" y="388">tools</text>
                  <text x="60" y="404">Test</text>
                  <text x="224" y="404">Falsification</text>
                  <text x="292" y="404">of</text>
                  <text x="324" y="404">test</text>
                  <text x="376" y="404">results</text>
                  <text x="184" y="484">Use</text>
                  <text x="216" y="484">bad</text>
                  <text x="268" y="484">packages</text>
                  <text x="56" y="500">Package</text>
                  <text x="212" y="500">Compromise</text>
                  <text x="288" y="500">package</text>
                  <text x="364" y="500">repository</text>
                  <text x="196" y="580">Modify</text>
                  <text x="256" y="580">release</text>
                  <text x="312" y="580">tasks</text>
                  <text x="56" y="596">Release</text>
                  <text x="196" y="596">Modify</text>
                  <text x="248" y="596">build</text>
                  <text x="292" y="596">drop</text>
                  <text x="336" y="596">prior</text>
                  <text x="372" y="596">to</text>
                  <text x="416" y="596">release</text>
                  <text x="52" y="692">Deploy</text>
                  <text x="196" y="692">Tamper</text>
                  <text x="244" y="692">with</text>
                  <text x="308" y="692">versioning</text>
                  <text x="368" y="692">and</text>
                  <text x="412" y="692">update</text>
                  <text x="472" y="692">process</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
      Dependencies        Malicious 3rd-party package or version
           |
           |
     +-----+-----+
     |           |
     |   Code    |        Compromise source control
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Malicious plug-ins
     |  Commit   |        Malicious commit
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify build tasks or the build environment
     |   Build   |        Poison the build agent/compiler
     |           |        Tamper with build cache
     +-----+-----+
           |
     +-----+-----+
     |           |        Compromise test tools
     |    Test   |        Falsification of test results
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Use bad packages
     |  Package  |        Compromise package repository
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify release tasks
     |  Release  |        Modify build drop prior to release
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |
     |  Deploy   |        Tamper with versioning and update process
     |           |
     +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>DevSecOps often depends on third-party and open-source software.
These dependencies can be quite complex throughout the supply chain, so checking provenance and traceability throughout their lifecycle is difficult.
There is a need for manageable auditability and accountability of digital products.
Typically, the range of types of statements about digital products (and their dependencies) is vast, heterogeneous, and can differ between community policy requirements.
Taking the type and structure of all statements about digital and products into account might not be possible.
Examples of statements may include commit signatures, build environment and parameters, software bill of materials, static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.
In consequence, instead of trying to understand and describe the detailed syntax and semantics of every type of statement about digital products, the SCITT architecture focuses on ensuring statement authenticity, visibility/transparency, and intends to provide scalable accessibility.
Threats and practical issues can also arise from unintended side-effects of using security techniques outside their proper bounds.
For instance digital signatures may fail to verify past their expiry date even though the signed item itself remains completely valid.
Or a signature may verify even though the information it is securing is now found unreliable but fine-grained revocation is too hard.</t>
        <t>Lastly, where data exchange underpins serious business decision-making, it is important to hold the producers of those data to a higher standard of accountability.
The SCITT architecture provides mechanisms and structures for ensuring that the makers of authoritative statements can be held accountable and not hide or shred the evidence when it becomes inconvenient later.</t>
        <t>The following use cases illustrate the scope of SCITT and elaborate on the generic problem statement above.</t>
      </section>
      <section anchor="sec-eclectic-ssc-use-cases">
        <name>Eclectic SSC Use Cases</name>
        <t>The three following use cases are a specialization derived from the generic problem statement above.</t>
        <section anchor="sec-security-analysis-of-a-software-product">
          <name>Security Analysis of a Software Product</name>
          <t>A released software product is often accompanied by a set of complementary statements about its security properties.
This gives enough confidence to both producers and consumers that the released software meets the expected security standards and is suitable to use.</t>
          <t>Subsequently, multiple security researchers often run sophisticated security analysis tools on the same product.
The intention is to identify any security weaknesses or vulnerabilities in the package.</t>
          <t>Initially, a particular analysis can identify a simple weakness in a software component.
Over a period of time, a statement from a third-party illustrates that the weakness is exposed in a way that represents an exploitable vulnerability.
The producer of the software product provides a statement that confirms the linking of a software component vulnerability with the software product by issuing a product vulnerability disclosure report and also issues an advisory statement on how to mitigate the vulnerability.
At first, the producer provides an updated software product that still uses the vulnerable software component but shields the issue in a fashion that inhibits exploitation.
Later, a second update of the software product includes a security patch to the affected software component from the software producer.
Finally, a third update includes a new release (updated version) of the formerly insecure software component.
For this release, both the software product and the affected software component are deemed secure by the producer and consumers.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>know where to get these security statements from producers and third-parties related to the software product in a timely and unambiguous fashion</li>
            <li>attribute them to an authoritative issuer</li>
            <li>associate the statements in a meaningful manner via a set of well-known semantic relationships</li>
            <li>consistently, efficiently, and homogeneously check their authenticity</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>know the various sources of statements</li>
            <li>express the provenance and historicity of statements</li>
            <li>relate and link various heterogeneous statements in a simple fashion</li>
            <li>check that the statement comes from a source with authority to issue that statement</li>
            <li>confirm that sources provide a complete history of statements related to a given component</li>
          </ul>
        </section>
        <section anchor="sec-promotion-of-a-software-component-by-multiple-entities">
          <name>Promotion of a Software Component by Multiple Entities</name>
          <t>A software component (e.g., a library or software product), open-source or commercial, is often initially released by a single trusted producer, who can choose to attach a statement of authenticity to it.
As that component becomes used in a growing range of other products, providers other than the original trusted producer often re-distribute, or release their own version of that component.</t>
          <t>Some providers include it as part of their release product/package bundle and provide the package with proof of authenticity using their issuer authority.
Some packages include the original statement of authenticity, and some do not.
Over time, some providers no longer offer the exact same software component source code but pre-compiled software component binaries.
Some sources do not provide the exact same software component, but include patches and fixes produced by third-parties, as these emerge faster than solutions from the original producer.
Due to complex distribution and promotion life-cycle scenarios, the original software component takes myriad forms.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>understand if a particular provider is a trusted originating producer or an alternative party</li>
            <li>know if and how the source, or resulting binary, of a promoted software component differs from the original software component</li>
            <li>check the provenance and history of a software component's source back to its origin</li>
            <li>assess whether to trust a component or product based on a downloaded package location and source supplier</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>reliably discern if a provider is the original, trusted producer or is a trustworthy alternative provider or is an illegitimate provider</li>
            <li>track the provenance path from an original producer to a particular provider</li>
            <li>check the trustworthiness of a provider</li>
            <li>check the integrity of modifications or transformations applied by a provider</li>
          </ul>
        </section>
        <section anchor="sec-software-integrator-assembling-a-software-product-for-an-autonomous-vehicle">
          <name>Software Integrator Assembling a Software Product for an Autonomous Vehicle</name>
          <t>Software Integration is a complex activity.
This typically involves getting various software components from multiple suppliers, producing an integrated package deployed as part of device assembly.
For example, car manufacturers source integrated software for their autonomous vehicles from third parties that integrate software components from various sources.
Integration complexity creates a higher risk of security vulnerabilities to the delivered software.</t>
          <t>Consumers of integrated software want:</t>
          <ul spacing="normal">
            <li>a list of all components present in a software product</li>
            <li>the ability to identify and retrieve all components from a secure and tamper-proof location</li>
            <li>verifiable proofs on build process and build environment with all supplier tiers to ensure end to end build quality and security</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated software at both component and product level before installation</li>
            <li>provide valid annotations on build integrity to ensure conformance</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of Supply Chain Integrity, Transparency, and Trust, and are used throughout this document.</t>
      <t>This document has been developed in coordination with the COSE, OAUTH and RATS WG and uses terminology common to these working groups as much as possible.</t>
      <t>When used in text, the corresponding terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="STD96"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      <dl anchor="mybody">
        <dt>Append-only Log:</dt>
        <dd>
          <t>a Statement Sequence comprising the entire registration history of the Transparency Service.
To make the Append-only property verifiable and transparent, the Transparency Service defines how Signed Statements are made available to Auditors.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements, or the transparent Statement Sequence, issued by a Transparency Service.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected Transparency Service resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling Transparency Service Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where a Transparency Service provides inconsistent proofs to Relying Parties, containing conflicting claims about the Signed Statement bound at a given position in the Verifiable Data Structure.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts, or an independent third party such as an Auditor, reviewer or an endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> CWT Claim is a member of the COSE header parameter <tt>15: CWT_Claims</tt> within the protected header of a COSE Envelope.
This document uses the terms "Issuer", and "Subject" as described in <xref target="RFC8392"/>, however the usage is consistent with the broader interpretation of these terms in both JOSE and COSE, and the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where all proofs provided by the Transparency Service to Relying Parties are produced from a Single Verifiable Data Structure describing a unique sequence of Signed Statements and are therefore consistent <xref target="EQUIVOCATION"/>.
Over time, an Issuer may register new Signed Statements about an Artifact in a Transparency Service with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a cryptographic proof that a Signed Statement is included in the Verifiable Data Structure.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for implementations
Receipts are signed proofs of verifiable data-structure properties.
The types of Receipts <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other proof types, such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a Transparency Service, applying the Transparency Service's Registration Policy, adding to the Verifiable Data Structure, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the pre-condition enforced by the Transparency Service before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>Relying Parties consumes Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts, or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as COSE signed objects; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
        <dt>Attestation:</dt>
        <dd>
          <t><xref target="NIST.SP.1800-19"/> defines "attestation" as "The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements."
NIST guidance "Software Supply Chain Security Guidance EO 14028" uses the definition from <xref target="NIST_EO14028"/>, which states that an "attestation" is "The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.".
It is often useful for the intended audience to qualify the term "attestation" in their specific context to avoid confusion and ambiguity.</t>
        </dd>
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpretation of Statements, they must be tagged with a relevant media type (as specified in <xref target="RFC6838"/>).
A Statement may represent a Software Bill Of Materials (SBOM) that lists the ingredients of a software Artifact, an endorsement or attestation about an Artifact, indicate the End of Life (EOL), redirection to a newer version, or any content an Issuer wishes to publish about an Artifact.
Additional Statements about an Artifact are correlated by the Subject Claim as defined in the IANA CWT <xref target="IANA.cwt"/> registry and used as a protected header parameter as defined in <xref target="RFC9597"/>.
The Statement is considered opaque to Transparency Service, and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Statement Sequence:</dt>
        <dd>
          <t>a sequence of Signed Statements captured by a Verifiable Data Structure.
See Verifiable Data Structure.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, which represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim to create a coherent sequence of Signed Statements about the same Artifact and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the Verifiable Data Structure and endorses its state.
The identity of a Transparency Service is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a Transparency Service.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement and may be registered again in a different Transparency Service.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure which supports one or more proof types, such as "inclusion proofs" or "consistency proofs", for Signed Statements as they are Registered to a Transparency Service.
SCITT supports multiple Verifiable Data Structures and Receipt formats as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, accommodating different Transparency Service implementations.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-definition-of-transparency">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of Append-only Logs and Receipts.
Existing transparency systems such as Certificate Transparency are instances of this definition.
SCITT supports multiple Verifiable Data Structures, as defined in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a Transparency Service, in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the Verifiable Data Structure of a Transparency Service.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statements is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified, is subject to scrutiny and auditing by other parties.
The Transparency Service provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
A SCITT instance is referred to as a Transparency Service.
Implementations of Transparency Services may protect their registered sequence of Signed Statements and Verifiable Data Structure using a combination of trusted hardware, consensus protocols, and cryptographic evidence.
A Receipt is a signature over one or more Verifiable Data Structure Proofs that a Signed Statement is registered in the Verifiable Data Structure.
It is universally verifiable without online access to the TS.
Requesting a Receipt can result in the production of a new Receipt for the same Signed Statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the Transparency Service can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.</t>
      <t>Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable Transparency Services are incentivized to secure their Verifiable Data Structure, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service.</t>
      <t>The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply.</t>
      <t>SCITT is a generalization of Certificate Transparency (CT) <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>CAs (Issuers) sign the ASN.1 DER encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</li>
        <li>CAs submit the certificates to one or more CT logs (Transparency Services)</li>
        <li>CT logs produce Signed Certificate Timestamps (Transparent Statements)</li>
        <li>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</li>
        <li>The Verifiable Data Structure can be checked by Auditors</li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture enables a loose federation of Transparency Services, by providing a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements.</t>
      <t>In order to accommodate as many Transparency Service implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the Transparency Service identity and the agility parameters for the Signed Inclusion Proofs.
The remaining details of the Receipt's contents are specified in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a Transparency Service independent of any one use case:</t>
      <ul spacing="normal">
        <li>Issuers that use their credentials to create Signed Statements about Artifacts</li>
        <li>Transparency Services that evaluate Signed Statements against Registration Policies, producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</li>
            <li>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g. verification);</li>
            <li>or replay all the Transparent Statements to check for the consistency and correctness of the Transparency Service's Verifiable Data Structure (e.g. auditing)</li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple Transparency Services and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more Transparency Service.
Each Transparency Service produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple Transparency Services.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="536" viewBox="0 0 536 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,448 L 32,480" fill="none" stroke="black"/>
              <path d="M 40,352 L 40,368" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,200" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,328" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,408" fill="none" stroke="black"/>
              <path d="M 120,288 L 120,328" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 152,352 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,448 L 160,480" fill="none" stroke="black"/>
              <path d="M 208,272 L 208,288" fill="none" stroke="black"/>
              <path d="M 216,464 L 216,496" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,320" fill="none" stroke="black"/>
              <path d="M 224,384 L 224,408" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,144" fill="none" stroke="black"/>
              <path d="M 288,272 L 288,288" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,88" fill="none" stroke="black"/>
              <path d="M 304,304 L 304,320" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,272" fill="none" stroke="black"/>
              <path d="M 344,384 L 344,408" fill="none" stroke="black"/>
              <path d="M 344,464 L 344,496" fill="none" stroke="black"/>
              <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
              <path d="M 384,176 L 384,200" fill="none" stroke="black"/>
              <path d="M 384,448 L 384,480" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,88" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,64" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,200" fill="none" stroke="black"/>
              <path d="M 440,336 L 440,360" fill="none" stroke="black"/>
              <path d="M 440,376 L 440,408" fill="none" stroke="black"/>
              <path d="M 472,208 L 472,272" fill="none" stroke="black"/>
              <path d="M 488,256 L 488,336" fill="none" stroke="black"/>
              <path d="M 504,160 L 504,352" fill="none" stroke="black"/>
              <path d="M 512,448 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 288,32 L 408,32" fill="none" stroke="black"/>
              <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
              <path d="M 288,64 L 408,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 384,96 L 472,96" fill="none" stroke="black"/>
              <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
              <path d="M 240,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 368,128 L 456,128" fill="none" stroke="black"/>
              <path d="M 448,144 L 488,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 304,160 L 368,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 128,224 L 336,224" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 272,256" fill="none" stroke="black"/>
              <path d="M 472,256 L 488,256" fill="none" stroke="black"/>
              <path d="M 136,272 L 208,272" fill="none" stroke="black"/>
              <path d="M 296,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 472,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 272,304" fill="none" stroke="black"/>
              <path d="M 200,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 56,336 L 136,336" fill="none" stroke="black"/>
              <path d="M 240,336 L 288,336" fill="none" stroke="black"/>
              <path d="M 368,336 L 488,336" fill="none" stroke="black"/>
              <path d="M 152,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 360,368 L 488,368" fill="none" stroke="black"/>
              <path d="M 56,384 L 136,384" fill="none" stroke="black"/>
              <path d="M 24,416 L 176,416" fill="none" stroke="black"/>
              <path d="M 200,416 L 368,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 8,448 L 160,448" fill="none" stroke="black"/>
              <path d="M 368,448 L 512,448" fill="none" stroke="black"/>
              <path d="M 176,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 32,480 L 160,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 216,496 L 344,496" fill="none" stroke="black"/>
              <path d="M 8,448 L 24,416" fill="none" stroke="black"/>
              <path d="M 240,128 L 256,96" fill="none" stroke="black"/>
              <path d="M 160,448 L 176,416" fill="none" stroke="black"/>
              <path d="M 328,128 L 344,96" fill="none" stroke="black"/>
              <path d="M 176,464 L 200,416" fill="none" stroke="black"/>
              <path d="M 368,128 L 384,96" fill="none" stroke="black"/>
              <path d="M 456,128 L 472,96" fill="none" stroke="black"/>
              <path d="M 344,464 L 368,416" fill="none" stroke="black"/>
              <path d="M 368,448 L 384,416" fill="none" stroke="black"/>
              <path d="M 512,448 L 528,416" fill="none" stroke="black"/>
              <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
              <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
              <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
              <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
              <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
              <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
              <path d="M 448,144 C 439.16936,144 432,136.83064 432,128" fill="none" stroke="black"/>
              <path d="M 488,144 C 496.83064,144 504,151.16936 504,160" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 304,160 C 295.16936,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 368,160 C 376.83064,160 384,167.16936 384,176" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 344,240 C 335.16936,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 224,256 C 215.16936,256 208,263.16936 208,272" fill="none" stroke="black"/>
              <path d="M 272,256 C 280.83064,256 288,263.16936 288,272" fill="none" stroke="black"/>
              <path d="M 136,272 C 127.16936,272 120,279.16936 120,288" fill="none" stroke="black"/>
              <path d="M 312,272 C 320.83064,272 328,264.83064 328,256" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 168,288 C 176.83064,288 184,295.16936 184,304" fill="none" stroke="black"/>
              <path d="M 288,288 C 296.83064,288 304,295.16936 304,304" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 272,304 C 280.83064,304 288,296.83064 288,288" fill="none" stroke="black"/>
              <path d="M 200,320 C 191.16936,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 56,336 C 47.16936,336 40,343.16936 40,352" fill="none" stroke="black"/>
              <path d="M 136,336 C 144.83064,336 152,343.16936 152,352" fill="none" stroke="black"/>
              <path d="M 240,336 C 231.16936,336 224,328.83064 224,320" fill="none" stroke="black"/>
              <path d="M 288,336 C 296.83064,336 304,328.83064 304,320" fill="none" stroke="black"/>
              <path d="M 208,368 C 216.83064,368 224,375.16936 224,384" fill="none" stroke="black"/>
              <path d="M 360,368 C 351.16936,368 344,375.16936 344,384" fill="none" stroke="black"/>
              <path d="M 488,368 C 496.83064,368 504,360.83064 504,352" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,376.83064 40,368" fill="none" stroke="black"/>
              <path d="M 136,384 C 144.83064,384 152,376.83064 152,368" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="448,408 436,402.4 436,413.6 " fill="black" transform="rotate(90,440,408)"/>
              <path class="jump" d="M 440,376 C 446,376 446,360 440,360" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="440,200 428,194.4 428,205.6 " fill="black" transform="rotate(90,432,200)"/>
              <polygon class="arrowhead" points="400,88 388,82.4 388,93.6 " fill="black" transform="rotate(90,392,88)"/>
              <polygon class="arrowhead" points="392,200 380,194.4 380,205.6 " fill="black" transform="rotate(90,384,200)"/>
              <polygon class="arrowhead" points="352,408 340,402.4 340,413.6 " fill="black" transform="rotate(90,344,408)"/>
              <polygon class="arrowhead" points="344,224 332,218.4 332,229.6 " fill="black" transform="rotate(0,336,224)"/>
              <polygon class="arrowhead" points="320,320 308,314.4 308,325.6 " fill="black" transform="rotate(180,312,320)"/>
              <polygon class="arrowhead" points="312,88 300,82.4 300,93.6 " fill="black" transform="rotate(90,304,88)"/>
              <polygon class="arrowhead" points="304,272 292,266.4 292,277.6 " fill="black" transform="rotate(180,296,272)"/>
              <polygon class="arrowhead" points="232,408 220,402.4 220,413.6 " fill="black" transform="rotate(90,224,408)"/>
              <polygon class="arrowhead" points="128,328 116,322.4 116,333.6 " fill="black" transform="rotate(90,120,328)"/>
              <polygon class="arrowhead" points="104,408 92,402.4 92,413.6 " fill="black" transform="rotate(90,96,408)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6 " fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="80,328 68,322.4 68,333.6 " fill="black" transform="rotate(90,72,328)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6 " fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,88 52,82.4 52,93.6 " fill="black" transform="rotate(90,56,88)"/>
              <g class="text">
                <text x="60" y="52">Artifact</text>
                <text x="348" y="52">Issuer</text>
                <text x="56" y="116">Statement</text>
                <text x="292" y="116">sign</text>
                <text x="420" y="116">verify</text>
                <text x="68" y="228">Signed</text>
                <text x="404" y="228">Transparency</text>
                <text x="72" y="244">Statement</text>
                <text x="400" y="260">Service</text>
                <text x="248" y="276">Receipt</text>
                <text x="428" y="292">Transparency</text>
                <text x="264" y="324">Receipt</text>
                <text x="424" y="324">Service</text>
                <text x="96" y="356">Transparent</text>
                <text x="96" y="372">Statement</text>
                <text x="56" y="436">Collect</text>
                <text x="124" y="436">Receipts</text>
                <text x="228" y="436">Verify</text>
                <text x="304" y="436">Transparent</text>
                <text x="428" y="436">Replay</text>
                <text x="472" y="436">Log</text>
                <text x="272" y="452">Statement</text>
                <text x="72" y="468">Relying</text>
                <text x="128" y="468">Party</text>
                <text x="424" y="468">Relying</text>
                <text x="480" y="468">Party</text>
                <text x="256" y="484">Relying</text>
                <text x="312" y="484">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 .----------.                      +--------------+
|  Artifact  |                     |    Issuer    |
 '----+-----'                      +-+----------+-+
      v                              v          v
 .----+----.                   .-----+----.    .+---------.
| Statement |                 /   sign   /    /  verify  /
 '----+----'                 '-----+----+    '-------+--+
      |                            |                 |'------.
      |    .----------------------' '---------.      |        |
      |   |                                    |     |        |
      v   v                                    v     v        |
 .----+---+---.                           +----+----+-----+   |
|    Signed    +------------------------->+ Transparency  |   |
|   Statement  |                         .+               |   |
 '------+-----'           .-------.     | |   Service     +-+ |
        |      .---------+ Receipt +<--'  +--+------------+ | |
        |     |.-----.   |         +.        | Transparency | |
        |     |       |   '+------'  |       |              | |
        v     v        '---+ Receipt +<------+   Service    | |
     .--+-----+--.          '-------'        +--------+-----+ |
    | Transparent |                                   |       |
    |  Statement  +-------.                .----------)------'
     '-----+-----'         |              |           |
           v               v              v           v
  .--------+---------.  .--+--------------+--. .------+----------.
 / Collect Receipts /  / Verify Transparent / /   Replay Log    /
'--+---------------+  /      Statement     / '-+---------------+
   | Relying Party | '----+---------------+    | Relying Party |
   +---------------+      | Relying Party |    +---------------+
                          +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely Transparency Service, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>Transparency Services <bcp14>MUST</bcp14> feature a Verifiable Data Structure.
The Verifiable Data Structure records registered Signed Statements and supports the production of Receipts.</t>
        <t>Typically a Transparency Service has a single Issuer identity which is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim, for example, <tt>ts.example.</tt> may have a distinct Issuer identity for each sub domain, such as <tt>tenant1.ts.example.</tt> and <tt>tenant2.ts.example.</tt>.</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is registered to the Verifiable Data Structure.
To enable audit-ability, Transparency Services <bcp14>MUST</bcp14> maintain Registration Policies.</t>
          <t>Beyond the mandatory Registration checks, the scope of additional checks, including no additional checks, is up to the implementation.</t>
          <t>This specification leaves implementation, encoding and documentation of Registration Policies and trust anchors to the operator of the Transparency Service.</t>
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a Transparency Service <bcp14>MUST</bcp14>, at a minimum, syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="STD96"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the Transparency Service <bcp14>MUST</bcp14> be checked.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>) in order to check the signatures of Signed Statements, either separately, or inside Registration Policies.
Transparency Services <bcp14>MUST</bcp14> authenticate Signed Statements as part of a Registration Policy.
For instance, a trust anchor could be an X.509 root certificate (directly or its thumbprint), a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.</t>
            <t>When using X.509 Signed Statements, the Transparency Service <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates currently registered as a trust anchor by the Transparency Service.
The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made Transparent and available to all Relying Parties of the Transparency Service by Registering them as Signed Statements on the Verifiable Data Structure.</t>
            <t>The Transparency Service <bcp14>MUST</bcp14> apply the Registration Policy that was most recently committed to the Verifiable Data Structure at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a Transparency Service <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a Transparency Service at any time.</t>
            <t>Transparency Services <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, Transparency Services <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>Pre-configured Registration Policy and trust anchors;</li>
            <li>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks</li>
            <li>An out-of-band authenticated management interface</li>
          </ul>
        </section>
        <section anchor="sec-verifiable-data-structure">
          <name>Verifiable Data Structure</name>
          <t>The security properties are determined by the choice of the Verifiable Data Structure (<xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>) used by the Transparency Service implementation.
This verifiable data structure <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-Only:</dt>
            <dd>
              <t>a property required for a verifiable data structure to be applicable to SCITT, ensuring that the Statement Sequence cannot be modified, deleted, or reordered.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the registered sequence of Signed Statements accepted by the Transparency Service and committed to the Verifiable Data Structure.
Everyone with access to its content sees the same ordered collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the Verifiable Data Structure includes sufficient information to enable authorized actors with access to its content to check that each data structure representing each Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some verifiable data structures might support additional proof types, such as proofs of consistency, or proofs of non-inclusion.</t>
          <t>Specific verifiable data structures, such those describes in <xref target="RFC9162"/> and <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>Transparency Services can be deployed along side other database or object storage technologies.
For example, a Transparency Service that supports a software package management system, might be referenced from the APIs exposed for package management.
Providing an ability to request a fresh Receipt for a given software package, or to request a list of Signed Statements associated with the software package.</t>
        </section>
      </section>
    </section>
    <section anchor="signed-statements">
      <name>Signed Statements</name>
      <t>This specification prioritizes conformance to <xref target="STD96"/> and its required and optional properties.
Profiles and implementation specific choices should be used to determine admissibility of conforming messages.
This specification is left intentionally open to allow implementations to make Registration restrictions that make the most sense for their operational use cases.</t>
      <t>There are many types of Statements (such as SBOMs, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
For a software supply chain, payloads describing the software Artifacts may include:</t>
      <ul spacing="normal">
        <li>
          <xref target="CoSWID"/></li>
        <li>
          <xref target="CycloneDX"/></li>
        <li>
          <xref target="in-toto"/></li>
        <li>
          <xref target="SPDX-CBOR"/></li>
        <li>
          <xref target="SPDX-JSON"/></li>
        <li>
          <xref target="SLSA"/></li>
        <li>
          <xref target="SWID"/></li>
      </ul>
      <t>Once all the Envelope headers are set, an Issuer <bcp14>MUST</bcp14> use a standard COSE implementation to produce an appropriately serialized Signed Statement.</t>
      <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the CWT_Claims protected header, are used to identify the Artifact the Statement pertains to.
(See Subject under <xref target="terminology"/> Terminology.)</t>
      <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header) for different Artifacts or sign all Signed Statements under the same key.</t>
      <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
      <t>Multiple Issuers can make different, even conflicting Statements, about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
      <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
      <t>Additionally, <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
      <ul spacing="normal">
        <li>When using x.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</li>
        <li>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</li>
      </ul>
      <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, <tt>iss</tt> <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in length.</t>
      <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out-of-scope of this document.</t>
      <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="RFC9597"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
      <t>A Receipt is a Signed Statement, (COSE_Sign1), with additional Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>.</t>
      <section anchor="sec-signed-statement-examples">
        <name>Signed Statement Examples</name>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition <xref target="RFC8610"/> for the protected header and unprotected header of Signed Statements and Receipts.</t>
        <t>The SCITT architecture specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl">
Signed_Statement = #6.18(COSE_Sign1)
Receipt = #6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &amp;(CWT_Claims: 15) =&gt; CWT_Claims
  ? &amp;(alg: 1) =&gt; int
  ? &amp;(content_type: 3) =&gt; tstr / uint
  ? &amp;(kid: 4) =&gt; bstr
  ? &amp;(x5t: 34) =&gt; COSE_CertHash
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  * int =&gt; any
}

CWT_Claims = {
  &amp;(iss: 1) =&gt; tstr
  &amp;(sub: 2) =&gt; tstr
  * int =&gt; any
}

Unprotected_Header = {
  ? &amp;(x5chain: 33) =&gt; COSE_X509
  ? &amp;(receipts: 394)  =&gt; [+ Receipt]
  * int =&gt; any
}
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements, and ensure Signed Statements can integrate with existing storage systems.</t>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement</name>
          <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1      /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)
</sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type, and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR Extended Diagnostic Notation example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag">
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}
</sourcecode>
        </figure>
      </section>
      <section anchor="sec-signing-large-or-sensitive-statements">
        <name>Signing Large or Sensitive Statements</name>
        <t>Statements payloads might be too large or too sensitive to be sent to a remote Transparency Service.
In these cases a Statement can be made over the hash of a payload, rather than the full payload bytes.</t>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
              <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
              <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
              <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
              <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
              <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
              <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
              <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
              <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
              <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
              <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
              <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
              <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
              <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
              <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
              <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
              <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
              <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
              <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
              <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
              <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
              <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
              <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
              <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
              <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
              <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
              <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
              <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
              <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
              <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
              <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
              <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
              <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
              <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
              <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
              <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
              <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
              <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
              <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
              <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
              <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
              <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
              <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
              <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
              <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
              <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
              <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
              <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
              <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
              <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
              <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
              <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
              <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
              <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
              <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
              <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
              <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
              <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
              <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
              <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
              <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
              <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
              <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
              <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
              <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
              <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
              <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
              <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
              <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
              <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="336,584 324,578.4 324,589.6 " fill="black" transform="rotate(90,328,584)"/>
              <polygon class="arrowhead" points="280,584 268,578.4 268,589.6 " fill="black" transform="rotate(90,272,584)"/>
              <polygon class="arrowhead" points="280,520 268,514.4 268,525.6 " fill="black" transform="rotate(90,272,520)"/>
              <polygon class="arrowhead" points="248,176 236,170.4 236,181.6 " fill="black" transform="rotate(0,240,176)"/>
              <polygon class="arrowhead" points="176,176 164,170.4 164,181.6 " fill="black" transform="rotate(0,168,176)"/>
              <polygon class="arrowhead" points="152,624 140,618.4 140,629.6 " fill="black" transform="rotate(180,144,624)"/>
              <polygon class="arrowhead" points="64,680 52,674.4 52,685.6 " fill="black" transform="rotate(90,56,680)"/>
              <polygon class="arrowhead" points="64,584 52,578.4 52,589.6 " fill="black" transform="rotate(90,56,584)"/>
              <polygon class="arrowhead" points="64,456 52,450.4 52,461.6 " fill="black" transform="rotate(270,56,456)"/>
              <polygon class="arrowhead" points="64,104 52,98.4 52,109.6 " fill="black" transform="rotate(90,56,104)"/>
              <polygon class="arrowhead" points="48,200 36,194.4 36,205.6 " fill="black" transform="rotate(90,40,200)"/>
              <g class="text">
                <text x="76" y="52">Artifact</text>
                <text x="60" y="132">Hash</text>
                <text x="196" y="180">OR</text>
                <text x="296" y="180">Payload</text>
                <text x="72" y="228">Statement</text>
                <text x="104" y="292">...</text>
                <text x="164" y="292">Producer</text>
                <text x="232" y="292">Network</text>
                <text x="280" y="292">...</text>
                <text x="192" y="324">...</text>
                <text x="104" y="356">...</text>
                <text x="164" y="356">Issuer</text>
                <text x="224" y="356">Network</text>
                <text x="272" y="356">...</text>
                <text x="52" y="420">Identity</text>
                <text x="168" y="420">(iss,</text>
                <text x="212" y="420">x5t)</text>
                <text x="52" y="436">Document</text>
                <text x="48" y="500">Private</text>
                <text x="96" y="500">Key</text>
                <text x="268" y="548">Header</text>
                <text x="76" y="628">Sign</text>
                <text x="220" y="628">To</text>
                <text x="244" y="628">Be</text>
                <text x="284" y="628">Signed</text>
                <text x="336" y="628">Bytes</text>
                <text x="36" y="708">COSE</text>
                <text x="76" y="708">Sign</text>
                <text x="104" y="708">1</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE Sign 1  |
 '------------'
]]></artwork>
        </artset>
      </section>
      <section anchor="sec-registration-of-signed-statements">
        <name>Registration of Signed Statements</name>
        <t>To register a Signed Statement, the Transparency Service performs the following steps:</t>
        <ol spacing="normal" type="1">
          <li>
            <strong>Client authentication:</strong> A Client authenticates with the Transparency Service before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation-specific and out of scope of the SCITT architecture.</li>
          <li>
            <strong>TS Signed Statement Verification and Validation:</strong> The Transparency Service <bcp14>MUST</bcp14> perform signature verification per <xref section="4.4" sectionFormat="of" target="STD96"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The Transparency Service <bcp14>MUST</bcp14> also check the Signed Statement includes the required protected headers.
The Transparency Service <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain specific registration policies that apply to specific content types.</li>
          <li>
            <strong>Apply Registration Policy:</strong> The Transparency Service <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current Transparency Service state and the entire Envelope and may use information contained in the attributes of named policies.</li>
          <li>
            <strong>Register the Signed Statement</strong></li>
          <li>
            <strong>Return the Receipt</strong>, which <bcp14>MAY</bcp14> be asynchronous from Registration.
The Transparency Service <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the Verifiable Data Structure.</t>
        <t>A Transparency Service <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>A Transparency Service <bcp14>MAY</bcp14> accept a Signed Statement with content in its unprotected header, and <bcp14>MAY</bcp14> use values from that unprotected header during verification and registration policy evaluation.</t>
        <t>However, the unprotected header of a Signed Statement <bcp14>MUST</bcp14> be set to an empty map before the Signed Statement can be included in a Statement Sequence.</t>
        <t>The same Signed Statement may be independently registered in multiple Transparency Services, producing multiple, independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement, creating a Transparent Statement.</t>
        <t>An Issuer that knows of a changed state of quality for an Artifact, <bcp14>SHOULD</bcp14> Register a new Signed Statement, using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      </section>
    </section>
    <section anchor="Receipt">
      <name>Transparent Statements</name>
      <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
      <t>When a Signed Statement is registered by a Transparency Service a Receipt becomes available.
When a Receipt is included in a Signed Statement a Transparent Statement is produced.</t>
      <t>Receipts are based on Signed Inclusion Proofs as described in COSE Receipts <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> that also provides the COSE header parameter semantics for label 394.</t>
      <t>The Registration time is recorded as the timestamp when the Transparency Service added the Signed Statement to its Verifiable Data Structure.</t>
      <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.
See <xref target="fig-signed-statement-cddl"/> for the CDDL rule that defines 'COSE_Sign1' as specified in <xref section="4.2" sectionFormat="of" target="STD96"/></t>
      <figure anchor="fig-transparent-statement-cddl">
        <name>CDDL definition for a Transparent Statement</name>
        <sourcecode type="cddl">
Transparent_Statement = #6.18(COSE_Sign1)

Unprotected_Header = {
  &amp;(receipts: 394)  =&gt; [+ Receipt]
}
</sourcecode>
      </figure>
      <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload, and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor encoded Receipts).</t>
      <figure anchor="fig-transparent-statement-edn">
        <name>CBOR Extended Diagnostic Notation example of a Transparent Statement</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        394:   [                    / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-edn"/> one of the decoded Receipt from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for verifiable data structures.
The unprotected header contains verifiable data structure proofs.
See the protected header for details regarding the specific verifiable data structure used.
Per the COSE Verifiable Data Structure Registry documented in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/>, the COSE key type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
      <figure anchor="fig-receipt-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt</name>
        <sourcecode type="cbor-diag">
18(                                 / COSE Sign 1               /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.
The verifiable data structure (<tt>-111</tt>) uses <tt>1</tt> from (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-protected-header-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Protected Header</name>
        <sourcecode type="cbor-diag">
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}
</sourcecode>
      </figure>
      <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the Verifiable Data Structure was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the verifiable data structure used (RFC9162_SHA256).</t>
      <figure anchor="fig-receipt-inclusion-proof-edn">
        <name>CBOR Extended Diagnostic Notation example of a Receipt's Inclusion Proof</name>
        <sourcecode type="cbor-diag">
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]
</sourcecode>
      </figure>
      <section anchor="validation">
        <name>Validation</name>
        <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in <xref section="4.4" sectionFormat="of" target="STD96"/>, when checking the signature of Signed Statements and Receipts.</t>
        <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
        <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them and not check the signature on the Signed Statement or Receipts which rely on verifiable data structures which they do not understand.</t>
        <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
        <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
        <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Interactions with Transparency Services are expected to use appropriately strong encryption and authorization technologies.</t>
      <t>The Transparency Service is trusted with the confidentiality of the Signed Statements presented for Registration.
Issuers and Clients are responsible for verifying that the Transparency Service's privacy and security posture is suitable for the contents of the Signed Statements they submit prior to Registration.
Issuers must carefully review the inclusion of private, confidential, or personally identifiable information (PII) in their Statements against the Transparency Service's privacy posture.</t>
      <t>In some deployments a special role such as an Auditor might require and be given access to both the Transparency Service and related Adjacent Services.</t>
      <t>Transparency Services can leverage Verifiable Data Structures which only retain cryptographic metadata (e.g. a hash), rather than the complete Signed Statement, as part of a defense in depth approach to maintaining confidentiality.
By analyzing the relationship between data stored in the Transparency Service and data stored in Adjacent Services, it is possible to perform metadata analysis, which could reveal the order in which artifacts were built, signed, and uploaded.</t>
    </section>
    <section anchor="SecConSec">
      <name>Security Considerations</name>
      <t>SCITT provides the following security guarantees:</t>
      <ol spacing="normal" type="1">
        <li>Statements made by Issuers about supply chain Artifacts are identifiable and can be authenticated</li>
        <li>Statement provenance and history can be independently and consistently audited</li>
        <li>Issuers can efficiently prove that their Statement is logged by a Transparency Service</li>
      </ol>
      <t>The first guarantee is achieved by requiring Issuers to sign their Statements.
The second guarantee is achieved by proving a Signed Statement is present in a Verifiable Data Structure.
The third guarantee is achieved by the combination of both of these steps.</t>
      <t>In addition to deciding whether to trust a Transparency Service, Relying Parties can use the history of registered Signed Statements to decide which Issuers they choose to trust.
This decision process is out of scope of this document.</t>
      <section anchor="sec-ordering-of-signed-statements">
        <name>Ordering of Signed Statements</name>
        <t>Statements are signed prior to submitting to a SCITT Transparency service.
Unless advertised in the Transparency Service Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the Verifiable Data Structure matches the ordering of their issuance.</t>
      </section>
      <section anchor="sec-accuracy-of-statements">
        <name>Accuracy of Statements</name>
        <t>Issuers can make false Statements either intentionally or unintentionally, registering a Statement only proves it was produced by an Issuer.
A registered Statement may be superseded by a subsequently submitted Signed Statement from the same Issuer, with the same subject in the cwt_claims protected header.
Other Issuers may make new Statements to reflect new or corrected information.
Relying Parties may choose to include or exclude Statements from Issuers to determine the accuracy of a collection of Statements.</t>
      </section>
      <section anchor="sec-issuer-participation">
        <name>Issuer Participation</name>
        <t>Issuers can refuse to register their Statements with a Transparency Service, or selectively submit some but not all the Statements they issue.
It is important for Relying Parties not to accept Signed Statements for which they cannot discover Receipts issued by a Transparency Service they trust.</t>
      </section>
      <section anchor="sec-key-management">
        <name>Key Management</name>
        <t>Issuers and Transparency Services <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>carefully protect their private signing keys</li>
          <li>avoid using keys for more than one purpose</li>
          <li>rotate their keys in well-defined cryptoperiods, see <xref target="KEY-MANAGEMENT"/></li>
        </ul>
        <section anchor="sec-verifiable-data-structure-1">
          <name>Verifiable Data Structure</name>
          <t>The security considerations for specific Verifiable Data Structures are out of scope for this document.
See <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> for the generic security considerations that apply to Verifiable Data Structure and Receipts.</t>
        </section>
        <section anchor="sec-key-compromise">
          <name>Key Compromise</name>
          <t>It is important for Issuers and Transparency Services to clearly communicate when keys are compromised, so that Signed Statements can be rejected by Transparency Services or Receipts can be ignored by Relying Parties.
Revocation strategies for compromised keys are out of scope for this document.</t>
        </section>
        <section anchor="sec-bootstrapping">
          <name>Bootstrapping</name>
          <t>Bootstrapping mechanisms that solely rely on Statement registration to set and update registration policy can be audited without additional implementation-specific knowledge, and are therefore preferable.
Mechanisms that rely on pre-configured values and do not allow updates are unsuitable for use in long-lived service deployments, in which the ability to patch a potentially faulty policy is essential.</t>
        </section>
      </section>
      <section anchor="MediaTypeSecConSec">
        <name>Implications of Media-Type Usage</name>
        <t>The Statement (scitt-statement+cose) and Receipt (scitt-receipt+cose) media types describe the expected content of COSE envelope headers.
The payload media type ('content type') is included in the COSE envelope header.
<xref target="STD96"/> describes the security implications of reliance on this header parameter.</t>
        <t>Both media types describe COSE Sign1 messages, which are normatively signed, and therefore provide integrity protection.</t>
      </section>
      <section anchor="sec-cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>Because the SCITT Architecture leverages <xref target="STD96"/> for Statements and Receipts, it benefits from the format's cryptographic agility.</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, Transparency Services, and Auditors) are either corrupt or compromised.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the Transparency Service (transparency).
Issuers and Transparency Services can both be compromised.</t>
        <t>The SCITT Architecture does not require trust in a single centralized Transparency Service.
Different actors may rely on different Transparency Services, each registering a subset of Signed Statements subject to their own policy.
Running multiple, independent Transparency Services provides different organizations to represent consistent or divergent opinions.
It is the role of the relying party to decide which Transparency Services and Issuers they choose to trust for their scenario.</t>
        <t>In both cases, the SCITT architecture provides generic, universally-verifiable cryptographic proofs to individually blame Issuers or the Transparency Service.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific, and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
So long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a Transparency Service for Signed Statements they did not issue or register.</t>
      </section>
    </section>
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register:</t>
      <ul spacing="normal">
        <li>the media type application/scitt-statement+cose in the "Media Types" registry, see below.</li>
        <li>the media type application/scitt-receipt+cose in the "Media Types" registry, see below.</li>
      </ul>
      <section anchor="sec-cose-receipts-header-parameter">
        <name>COSE Receipts Header Parameter</name>
        <t>394 is requested in <xref target="I-D.draft-ietf-cose-merkle-tree-proofs"/> and has received an early assignment.</t>
      </section>
      <section anchor="sec-media-type-applicationscitt-statementcose-registration">
        <name>Media Type application/scitt-statement+cose Registration</name>
        <t>IANA is requested to add the following Media-Type to the "Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table anchor="new-media-types-scitt-statement">
          <name>SCITT Signed Statement Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-statement+cose</td>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">
                <xref target="signed-statements"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>statement+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to provide an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.scitt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-media-type-applicationscitt-receiptcose-registration">
        <name>Media Type application/scitt-receipt+cose Registration</name>
        <table anchor="new-media-types-receipt">
          <name>SCITT Receipt Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-receipt+cose</td>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">
                <xref target="Receipt"/> of RFCthis</td>
            </tr>
          </tbody>
        </table>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>receipt+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFCthis</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to establish or verify transparency over Statements. Typically emitted by a Transparency Service, for the benefit of Relying Parties wanting to ensure Non-equivocation over all or part of a Statement Sequence.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.receipt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>iesg@ietf.org</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP Content-Formats" sub-registry, within the "Constrained RESTful Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/> in the 256-9999 Range:</t>
        <table anchor="new-content-formats">
          <name>SCITT Content-Formats Registration</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">-</td>
              <td align="left">277</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">-</td>
              <td align="left">278</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <seriesInfo name="DOI" value="10.17487/RFC6838"/>
            <seriesInfo name="RFC" value="6838"/>
            <seriesInfo name="BCP" value="13"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8392"/>
            <seriesInfo name="RFC" value="8392"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <seriesInfo name="DOI" value="10.17487/RFC8610"/>
            <seriesInfo name="RFC" value="8610"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="STD" value="94"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="STD" value="96"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <seriesInfo name="DOI" value="10.17487/RFC9360"/>
            <seriesInfo name="RFC" value="9360"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <seriesInfo name="DOI" value="10.17487/RFC9597"/>
            <seriesInfo name="RFC" value="9597"/>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-merkle-tree-proofs">
          <front>
            <title>COSE Receipts</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-cose-merkle-tree-proofs-15"/>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Cedric Fournet" initials="C." surname="Fournet">
              <organization>Microsoft</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   COSE (CBOR Object Signing and Encryption) Receipts prove properties
   of a verifiable data structure to a verifier.  Verifiable data
   structures and associated proof types enable security properties,
   such as minimal disclosure, transparency and non-equivocation.
   Transparency helps maintain trust over time, and has been applied to
   certificates, end to end encrypted messaging systems, and supply
   chain security.  This specification enables concise transparency
   oriented systems, by building on CBOR (Concise Binary Object
   Representation) and COSE.  The extensibility of the approach is
   demonstrated by providing CBOR encodings for RFC9162.

              </t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud :security practice guide for VMware hybrid cloud infrastructure as a service (IaaS) environments</title>
            <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
            <seriesInfo name="NIST Special Publications (General)" value="1800-19"/>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author>
              <organization>National Institute of Standards and Technology (U.S.)</organization>
              <address>
                <postal>
                  <country>US</country>
                  <city>Gaithersburg</city>
                </postal>
              </address>
            </author>
            <date day="20" month="April" year="2022"/>
            <abstract>
              <t>A cloud workload is an abstraction of the actual instance of a functional application that is virtualized or containerized to include compute, storage, and network resources. Organizations need to be able to monitor, track, apply, and enforce their security and privacy policies on their cloud workloads, based on business requirements, in a consistent, repeatable, and automated way. The goal of this project is to develop a trusted cloud solution that will demonstrate how trusted compute pools leveraging hardware roots of trust can provide the necessary security capabilities. These capabilities not only provide assurance that cloud workloads are running on trusted hardware and in a trusted geolocation or logical boundary, but also improve the protections for the data in the workloads and in the data flows between workloads. The example solution leverages modern commercial off-the-shelf technology and cloud services to address lifting and shifting a typical multi-tier application between an organization-controlled private cloud and a hybrid/public cloud over the internet.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="NIST_EO14028" target="https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf">
          <front>
            <title>Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="February" day="04"/>
          </front>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <seriesInfo name="DOI" value="10.17487/RFC4949"/>
            <seriesInfo name="RFC" value="4949"/>
            <seriesInfo name="FYI" value="36"/>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="BCP" value="225"/>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <seriesInfo name="DOI" value="10.17487/RFC9162"/>
            <seriesInfo name="RFC" value="9162"/>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <seriesInfo name="DOI" value="10.17487/RFC9334"/>
            <seriesInfo name="RFC" value="9334"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CoSWID">
          <front>
            <title>Concise Software Identification Tags</title>
            <seriesInfo name="DOI" value="10.17487/RFC9393"/>
            <seriesInfo name="RFC" value="9393"/>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="J. Fitzgerald-McKay" initials="J." surname="Fitzgerald-McKay"/>
            <author fullname="C. Schmidt" initials="C." surname="Schmidt"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SPDX-JSON" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="KEY-MANAGEMENT" target="https://csrc.nist.gov/pubs/sp/800/57/pt2/r1/final">
          <front>
            <title>NIST SP 800-57 Part 2 Rev. 1</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION" target="https://www.read.seas.harvard.edu/~kohler/class/08w-dsi/chun07attested.pdf">
          <front>
            <title>Attested Append-Only Memory: Making Adversaries Stick to their Word</title>
            <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Tradeverifyd</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>orie@or13.io</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
      <contact initials="A." surname="Chamayou" fullname="Amaury Chamayou">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>amaury.chamayou@microsoft.com</email>
        </address>
      </contact>
      <t>Amaury contributed elemental parts to finalize normative language on registration behavior and the single-issuer design, as well as overall document consistency</t>
      <contact initials="D." surname="Brooks" fullname="Dick Brooks">
        <organization>Business Cyber Guardian (TM)</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>dick@businesscyberguardian.com</email>
        </address>
      </contact>
      <t>Dick contributed to the software supply chain use cases.</t>
      <contact initials="B." surname="Knight" fullname="Brian Knight">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>brianknight@microsoft.com</email>
        </address>
      </contact>
      <t>Brian contributed to the software supply chain use cases.</t>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <t>Robert contributed to the software supply chain use cases.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
