<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<?rfc toc_levels="4"?>

<rfc ipr="trust200902" docName="draft-ietf-iotops-security-summary-02" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="IoT networking security summary">A summary of security-enabling technologies for IoT devices</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>

    <date year="2024" month="July" day="08"/>

    <area>Security</area>
    <workgroup>IOTOPS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The IETF has developed security technologies that help to secure the Internet of Things even over constrained networks and when targetting constrained nodes. These technologies can be used independenly or can be composed into larger systems to mitigate a variety of threats. This documents illustrates an overview over these technologies and highlights their relationships. Ultimately, a threat model is presented as a basis to derive requirements that interconnect existing and emerging solution technologies.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>This memo serves as an entry-point to detail which technologies are available for use in IoT networks and to enable IoT designers to discover technologies that may solve their problems. This draft addresses.</t>

<t>Many baseline security requirements documents have been drafted by standards setting organisations, however these documents typically do not specify the technologies available to satisfy those requirements. They also do not express the next steps if an implementor wants to go above and beyond the baseline in order to differentiate their products and enable even better security. This memo defines the mapping from some IoT baseline security requirements definitions to ietf and related security technologies. It also highlights some gaps in those IoT baseline security requirements.</t>

</section>
<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="survey-of-baseline-security-requirements"><name>Survey of baseline security requirements</name>

<t>At time of writing, there are IoT baseline security requirements provided by several organisations:</t>

<t><list style="symbols">
  <t>ENISA's Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (<xref target="ENISA-Baseline"/>)</t>
  <t>ETSI's Cyber Security for Consumer Internet of Things: Baseline Requirements <xref target="ETSI-Baseline"/></t>
  <t>NIST's IoT Device Cybersecurity Capability Core Baseline <xref target="NIST-Baseline"/></t>
</list></t>

</section>
<section anchor="requirement-mapping"><name>Requirement Mapping</name>

<t>Requirements that pertain to hardware, procedure, and policy compliance are noted, but do not map to ietf and related technologies. NIST's requirements (<xref target="NIST-Baseline"/>) are very broad and already have mappings to ENISA baseline security recommendations.</t>

<section anchor="hardware-security"><name>Hardware Security</name>

<section anchor="identity"><name>Identity</name>

<t>ENISA GP-PS-10: Establish and maintain asset management procedures and configuration controls for key network and information systems.</t>

<t>NIST Device Identification: The IoT device can be uniquely identified logically and physically.</t>

<t>ETSI Provision 5.4-2: Where a hard-coded unique per device identity is used in a device for security purposes, it shall be implemented in such a way that it resists tampering by means such as physical, electrical or software.</t>

<t>These requirements are architectural requirements, however <xref target="RFC4122"/> can be used for identifiers.</t>

</section>
<section anchor="hardware-immutable-root-of-trust"><name>Hardware Immutable Root of Trust</name>

<t>ENISA GP-TM-01: Employ a hardware-based immutable root of trust.</t>

<t>This is an architectural requirement.</t>

</section>
<section anchor="hardware-backed-secret-storage"><name>Hardware-Backed Secret Storage</name>

<t>ENISA GP-TM-02: Use hardware that incorporates security features to strengthen the protection and integrity of the device - for example, specialized security chips / coprocessors that integrate security at the transistor level, embedded in the processor, providing, among other things, a trusted storage of device identity and authentication means, protection of keys at rest and in use, and preventing unprivileged from accessing to security sensitive code. Protection against local and physical attacks can be covered via functional security.</t>

<t>NIST Data Protection: The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>

<t>ETSI Provision 5.4-1: Sensitive security parameters in persistent storage shall be stored securely by the device.</t>

<t>This is an architectural requirement.</t>

</section>
</section>
<section anchor="software-integrity-authenticity"><name>Software Integrity &amp; Authenticity</name>

<section anchor="boot-environment-trustworthiness-and-integrity"><name>Boot Environment Trustworthiness and Integrity</name>

<t>ENISA GP-TM-03: Trust must be established in the boot environment before any trust in any other software or executable program can be claimed.</t>

<t>ETSI defines the following boot environment requirements:</t>

<t><list style="symbols">
  <t>Provision 5.7-1: The consumer IoT device should verify its software using secure boot mechanisms.</t>
</list></t>

<t>Satisfying this requirement can be done in several ways, increasing in security guarantees:</t>

<t><list style="numbers">
  <t>Implement secure boot to verify the bootloader and boot environment. Trust is established purely by construction: if code is running in the boot environment, it must have been signed, therefore it is trustworthy.</t>
  <t>Record critical measurements of each step of boot in a TPM. Trust is established by evaluating the measurements recorded by the TPM.</t>
  <t>Use Remote Attestation. Remote attestation allows a device to report to third parties the critical measurements it has recorded (either in a TPM or signed by each stage) in order to prove the trustworthiness of the boot environment and running software. Remote Attestation is implemented in <xref target="I-D.ietf-rats-eat"/>.</t>
</list></t>

</section>
<section anchor="code-integrity-and-authenticity"><name>Code Integrity and Authenticity</name>

<t>ENISA GP-TM-04: Sign code cryptographically to ensure it has not been tampered with after signing it as safe for the device, and implement run-time protection and secure execution monitoring to make sure malicious attacks do not overwrite code after it is loaded.</t>

<t>Satisfying this requirement requires a secure invocation mechanism. In monolithic IoT software images, this is accomplished by Secure Boot. In IoT devices with more fully-featured operating systems, this is accomplished with an operating system-specific code signing practice.</t>

<t>Secure Invocation can be achieved using the SUIT Manifest format, which provides for secure invocation procedures. See <xref target="I-D.ietf-suit-manifest"/>.</t>

<t>To satisfy the associated requirement of run-time protection and secure execution monitoring, the use of a TEE is recommended to protect sensitive processes. The TEEP protocol (see <xref target="I-D.ietf-teep-architecture"/>) is recommended for managing TEEs.</t>

</section>
<section anchor="secure-softwarefirmware-update"><name>Secure Software/Firmware Update</name>

<t>Technical requirements for Software Updates are provided for in the SUIT information model (<xref target="RFC9124"/>) and TEEP Architecture (<xref target="RFC9397"/>). Procedural and architectural requirements should be independently assessed by the implementor.</t>

<t>ENISA Software Update Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-05: Control the installation of software in operating systems, to prevent unauthenticated software and files from being loaded onto it.</t>
  <t>GP-TM-18: Ensure that the device software/firmware, its configuration and its applications have the ability to update Over-The-Air (OTA), that the update server is secure, that the update file is transmitted via a secure connection, that it does not contain sensitive data (e.g. hardcoded credentials), that it is signed by an authorised trust entity and encrypted using accepted encryption methods, and that the update package has its digital signature, signing certificate and signing certificate chain, verified by the device before the update process begins.</t>
  <t>GP-TM-19: Offer an automatic firmware update mechanism.</t>
  <t>GP-TM-20: (Procedural / Architectural) Backward compatibility of firmware updates. Automatic firmware updates should not modify user-configured preferences, security, and/or privacy settings without user notification.</t>
</list></t>

<t>NIST Software Update:</t>

<t><list style="numbers">
  <t>The ability to update the device’s software through remote (e.g., network download) and/or local means (e.g., removable media)</t>
  <t>The ability to verify and authenticate any update before installing it</t>
  <t>The ability for authorized entities to roll back updated software to a previous version</t>
  <t>The ability to restrict updating actions to authorized entities only</t>
  <t>The ability to enable or disable updating</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to:</t>
  <t>The ability to configure any remote update mechanisms to be either automatically or manually initiated for update downloads and installations</t>
  <t>The ability to enable or disable notification when an update is available and specify who or what is to be notified</t>
</list></t>

<t>ETSI Keep Software Updated:</t>

<t><list style="symbols">
  <t>Provision 5.3-1 All software components in consumer IoT devices should be securely updateable.</t>
  <t>Provision 5.3-2 When the device is not a constrained device, it shall have an update mechanism for the secure installation of updates.</t>
  <t>Provision 5.3-3 An update shall be simple for the user to apply.</t>
  <t>Provision 5.3-4 Automatic mechanisms should be used for software updates.</t>
  <t>Provision 5.3-5 The device should check after initialization, and then periodically, whether security updates are available.</t>
  <t>Provision 5.3-6 If the device supports automatic updates and/or update notifications, these should be enabled in the initialized state and configurable so that the user can enable, disable, or postpone installation of security updates and/or update notifications.</t>
  <t>Provision 5.3-7 The device shall use best practice cryptography to facilitate secure update mechanisms.</t>
  <t>Provision 5.3-8 Security updates shall be timely.</t>
  <t>Provision 5.3-9 The device should verify the authenticity and integrity of software updates.</t>
  <t>Provision 5.3-10 Where updates are delivered over a network interface, the device shall verify the authenticity and integrity of each update via a trust relationship.</t>
  <t>Provision 5.3-11 The manufacturer should inform the user in a recognizable and apparent manner that a security update is required together with information on the risks mitigated by that update.</t>
  <t>Provision 5.3-12 The device should notify the user when the application of a software update will disrupt the basic functioning of the device.</t>
  <t>Provision 5.3-13 The manufacturer shall publish, in an accessible way that is clear and transparent to the user, the defined support period.</t>
  <t>Provision 5.3-14 For constrained devices that cannot have their software updated, the rationale for the absence of software updates, the period and method of hardware replacement support and a defined support period should be published by the manufacturer in an accessible way that is clear and transparent to the user.</t>
  <t>Provision 5.3-15 For constrained devices that cannot have their software updated, the product should be isolable and the hardware replaceable.</t>
  <t>Provision 5.3-16 The model designation of the consumer IoT device shall be clearly recognizable, either by labelling on the device or via a physical interface.</t>
  <t>Provision 5.5-3 Cryptographic algorithms and primitives should be updateable.</t>
</list></t>

<t>Many fully-featured operating systems have dedicated means of implementing this requirement. The SUIT manifest (See <xref target="I-D.ietf-suit-manifest"/>) is recommended as a means of providing secure, authenticated software update, including for constrained devices. Where the software is deployed to a TEE, TEEP (See <xref target="I-D.ietf-teep-protocol"/>) is recommended for software update and management.</t>

</section>
<section anchor="configuration"><name>Configuration</name>

<t>NIST Device Configuration:</t>

<t><list style="numbers">
  <t>The ability to change the device’s software configuration settings</t>
  <t>The ability to restrict configuration changes to authorized entities only</t>
  <t>The ability for authorized entities to restore the device to a secure configuration defined by an authorized entity</t>
</list></t>

<t>ETSI defines the following configuration requirements:</t>

<t><list style="symbols">
  <t>Provision 5.12-1: Installation and maintenance of consumer IoT should involve minimal decisions by the user and should follow security best practice on usability.</t>
  <t>Provision 5.12-2 The manufacturer should provide users with guidance on how to securely set up their device.</t>
  <t>Provision 5.12-3 The manufacturer should provide users with guidance on how to check whether their device is securely set up.</t>
</list></t>

<t>Configuration can be delivered to a device either via a firmware update, such as in <xref target="I-D.ietf-suit-manifest"/>, or via a runtime configuration interface, such as <xref target="LwM2M"/>.</t>

</section>
<section anchor="resilience-to-failure"><name>Resilience to Failure</name>

<t>ENISA GP-TM-06: Enable a system to return to a state that was known to be secure, after a security breach has occured or if an upgrade has not been successful.</t>

<t>ETSI defines the following resilience requirements:</t>

<t><list style="symbols">
  <t>Provision 5.9-1: Resilience should be built in to consumer IoT devices and services, taking into account the possibility of outages of data networks and power.</t>
  <t>Provision 5.9-2: Consumer IoT devices should remain operating and locally functional in the case of a loss of network access and should recover cleanly in the case of restoration of a loss of power.</t>
  <t>Provision 5.9-3: The consumer IoT device should connect to networks in an expected, operational and stable state and in an orderly fashion, taking the capability of the infrastructure into consideration.</t>
</list></t>

<t>While there is no specificaiton for this, it is also required in <xref target="RFC9019"/></t>

</section>
<section anchor="trust-anchor-management"><name>Trust Anchor Management</name>

<t>ENISA GP-TM-07: Use protocols and mechanisms able to represent and manage trust and trust relationships.</t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships).</t>

</section>
</section>
<section anchor="default-security-privacy"><name>Default Security &amp; Privacy</name>

<section anchor="security-on-by-default"><name>Security ON by Default</name>

<t>ENISA GP-TM-08: Any applicable security features should be enabled by default, and any unused or insecure functionalities should be disabled by default.</t>

<t>NIST Logical Access to Interfaces:</t>

<t><list style="numbers">
  <t>The ability to logically or physically disable any local and network interfaces that are not necessary for the core functionality of the device</t>
  <t>The ability to logically restrict access to each network interface to only authorized entities (e.g., device authentication, user authentication)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability to enable, disable, and adjust thresholds for any ability the device might have to lock or disable an account or to delay additional authentication attempts after too many failed authentication attempts</t>
</list></t>

<t>ETSI Minimize exposed attack surfaces:</t>

<t><list style="symbols">
  <t>Provision 5.6-1: All unused network and logical interfaces shall be disabled.</t>
  <t>Provision 5.6-2: In the initialized state, the network interfaces of the device shall minimize the unauthenticated disclosure of security-relevant information.</t>
  <t>Provision 5.6-5: The manufacturer should only enable software services that are used or required for the intended use or operation of the device.</t>
  <t>Provision 5.6-6: Code should be minimized to the functionality necessary for the service/device to operate.</t>
  <t>Provision 5.6-7: Software should run with least necessary privileges, taking account of both security and functionality.</t>
</list></t>

<t>These are procedural requirements, rather than a protocol or document requirement.</t>

</section>
<section anchor="default-unique-passwords"><name>Default Unique Passwords</name>

<t>ENISA GP-TM-09: Establish hard to crack, device-individual default passwords.</t>

<t>ETSI Provision 5.1-1: Where passwords are used and in any state other than the factory default, all consumer IoT device passwords shall be unique per device or defined by the user.</t>

<t>This is a procedural requirement, rather than a protocol or document requirement.</t>

</section>
</section>
<section anchor="data-protection"><name>Data Protection</name>

<t>The data protection requirements are largely procedural/architectural. While this memo can recommend using TEEs to protect data, and TEEP (<xref target="I-D.ietf-teep-architecture"/>) to manage TEEs, implementors must choose to architect their software in such a way that TEEs are helpful in meeting these requirements.</t>

<t>ENISA Data Protection requirements:</t>

<t><list style="symbols">
  <t>GP-TM-10: Personal data must be collected and processed fairly and lawfully, it should never be collected and processed without the data subject's consent.</t>
  <t>GP-TM-11: Make sure that personal data is used for the specified purposes for which they were collected, and that any further processing of personal data is compatible and that the data subjects are well informed.</t>
  <t>GP-TM-12: Minimise the data collected and retained.</t>
  <t>GP-TM-13: IoT stakeholders must be compliant with the EU General Data Protection Regulation (GDPR).</t>
  <t>GP-TM-14: Users of IoT products and services must be able to exercise their rights to information, access, erasure, rectification, data portability, restriction of processing, objection to processing, and their right not to be evaluated on the basis of automated processing.</t>
</list></t>

<t>NIST Data Protection:</t>

<t><list style="numbers">
  <t>The ability to use demonstrably secure cryptographic modules for standardized cryptographic algorithms (e.g., encryption with authentication, cryptographic hashes, digital signature validation) to prevent the confidentiality and integrity of the device’s stored and transmitted data from being compromised</t>
  <t>The ability for authorized entities to render all data on the device inaccessible by all entities, whether previously authorized or not (e.g., through a wipe of internal storage, destruction of cryptographic keys for encrypted data)</t>
  <t>Configuration settings for use with the Device Configuration capability including, but not limited to, the ability for authorized entities to configure the cryptography use itself, such as choosing a key length</t>
</list></t>

<t>ETSI Data Protection requirements:</t>

<t><list style="symbols">
  <t>Provision 5.8-3: All external sensing capabilities of the device shall be documented in an accessible way that is clear and transparent for the user.</t>
  <t>Provision 5.11-1: The user shall be provided with functionality such that user data can be erased from the device in a simple manner.</t>
  <t>Provision 5.11-2: The consumer should be provided with functionality on the device such that personal data can be removed from associated services in a simple manner.</t>
  <t>Provision 5.11-3: Users should be given clear instructions on how to delete their personal data.</t>
  <t>Provision 5.11-4: Users should be provided with clear confirmation that personal data has been deleted from services, devices and applications.</t>
  <t>Provision 6-1: The manufacturer shall provide consumers with clear and transparent information about what personal data is processed, how it is being used, by whom, and for what purposes, for each device and service. This also applies to third parties that can be involved, including advertisers.</t>
  <t>Provision 6-2: Where personal data is processed on the basis of consumers' consent, this consent shall be obtained in a valid way.</t>
  <t>Provision 6-3: Consumers who gave consent for the processing of their personal data shall have the capability to withdraw it at any time.</t>
  <t>Provision 6-4: If telemetry data is collected from consumer IoT devices and services, the processing of personal data should be kept to the minimum necessary for the intended functionality.</t>
  <t>Provision 6-5: If telemetry data is collected from consumer IoT devices and services, consumers shall be provided with information on what telemetry data is collected, how it is being used, by whom, and for what purposes.</t>
</list></t>

</section>
<section anchor="system-safety-and-reliability"><name>System Safety and Reliability</name>

<t>Safety and reliability requirements are procedural/architectural. Implementors should ensure they have processes and architectures in place to meet these requirements.</t>

<t>ENISA Safety and Reliability requirements:</t>

<t><list style="symbols">
  <t>GP-TM-15: Design with system and operational disruption in mind, preventing the system from causing an unacceptable risk of injury or physical damage.</t>
  <t>GP-TM-16: Mechanisms for self-diagnosis and self-repair/healing to recover from failure, malfunction or a compromised state.</t>
  <t>GP-TM-17: Ensure standalone operation - essential features should continue to work with a loss of communications and chronicle negative impacts from compromised devices or cloud-based systems.</t>
</list></t>

</section>
<section anchor="authentication"><name>Authentication</name>

<t>ETSI architectural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.1-4 Where a user can authenticate against a device, the device shall provide to the user or an administrator a simple mechanism to change the authentication value used.</t>
  <t>Provision 5.1-5 When the device is not a constrained device, it shall have a mechanism available which makes brute-force attacks on authentication mechanisms via network interfaces impracticable.</t>
</list></t>

<t>EST (<eref target="https://datatracker.ietf.org/doc/html/rfc7030"/>) and LwM2M Bootstrap (<xref target="LwM2M"/>) provide a mechanism to replace trust anchors (manage trust/trust relationships) and perform other forms of credential management (Provision 5.1-4).</t>

<section anchor="align-authentication-schemes-with-threat-models"><name>Align Authentication Schemes with Threat Models</name>

<t>ENISA GP-TM-21: Design the authentication and authorisation schemes (unique per device) based on the system-level threat models.</t>

<t>This is a procedural / architectural requirement.</t>

</section>
<section anchor="password-rules"><name>Password Rules</name>

<t>ENISA applies the following requirements to Password-based authentication:</t>

<t><list style="symbols">
  <t>GP-TM-22: Ensure that default passwords and even default usernames are changed during the initial setup, and that weak, null or blank passwords are not allowed.</t>
  <t>GP-TM-23: Authentication mechanisms must use strong passwords or personal identification numbers (PINs), and should consider using two-factor authentication (2FA) or multi-factor authentication (MFA) like Smartphones, Biometrics, etc., on top of certificates.</t>
  <t>GP-TM-24: Authentication credentials shall be salted, hashed and/or encrypted.</t>
  <t>GP-TM-25: Protect against 'brute force' and/or other abusive login attempts. This protection should also consider keys stored in devices.</t>
  <t>GP-TM-26: Ensure password recovery or reset mechanism is robust and does not supply an attacker with information indicating a valid account. The same applies to key update and recovery mechanisms.</t>
</list></t>

<t>ETSI applies a the following requirements to password-based authentication:</t>

<t><list style="symbols">
  <t>Provision 5.1-1: Where passwords are used and in any state other than the factory default, all consumer IoT device passwords shall be unique per device or defined by the user.</t>
  <t>Provision 5.1-2 Where pre-installed unique per device passwords are used, these shall be generated with a mechanism that reduces the risk of automated attacks against a class or type of device.</t>
</list></t>

<t>As an alternative, implementors are encouraged to consider passwordless schemes, such as FIDO.</t>

</section>
</section>
<section anchor="authorisation"><name>Authorisation</name>

<section anchor="principle-of-least-privilege"><name>Principle of Least Privilege</name>

<t>ENISA GP-TM-27: Limit the actions allowed for a given system by Implementing fine-grained authorisation mechanisms and using the Principle of least privilege (POLP): applications must operate at the lowest privilege level possible.</t>

<t>This is a procedural / architectural requirement, however at the network level, this can be implemented using Manufacturer Usage Descriptions (see <xref target="RFC8520"/>).</t>

</section>
<section anchor="software-isolation"><name>Software Isolation</name>

<t>ENISA GP-TM-28: Device firmware should be designed to isolate privileged code, processes and data from portions of the firmware that do not need access to them. Device hardware should provide isolation concepts to prevent unprivileged from accessing security sensitive code.</t>

<t>Implementors should use TEEs to address this requirement. The provisioning and management of TEEs can be accomplished using TEEP (see <xref target="I-D.ietf-teep-architecture"/>).</t>

<t>ETSI Provision 5.6-8: The device should include a hardware-level access control mechanism for memory.</t>

<t>Implementors should enable and correctly configure the MPU(s) and MMU(s) that are present in most devices.</t>

</section>
<section anchor="access-control"><name>Access Control</name>

<t>ENISA Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-29: Data integrity and confidentiality must be enforced by access controls. When the subject requesting access has been authorised to access particular processes, it is necessary to enforce the defined security policy.</t>
  <t>GP-TM-30: Ensure a context-based security and privacy that reflects different levels of importance.</t>
</list></t>

<t>These requirements are complex and require a variety of technologies to implement. Use of TEEs can provide a building block for these requirements, but is not sufficient in itself to meet these requiremnents.</t>

<t>ETSI Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-4: Access to device functionality via a network interface in the initialized state should only be possible after authentication on that interface.</t>
  <t>Provision 5.5-5: Device functionality that allows security-relevant changes in configuration via a network interface shall only be accessible after authentication. The exception is for network service protocols that are relied upon by the device and where the manufacturer cannot guarantee what configuration will be required for the device to operate.</t>
  <t>Provision 5.5-5: Device functionality that allows security-relevant changes in configuration via a network interface shall only be accessible after authentication. The exception is for network service protocols that are relied upon by the device and where the manufacturer cannot guarantee what configuration will be required for the device to operate.</t>
</list></t>

</section>
</section>
<section anchor="environmental-and-physical-security"><name>Environmental and Physical Security</name>

<t>ENISA defines the following physical security requirements. These are hardware-architectural requirements and not covered by protocol and format specifications.</t>

<t><list style="symbols">
  <t>GP-TM-31: Measures for tamper protection and detection. Detection and reaction to hardware
tampering should not rely on network connectivity.</t>
  <t>GP-TM-32: Ensure that the device cannot be easily disassembled and that the data storage medium is encrypted at rest and cannot be easily removed.</t>
  <t>GP-TM-33: Ensure that devices only feature the essential physical external ports (such as USB) necessary for them to function and that the test/debug modes are secure, so they cannot be used to maliciously access the devices. In general, lock down physical ports to only trusted connections.</t>
</list></t>

<t>ETSI defines the following physical security requirements:</t>

<t><list style="symbols">
  <t>Provision 5.6-3: Device hardware should not unnecessarily expose physical interfaces to attack.</t>
  <t>Provision 5.6-4: Where a debug interface is physically accessible, it shall be disabled in software.</t>
</list></t>

</section>
<section anchor="cryptography"><name>Cryptography</name>

<t>ENISA makes the following architectural cryptography requirements for IoT devices:</t>

<t><list style="symbols">
  <t>GP-TM-34: Ensure a proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of data and information (including control messages), in transit and in rest. Ensure the proper selection of standard and strong encryption algorithms and strong keys, and disable insecure protocols. Verify the robustness of the implementation.</t>
  <t>GP-TM-35: Cryptographic keys must be securely managed.</t>
  <t>GP-TM-36: Build devices to be compatible with lightweight encryption and security techniques.</t>
  <t>GP-TM-37: Support scalable key management schemes.</t>
</list></t>

<t>ETSI makes the following architectural cryptography requirement for IoT devices:</t>

<t><list style="symbols">
  <t>Provision 5.1-3: Authentication mechanisms used to authenticate users against a device shall use best practice cryptography, appropriate to the properties of the technology, risk and usage.</t>
  <t>Provision 5.4-3: Hard-coded critical security parameters in device software source code shall not be used.</t>
  <t>Provision 5.4-4: Any critical security parameters used for integrity and authenticity checks of software updates and for protection of communication with associated services in device software shall be unique per device and shall be produced with a mechanism that reduces the risk of automated attacks against classes of devices.</t>
  <t>Provision 5.5-3: Cryptographic algorithms and primitives should be updateable.</t>
</list></t>

</section>
<section anchor="secure-and-trusted-communications"><name>Secure and Trusted Communications</name>

<section anchor="data-security"><name>Data Security</name>

<t>ENISA GP-TM-38: Guarantee the different security aspects -confidentiality (privacy), integrity, availability and authenticity- of the information in transit on the networks or stored in the IoT application or in the Cloud.</t>

<t>ETSI Data Security Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-6: Critical security parameters should be encrypted in transit, with such encryption appropriate to the properties of the technology, risk and usage.</t>
  <t>Provision 5.5-7 The consumer IoT device shall protect the confidentiality of critical security parameters that are communicated via remotely accessible network interfaces.</t>
  <t>Provision 5.5-8 The manufacturer shall follow secure management processes for critical security parameters that relate to the device.</t>
  <t>Provision 5.8-1 The confidentiality of personal data transiting between a device and a service, especially associated services, should be protected, with best practice cryptography.</t>
  <t>Provision 5.8-2 The confidentiality of sensitive personal data communicated between the device and associated services shall be protected, with cryptography appropriate to the properties of the technology and usage.</t>
</list></t>

<t>This Data Security requirement can be fulfilled using COSE <xref target="RFC8152"/> for ensuring the authenticity, integrity, and confidentiality of data either in transit or at rest. Secure Transport (see <xref target="secure-transport"/>) technologies can be used to protect data in transit.</t>

</section>
<section anchor="secure-transport"><name>Secure Transport</name>

<t>ENISA Requirements:</t>

<t><list style="symbols">
  <t>GP-TM-39: Ensure that communication security is provided using state-of-the-art, standardised security protocols, such as TLS for encryption.</t>
  <t>GP-TM-40: Ensure credentials are not exposed in internal or external network traffic.</t>
</list></t>

<t>ETSI Requirements:</t>

<t><list style="symbols">
  <t>Provision 5.5-1: The consumer IoT device shall use best practice cryptography to communicate securely.</t>
  <t>Provision 5.5-2: The consumer IoT device should use reviewed or evaluated implementations to deliver network and security functionalities, particularly in the field of cryptography.</t>
  <t>Provision 5.5-4: Access to device functionality via a network interface in the initialized state should only be possible after authentication on that interface.</t>
</list></t>

<t>This requirement is satisfied by several standards:</t>

<t><list style="symbols">
  <t>TLS (<xref target="RFC8446"/>).</t>
  <t>DTLS (<xref target="RFC9147"/>).</t>
  <t>QUIC (<xref target="RFC9000"/>).</t>
  <t>OSCORE (<xref target="RFC9203"/>).</t>
</list></t>

</section>
<section anchor="data-authenticity"><name>Data Authenticity</name>

<t>ENISA GP-TM-41: Guarantee data authenticity to enable reliable exchanges from data emission to data reception. Data should always be signed whenever and wherever it is captured and stored.</t>

<t>The authenticity of data can be protected using COSE <xref target="RFC8152"/>.</t>

<t>ENISA GP-TM-42: Do not trust data received and always verify any interconnections. Discover, identify and verify/authenticate the devices connected to the network before trust can be established, and preserve
their integrity for reliable solutions and services.</t>

<t>Verifying communication partners can be done in many ways. Key technologies supporting authentication of communication partners are:</t>

<t><list style="symbols">
  <t>RATS: Remote attestation of a communication partner (See <xref target="I-D.ietf-rats-architecture"/>).</t>
  <t>TLS/DTLS: Mutual authentication of communication partners (See <xref target="RFC8446"/> / <xref target="RFC9147"/>).</t>
  <t>ATLS: Application-layer TLS for authenticating a connection that may traverse multiple secure transport connections.</t>
  <t>Attested TLS: The use of attestation in session establishment in TLS (See <xref target="I-D.fossati-tls-attestation"/>).</t>
</list></t>

</section>
<section anchor="least-privilege-communication"><name>Least Privilege Communication</name>

<t>ENISA GP-TM-43: IoT devices should be restrictive rather than permissive in communicating.</t>

<t>This Requirement can be enabled and enforced using Manufacturer Usage Descriptions, which codify expected communication (See <xref target="RFC8520"/>)</t>

<t>ENISA GP-TM-44: Make intentional connections. Prevent unauthorised connections to it or other devices the
product is connected to, at all levels of the protocols.</t>

<t>This requirement can be satisfied through authenticating connections (TLS / DTLS mutual authentication. See <xref target="RFC8446"/> / <xref target="RFC9147"/>) and declaring communication patterns (Manufacturer Usage Descriptions. See <xref target="RFC8520"/>)</t>

<t>Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-45: Disable specific ports and/or network connections for selective connectivity.</t>
  <t>ENISA GP-TM-46: Rate limiting. Controlling the traffic sent or received by a network to reduce the risk of automated attacks.</t>
</list></t>

</section>
</section>
<section anchor="secure-interfaces-and-network-services"><name>Secure Interfaces and network services</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>GP-TM-47: Risk Segmentation. Splitting network elements into separate components to help isolate security breaches and minimise the overall risk.</t>
  <t>GP-TM-48: Protocols should be designed to ensure that, if a single device is compromised, it does not affect the whole set.</t>
  <t>GP-TM-49: Avoid provisioning the same secret key in an entire product family, since compromising a single device would be enough to expose the rest of the product family.</t>
  <t>GP-TM-50: Ensure only necessary ports are exposed and available.</t>
  <t>GP-TM-51: Implement a DDoS-resistant and Load-Balancing infrastructure.</t>
  <t>GP-TM-53: Avoid security issues when designing error messages.</t>
</list></t>

<t>ETSI Architectural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.1-5 When the device is not a constrained device, it shall have a mechanism available which makes brute-force attacks on authentication mechanisms via network interfaces impracticable.</t>
</list></t>

<section anchor="encrypted-user-sessions"><name>Encrypted User Sessions</name>

<t>ENISA GP-TM-52: Ensure web interfaces fully encrypt the user session, from the device to the backend services, and that they are not susceptible to XSS, CSRF, SQL injection, etc.</t>

<t>This requirement can be partially satisfied through use of TLS or QUIC (See <xref target="RFC8446"/> and <xref target="RFC9000"/>)</t>

</section>
</section>
<section anchor="secure-input-and-output-handling"><name>Secure input and output handling</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-54: Data input validation (ensuring that data is safe prior to use) and output filtering.</t>

<t>ETSI Provision 5.13-1: The consumer IoT device software shall validate data input via user interfaces or transferred via Application Programming Interfaces (APIs) or between networks in services and devices.</t>

</section>
<section anchor="logging"><name>Logging</name>

<t>Architectural / Procedural requirements:</t>

<t>ENISA GP-TM-55: Implement a logging system that records events relating to user authentication, management of accounts and access rights, modifications to security rules, and the functioning of the system. Logs must be preserved on durable storage and retrievable via authenticated connections.</t>

<t>NIST Cybersecurity State Awareness</t>

<t><list style="numbers">
  <t>The ability to report the device’s cybersecurity state</t>
  <t>The ability to differentiate between when a device will likely operate as expected from when it may be in a degraded cybersecurity state</t>
  <t>The ability to restrict access to the state indicator so only authorized entities can view it</t>
  <t>The ability to prevent any entities (authorized or unauthorized) from editing the state except for those entities that are responsible for maintaining the device’s state information</t>
  <t>The ability to make the state information available to a service on another device, such as an event/state log server</t>
</list></t>

<t>ETSI defines the following logging requirements:</t>

<t><list style="symbols">
  <t>Provision 5.7-2: If an unauthorized change is detected to the software, the device should alert the user and/or administrator to the issue and should not connect to wider networks than those necessary to perform the alerting function.</t>
</list></t>

<t>Certain logs and indicators of cybersecurity state can be transported via RATS: See <xref target="I-D.ietf-rats-eat"/>. Where associated with SUIT firmware updates, logs can be transported using SUIT Reports. See <xref target="I-D.ietf-suit-report"/>.</t>

</section>
<section anchor="monitoring-and-auditing"><name>Monitoring and Auditing</name>

<t>ENISA Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>ENISA GP-TM-56: Implement regular monitoring to verify the device behaviour, to detect malware and to discover integrity errors.</t>
  <t>ENISA GP-TM-57: Conduct periodic audits and reviews of security controls to ensure that the controls are effective. Perform penetration tests at least biannually.</t>
</list></t>

<t>ETSI Architectural / Procedural requirements:</t>

<t><list style="symbols">
  <t>Provision 5.2-1: The manufacturer shall make a vulnerability disclosure policy publicly available.</t>
  <t>Provision 5.2-2: Disclosed vulnerabilities should be acted on in a timely manner.</t>
  <t>Provision 5.2-3: Manufacturers should continually monitor for, identify and rectify security vulnerabilities within products and services they sell, produce, have produced and services they operate during the defined support period.</t>
  <t>Provision 5.6-9: The manufacturer should follow secure development processes for software deployed on the device.</t>
  <t>Provision 5.10-1 If telemetry data is collected from consumer IoT devices and services, such as usage and measurement data, it should be examined for security anomalies.</t>
</list></t>

<t>Supply Chain Integrity, Transparency, and Trust (<xref target="I-D.ietf-scitt-architecture"/>) enables monitoring for inclusion of disclosed vulnerabilities within products and services, so can be used to satisfy Provision 5.2-3.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>No additional security considerations are required; they are laid out in the preceeding sections.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC4122'>
  <front>
    <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
    <author fullname='P. Leach' initials='P.' surname='Leach'/>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <author fullname='R. Salz' initials='R.' surname='Salz'/>
    <date month='July' year='2005'/>
    <abstract>
      <t>This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
      <t>This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4122'/>
  <seriesInfo name='DOI' value='10.17487/RFC4122'/>
</reference>

<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC8995'>
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname='M. Pritikin' initials='M.' surname='Pritikin'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='T. Eckert' initials='T.' surname='Eckert'/>
    <author fullname='M. Behringer' initials='M.' surname='Behringer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8995'/>
  <seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>

<reference anchor='RFC7030'>
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname='M. Pritikin' initials='M.' role='editor' surname='Pritikin'/>
    <author fullname='P. Yee' initials='P.' role='editor' surname='Yee'/>
    <author fullname='D. Harkins' initials='D.' role='editor' surname='Harkins'/>
    <date month='October' year='2013'/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7030'/>
  <seriesInfo name='DOI' value='10.17487/RFC7030'/>
</reference>

<reference anchor='RFC8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC9019'>
  <front>
    <title>A Firmware Update Architecture for Internet of Things</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Brown' initials='D.' surname='Brown'/>
    <author fullname='M. Meriac' initials='M.' surname='Meriac'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>Vulnerabilities in Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism suitable for devices with resource constraints. Incorporating such an update mechanism is a fundamental requirement for fixing vulnerabilities, but it also enables other important capabilities such as updating configuration settings and adding new functionality.</t>
      <t>In addition to the definition of terminology and an architecture, this document provides the motivation for the standardization of a manifest format as a transport-agnostic means for describing and protecting firmware updates.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9019'/>
  <seriesInfo name='DOI' value='10.17487/RFC9019'/>
</reference>

<reference anchor='RFC9203'>
  <front>
    <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
    <author fullname='F. Palombini' initials='F.' surname='Palombini'/>
    <author fullname='L. Seitz' initials='L.' surname='Seitz'/>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <author fullname='M. Gunnarsson' initials='M.' surname='Gunnarsson'/>
    <date month='August' year='2022'/>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9203'/>
  <seriesInfo name='DOI' value='10.17487/RFC9203'/>
</reference>

<reference anchor='RFC8152'>
  <front>
    <title>CBOR Object Signing and Encryption (COSE)</title>
    <author fullname='J. Schaad' initials='J.' surname='Schaad'/>
    <date month='July' year='2017'/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8152'/>
  <seriesInfo name='DOI' value='10.17487/RFC8152'/>
</reference>

<reference anchor='RFC9000'>
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname='J. Iyengar' initials='J.' role='editor' surname='Iyengar'/>
    <author fullname='M. Thomson' initials='M.' role='editor' surname='Thomson'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9000'/>
  <seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>

<reference anchor='RFC9124'>
  <front>
    <title>A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices</title>
    <author fullname='B. Moran' initials='B.' surname='Moran'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <date month='January' year='2022'/>
    <abstract>
      <t>Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.</t>
      <t>One component of such a firmware update is a concise and machine-processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9124'/>
  <seriesInfo name='DOI' value='10.17487/RFC9124'/>
</reference>

<reference anchor='RFC9147'>
  <front>
    <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='N. Modadugu' initials='N.' surname='Modadugu'/>
    <date month='April' year='2022'/>
    <abstract>
      <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
      <t>This document obsoletes RFC 6347.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9147'/>
  <seriesInfo name='DOI' value='10.17487/RFC9147'/>
</reference>

<reference anchor='RFC9397'>
  <front>
    <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
    <author fullname='M. Pei' initials='M.' surname='Pei'/>
    <author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'/>
    <author fullname='D. Thaler' initials='D.' surname='Thaler'/>
    <author fullname='D. Wheeler' initials='D.' surname='Wheeler'/>
    <date month='July' year='2023'/>
    <abstract>
      <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment. This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9397'/>
  <seriesInfo name='DOI' value='10.17487/RFC9397'/>
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specs/FDO/FIDO-Device-Onboard-RD-v1.0-20201202.html">
  <front>
    <title>FIDO Device Onboarding</title>
    <author initials="" surname="FIDO Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="LwM2M" target="http://openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.pdf">
  <front>
    <title>LwM2M Core Specification</title>
    <author initials="" surname="OMA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ENISA-Baseline" target="https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/">
  <front>
    <title>Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures</title>
    <author initials="" surname="ENISA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ETSI-Baseline" target="https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf">
  <front>
    <title>Cyber Security for Consumer Internet of Things: Baseline Requirements</title>
    <author initials="" surname="ETSI">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NIST-Baseline" target="https://www.nist.gov/publications/iot-device-cybersecurity-capability-core-baseline">
  <front>
    <title>IoT Device Cybersecurity Capability Core Baseline</title>
    <author initials="" surname="NIST">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Mediatek USA</organization>
      </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='8' month='July' year='2024'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-29'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='8' month='July' year='2024'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.  Software updates and Trusted Invocation both tend to
   use sequences of common operations, so the manifest encodes those
   sequences of operations, rather than declaring the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-26'/>
   
</reference>


<reference anchor='I-D.ietf-sacm-coswid'>
   <front>
      <title>Concise Software Identification Tags</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Jessica Fitzgerald-McKay' initials='J.' surname='Fitzgerald-McKay'>
         <organization>National Security Agency</organization>
      </author>
      <author fullname='Charles Schmidt' initials='C.' surname='Schmidt'>
         <organization>The MITRE Corporation</organization>
      </author>
      <author fullname='David Waltermire' initials='D.' surname='Waltermire'>
         <organization>National Institute of Standards and Technology</organization>
      </author>
      <date day='24' month='February' year='2023'/>
      <abstract>
	 <t>ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles.  SWID tag representations can be too large for devices with network and storage constraints.  This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags.  CoSWID supports a set of semantics and features that are similar to those for SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory-efficient format.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sacm-coswid-24'/>
   
</reference>


<reference anchor='I-D.birkholz-rats-corim'>
   <front>
      <title>Concise Reference Integrity Manifest</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>arm</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>arm</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='11' month='July' year='2022'/>
      <abstract>
	 <t>   Remote Attestation Procedures (RATS) enable Relying Parties to assess
   the trustworthiness of a remote Attester and therefore to decide
   whether to engage in secure interactions with it.  Evidence about
   trustworthiness can be rather complex and it is deemed unrealistic
   that every Relying Party is capable of the appraisal of Evidence.
   Therefore that burden is typically offloaded to a Verifier.  In order
   to conduct Evidence appraisal, a Verifier requires not only fresh
   Evidence from an Attester, but also trusted Endorsements and
   Reference Values from Endorsers and Reference Value Providers, such
   as manufacturers, distributors, or device owners.  This document
   specifies Concise Reference Integrity Manifests (CoRIM) that
   represent Endorsements and Reference Values in CBOR format.
   Composite devices or systems are represented by a collection of
   Concise Module Identifiers (CoMID) and Concise Software Identifiers
   (CoSWID) bundled in a CoRIM document.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-birkholz-rats-corim-03'/>
   
</reference>


<reference anchor='I-D.ietf-teep-architecture'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Architecture</title>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>A Trusted Execution Environment (TEE) is an environment that enforces the following: any code within the environment cannot be tampered with, and any data used by such code cannot be read or tampered with by any code outside the environment.  This architecture document discusses the motivation for designing and standardizing a protocol for managing the lifecycle of Trusted Applications running inside such a TEE.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-architecture-19'/>
   
</reference>


<reference anchor='I-D.ietf-teep-protocol'>
   <front>
      <title>Trusted Execution Environment Provisioning (TEEP) Protocol</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Mingliang Pei' initials='M.' surname='Pei'>
         <organization>Broadcom</organization>
      </author>
      <author fullname='Dave Wheeler' initials='D. M.' surname='Wheeler'>
         <organization>Amazon</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Akira Tsukamoto' initials='A.' surname='Tsukamoto'>
         <organization>ALAXALA Networks Corp.</organization>
      </author>
      <date day='19' month='May' year='2024'/>
      <abstract>
	 <t>   This document specifies a protocol that installs, updates, and
   deletes Trusted Components in a device with a Trusted Execution
   Environment (TEE).  This specification defines an interoperable
   protocol for managing the lifecycle of Trusted Components.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teep-protocol-19'/>
   
</reference>


<reference anchor='I-D.ietf-rats-architecture'>
   <front>
      <title>Remote ATtestation procedureS (RATS) Architecture</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Dave Thaler' initials='D.' surname='Thaler'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Ned Smith' initials='N.' surname='Smith'>
         <organization>Intel Corporation</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='28' month='September' year='2022'/>
      <abstract>
	 <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-architecture-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-report'>
   <front>
      <title>Secure Reporting of Update Status</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <date day='8' month='July' year='2024'/>
      <abstract>
	 <t>   The Software Update for the Internet of Things (SUIT) manifest
   provides a way for many different update and boot workflows to be
   described by a common format.  However, this does not provide a
   feedback mechanism for developers in the event that an update or boot
   fails.

   This specification describes a lightweight feedback mechanism that
   allows a developer in possession of a manifest to reconstruct the
   decisions made and actions performed by a manifest processor.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-report-09'/>
   
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Arto Niemi' initials='A.' surname='Niemi'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Thomas Fossati' initials='T.' surname='Fossati'>
         <organization>Linaro</organization>
      </author>
      <date day='8' month='July' year='2024'/>
      <abstract>
	 <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-07'/>
   
</reference>


<reference anchor='I-D.ietf-scitt-architecture'>
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Antoine Delignat-Lavaud' initials='A.' surname='Delignat-Lavaud'>
         <organization>Microsoft Research</organization>
      </author>
      <author fullname='Cedric Fournet' initials='C.' surname='Fournet'>
         <organization>Microsoft Research</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>ARM</organization>
      </author>
      <author fullname='Steve Lasker' initials='S.' surname='Lasker'>
         <organization>DataTrails</organization>
      </author>
      <date day='8' month='July' year='2024'/>
      <abstract>
	 <t>   Traceability of physical and digital Artifacts in supply chains is a
   long-standing, but increasingly serious security concern.  The rise
   in popularity of verifiable data structures as a mechanism to make
   actors more accountable for breaching their compliance promises has
   found some successful applications to specific use cases (such as the
   supply chain for digital certificates), but lacks a generic and
   scalable architecture that can address a wider range of use cases.

   This document defines a generic, interoperable and scalable
   architecture to enable transparency across any supply chain with
   minimum adoption barriers.  It provides flexibility, enabling
   interoperability across different implementations of Transparency
   Services with various auditing and compliance requirements.  Issuers
   can register their Signed Statements on any Transparency Service,
   with the guarantee that all Auditors and Verifiers will be able to
   verify them.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-scitt-architecture-07'/>
   
</reference>


<reference anchor="IoTopia" target="https://globalplatform.org/iotopia/mud-file-service/">
  <front>
    <title>Global Platform Iotopia</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

