<?xml version='1.0' encoding='UTF-8'?>

<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-scitt-architecture-22" number="9943" updates="" obsoletes="" xml:lang="en" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">

  <front>
    <title abbrev="SCITT Architecture">An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
    <seriesInfo name="RFC" value="9943"/>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>antdl@microsoft.com</email>
      </address>
    </author>
    <author initials="C." surname="Fournet" fullname="Cédric Fournet">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>fournet@microsoft.com</email>
      </address>
    </author>
    <author initials="Y." surname="Deshpande" fullname="Yogesh Deshpande">
      <organization>ARM</organization>
      <address>
        <postal>
          <street>110 Fulbourn Road</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>United Kingdom</country>
        </postal>
        <email>yogesh.deshpande@arm.com</email>
      </address>
    </author>
    <author initials="S." surname="Lasker" fullname="Steve Lasker">
      <organization/>
      <address>
        <email>stevenlasker@hotmail.com</email>
      </address>
    </author>
    <date year="2026" month="April"/>

    <area>SEC</area>
    <workgroup>scitt</workgroup>



<keyword>COSE</keyword>

    <abstract>
<t>Traceability in supply chains is a growing security concern.
While Verifiable Data Structures (VDSs) have addressed specific issues, such as equivocation over digital certificates, they lack a universal architecture for all supply chains.
This document defines such an architecture for single-issuer signed statement transparency.
It ensures extensibility and interoperability between different transparency services as well as compliance with various auditing procedures and regulatory requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SCITT Working Group mailing list (<eref target="mailto:scitt@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/scitt/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/scitt/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture"/>.</t>
    </note>
  </front>
  <middle>
    <?line 163?>

<section anchor="sec-introduction">
      <name>Introduction</name>
      <t>This document defines an architecture, a base set of extensible message structures, and associated flows to make signed content transparent via VDSs maintained by corresponding transparency services.
The goal of the transparency enabled by the Supply Chain Integrity, Transparency, and Trust (SCITT) architecture is to enhance auditability and accountability for single-issuer signed content (statements) that are about supply chain commodities (artifacts).</t>
      <t>Registering signed statements with a Transparency Service (TS) is akin to a notarization procedure.
TSs confirm a policy is met before recording the statement on the ledger.
The SCITT ledger represents a linear and irrevocable history of statements made.
Once the signed statement is registered, the TS issues a receipt.</t>
      <t>Similar approaches have been implemented for specific classes of artifacts, such as Certificate Transparency (CT) <xref target="RFC9162"/>.
The SCITT approach follows a more generic paradigm than previous approaches.
This "content-agnostic" approach allows TSs to be either integrated in existing solutions or an initial part of new emerging systems.
Extensibility is a vital feature of the SCITT architecture, so that requirements from various applications can be accommodated while always ensuring interoperability with respect to registration procedures and corresponding auditability and accountability.
For simplicity, the scope of this document is limited to use cases originating from the software supply chain domain.  However, the specification defined is applicable to any other type of supply chain statements (also referred to as "value-add graphs"), for example, statements about hardware supply chains.</t>
      <t>This document also defines message structures for signed statements and transparent statements, which embed CBOR Object Signing and Encryption (COSE) receipts <xref target="RFC9942"/>, i.e., signed Verifiable Data Structure Proofs (VDP).
These message structures are based on the Concise Binary Object Representation (CBOR) Standard <xref target="STD94"/> and corresponding signing is facilitated via the COSE Standard <xref target="STD96"/>.
The message structures are defined using the Concise Data Definition Language (CDDL) <xref target="RFC8610"/>.
The signed statements and receipts are, respectively, based on the COSE_Sign1 specification in Section <xref section="4.2" sectionFormat="bare" target="RFC9052"/> of RFC 9052 <xref target="STD96"/> and on COSE receipts <xref target="RFC9942"/>.
The application-domain-agnostic nature of COSE_Sign1 and its extensibility through COSE header parameters are prerequisites for implementing the interoperable message layer defined in this document.</t>
      <t>In summary, this specification supports relying parties obtaining proof that signed statements were recorded and checked for their validity at the time they were registered.
How these statements are managed or stored as well as how participating entities discover and notify each other of changes is out of scope of this document.</t>
      <section anchor="sec-requirements-notation">
        <name>Requirements Notation</name>
        <t>
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
    NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="sec-software-supply-chain-scope">
      <name>Software Supply Chain Scope</name>
      <t>To illustrate the applicability of the SCITT architecture and its messages, this section details the exemplary context of Software Supply Chain (SSC) use cases.
The building blocks provided by the SCITT architecture are not restricted to SSC use cases.
SSCs serve as useful application guidance and first usage scenarios.</t>
      <section anchor="sec-generic-ssc-problem-statement">
        <name>Generic SSC Problem Statement</name>
        <t>Supply chain security is a prerequisite to protecting consumers and minimizing economic, public health, and safety threats.
Supply chain security has historically focused on risk management practices to safeguard logistics, meet regulatory requirements, forecast demand, and optimize inventory.
While these elements are foundational to a healthy supply chain, an integrated cyber-security-based perspective of the SSCs remains broadly undefined.
Recently, the global community has experienced numerous supply chain attacks targeting weaknesses in SSCs.
	As illustrated in <xref target="lifecycle-threats"/>, an SSC attack may leverage one or more life-cycle stages and directly or indirectly target the component.</t>

<!--[rfced] We had the following questions related to SVG used
     throughout the document:

a) Please review our update to Figure 1 from "3rd-party" to
"third-party".  It looks like making this change may have affected the
spacing of that sentence.  Please regenerate.

b) We note that the text within at least one (maybe more) of the SVG
figures is not able to be selected.  Is it possible to modify the SVG
using your preferred SVG editing software to improve the rendering of
the string in the SVG?

Here is an example of SVG where the strings within the SVG are
selectable and searchable:

https://www.rfc-editor.org/rfc/rfc9576.html#figure-1


-->

        <figure anchor="lifecycle-threats">
          <name>Example SSC Life-Cycle Threats</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="752" width="520" viewBox="0 0 520 752" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,80 L 8,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 8,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 8,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 8,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 8,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 8,720" fill="none" stroke="black"/>
                <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
                <path d="M 56,144 L 56,176" fill="none" stroke="black"/>
                <path d="M 56,240 L 56,272" fill="none" stroke="black"/>
                <path d="M 56,336 L 56,368" fill="none" stroke="black"/>
                <path d="M 56,432 L 56,464" fill="none" stroke="black"/>
                <path d="M 56,528 L 56,560" fill="none" stroke="black"/>
                <path d="M 56,624 L 56,656" fill="none" stroke="black"/>
                <path d="M 104,80 L 104,144" fill="none" stroke="black"/>
                <path d="M 104,176 L 104,240" fill="none" stroke="black"/>
                <path d="M 104,272 L 104,336" fill="none" stroke="black"/>
                <path d="M 104,368 L 104,432" fill="none" stroke="black"/>
                <path d="M 104,464 L 104,528" fill="none" stroke="black"/>
                <path d="M 104,560 L 104,624" fill="none" stroke="black"/>
                <path d="M 104,656 L 104,720" fill="none" stroke="black"/>
                <path d="M 8,80 L 104,80" fill="none" stroke="black"/>
                <path d="M 8,144 L 104,144" fill="none" stroke="black"/>
                <path d="M 8,176 L 104,176" fill="none" stroke="black"/>
                <path d="M 8,240 L 104,240" fill="none" stroke="black"/>
                <path d="M 8,272 L 104,272" fill="none" stroke="black"/>
                <path d="M 8,336 L 104,336" fill="none" stroke="black"/>
                <path d="M 8,368 L 104,368" fill="none" stroke="black"/>
                <path d="M 8,432 L 104,432" fill="none" stroke="black"/>
                <path d="M 8,464 L 104,464" fill="none" stroke="black"/>
                <path d="M 8,528 L 104,528" fill="none" stroke="black"/>
                <path d="M 8,560 L 104,560" fill="none" stroke="black"/>
                <path d="M 8,624 L 104,624" fill="none" stroke="black"/>
                <path d="M 8,656 L 104,656" fill="none" stroke="black"/>
                <path d="M 8,720 L 104,720" fill="none" stroke="black"/>
                <g class="text">
                  <text x="60" y="36">Dependencies</text>
                  <text x="208" y="36">Malicious</text>
                  <text x="288" y="36">third-party</text>
                  <text x="360" y="36">package</text>
                  <text x="404" y="36">or</text>
                  <text x="448" y="36">version</text>
                  <text x="52" y="116">Code</text>
                  <text x="212" y="116">Compromise</text>
                  <text x="284" y="116">source</text>
                  <text x="344" y="116">control</text>
                  <text x="208" y="196">Malicious</text>
                  <text x="284" y="196">plug-ins</text>
                  <text x="52" y="212">Commit</text>
                  <text x="208" y="212">Malicious</text>
                  <text x="276" y="212">commit</text>
                  <text x="196" y="292">Modify</text>
                  <text x="248" y="292">build</text>
                  <text x="296" y="292">tasks</text>
                  <text x="332" y="292">or</text>
                  <text x="360" y="292">the</text>
                  <text x="400" y="292">build</text>
                  <text x="472" y="292">environment</text>
                  <text x="56" y="308">Build</text>
                  <text x="196" y="308">Poison</text>
                  <text x="240" y="308">the</text>
                  <text x="280" y="308">build</text>
                  <text x="364" y="308">agent/compiler</text>
                  <text x="196" y="324">Tamper</text>
                  <text x="244" y="324">with</text>
                  <text x="288" y="324">build</text>
                  <text x="336" y="324">cache</text>
                  <text x="212" y="388">Compromise</text>
                  <text x="276" y="388">test</text>
                  <text x="320" y="388">tools</text>
                  <text x="60" y="404">Test</text>
                  <text x="224" y="404">Falsification</text>
                  <text x="292" y="404">of</text>
                  <text x="324" y="404">test</text>
                  <text x="376" y="404">results</text>
                  <text x="184" y="484">Use</text>
                  <text x="216" y="484">bad</text>
                  <text x="268" y="484">packages</text>
                  <text x="56" y="500">Package</text>
                  <text x="212" y="500">Compromise</text>
                  <text x="288" y="500">package</text>
                  <text x="364" y="500">repository</text>
                  <text x="196" y="580">Modify</text>
                  <text x="256" y="580">release</text>
                  <text x="312" y="580">tasks</text>
                  <text x="56" y="596">Release</text>
                  <text x="196" y="596">Modify</text>
                  <text x="248" y="596">build</text>
                  <text x="292" y="596">drop</text>
                  <text x="336" y="596">prior</text>
                  <text x="372" y="596">to</text>
                  <text x="416" y="596">release</text>
                  <text x="52" y="692">Deploy</text>
                  <text x="196" y="692">Tamper</text>
                  <text x="244" y="692">with</text>
                  <text x="308" y="692">versioning</text>
                  <text x="368" y="692">and</text>
                  <text x="412" y="692">update</text>
                  <text x="472" y="692">process</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
      Dependencies        Malicious third-party package or version
           |
           |
     +-----+-----+
     |           |
     |   Code    |        Compromise source control
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Malicious plug-ins
     |  Commit   |        Malicious commit
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify build tasks or the build environment
     |   Build   |        Poison the build agent/compiler
     |           |        Tamper with build cache
     +-----+-----+
           |
     +-----+-----+
     |           |        Compromise test tools
     |    Test   |        Falsification of test results
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Use bad packages
     |  Package  |        Compromise package repository
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |        Modify release tasks
     |  Release  |        Modify build drop prior to release
     |           |
     +-----+-----+
           |
     +-----+-----+
     |           |
     |  Deploy   |        Tamper with versioning and update process
     |           |
     +-----------+
]]></artwork>
          </artset>
        </figure>
        <t>DevSecOps, as defined in <xref target="NIST.SP.800-204C"/>, often depends on third-party and open-source software.
These dependencies can be quite complex throughout the supply chain, so checking provenance and traceability throughout their life cycle is difficult.
There is a need for manageable auditability and accountability of digital products.
Typically, the range of types of statements about digital products (and their dependencies) is vast, heterogeneous, and can differ between community policy requirements.
Taking the type and structure of all statements about digital products into account might not be possible.
Examples of statements may include commit signatures, build environment and parameters, Software Bill of Materials (SBOM), static and dynamic application security testing results, fuzz testing results, release approvals, deployment records, vulnerability scan results, and patch logs.
Consequently, instead of trying to understand and describe the detailed syntax and semantics of every type of statement about digital products, the SCITT architecture focuses on ensuring statement authenticity, ensuring visibility/transparency, and intends to provide scalable accessibility.
Threats and practical issues can also arise from unintended side effects of using security techniques outside their proper bounds.
For instance, digital signatures may fail to verify past their expiry date even though the signed item itself remains completely valid.
Or a signature may verify even though the information it is securing is now found unreliable but fine-grained revocation is too hard.</t>
        <t>Lastly, where data exchange underpins serious business decision-making, it is important to hold the producers of those data to a higher standard of auditability.
The SCITT architecture provides mechanisms and structures for ensuring that the makers of authoritative statements can be held accountable and not hide or shred the evidence when it becomes inconvenient later.</t>
        <t>The following use cases illustrate the scope of SCITT and elaborate on the generic problem statement above.</t>
      </section>
      <section anchor="sec-eclectic-ssc-use-cases">
        <name>Eclectic SSC Use Cases</name>
        <t>The three following use cases are a specialization derived from the generic problem statement above.</t>
        <section anchor="sec-security-analysis-of-a-software-product">
          <name>Security Analysis of a Software Product</name>
          <t>A released software product is often accompanied by a set of complementary statements about its security properties.
This gives enough confidence to both producers and consumers that the released software meets the expected security standards and is suitable to use.</t>
          <t>Subsequently, multiple security researchers often run sophisticated security analysis tools on the same product.
The intention is to identify any security weaknesses or vulnerabilities in the package.</t>
          <t>Initially, a particular analysis can identify a simple weakness in a software component.
Over a period of time, a statement from a third party illustrates that the weakness is exposed in a way that represents an exploitable vulnerability.
The producer of the software product provides a statement that confirms the linking of a software component vulnerability with the software product by issuing a product vulnerability disclosure report and also issuing an advisory statement on how to mitigate the vulnerability.
At first, the producer provides an updated software product that still uses the vulnerable software component but shields the issue in a fashion that inhibits exploitation.
Later, a second update of the software product includes a security patch to the affected software component from the software producer.
Finally, a third update includes a new release (updated version) of the formerly insecure software component.
For this release, both the software product and the affected software component are deemed secure by the producer and consumers.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>know where to get these security statements from producers and third parties related to the software product in a timely and unambiguous fashion</li>
            <li>attribute them to an authoritative issuer</li>
            <li>associate the statements in a meaningful manner via a set of well-known semantic relationships</li>
            <li>consistently, efficiently, and homogeneously check their authenticity</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>know the various sources of statements</li>
            <li>express the provenance and historicity of statements</li>
            <li>relate and link various heterogeneous statements in a simple fashion</li>
            <li>check that the statement comes from a source with authority to issue that statement</li>
            <li>confirm that sources provide a complete history of statements related to a given component</li>
          </ul>
        </section>
        <section anchor="sec-promotion-of-a-software-component-by-multiple-entities">
          <name>Promotion of a Software Component by Multiple Entities</name>
          <t>A software component (e.g., a library or software product), open-source or commercial, is often initially released by a single trusted producer who can choose to attach a statement of authenticity to it.
As that component becomes used in a growing range of other products, providers other than the original trusted producer often re-distribute or release their own version of that component.</t>
          <t>Some providers include it as part of their release product or package bundle and provide the package with proof of authenticity using their issuer authority.
Some packages include the original statement of authenticity, and some do not.
Over time, some providers no longer offer the exact same software component source code but pre-compiled software component binaries.
Some sources do not provide the exact same software component but include patches and fixes produced by third parties as these emerge faster than solutions from the original producer.
Due to complex distribution and promotion life-cycle scenarios, the original software component takes myriad forms.</t>
          <t>A consumer of a released software wants to:</t>
          <ul spacing="normal">
            <li>understand if a particular provider is a trusted originating producer or an alternative party</li>
            <li>know if and how the source, or resulting binary, of a promoted software component differs from the original software component</li>
            <li>check the provenance and history of a software component's source back to its origin</li>
            <li>assess whether to trust a component or product based on a downloaded package location and source supplier</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>reliably discern if a provider is the original, trusted producer or is a trustworthy alternative provider or is an illegitimate provider</li>
            <li>track the provenance path from an original producer to a particular provider</li>
            <li>check the trustworthiness of a provider</li>
            <li>check the integrity of modifications or transformations applied by a provider</li>
          </ul>
        </section>
        <section anchor="sec-software-integrator-assembling-a-software-product-for-a-vehicle">
          <name>Software Integrator Assembling a Software Product for a Vehicle</name>
          <t>Software integration is a complex activity.  Typically, it
involves getting various software components from multiple suppliers and producing an integrated package deployed as part of device assembly.
For example, car manufacturers source integrated software for their vehicles from third parties that integrate software components from various sources.
Integration complexity creates a higher risk of security vulnerabilities to the delivered software.</t>
          <t>Consumers of integrated software want:</t>
          <ul spacing="normal">
            <li>a list of all components present in a software product</li>
            <li>the ability to identify and retrieve all components from a secure and tamper-proof location</li>
            <li>verifiable proofs on build process and build environment with all supplier tiers to ensure end-to-end build quality and security</li>
          </ul>
          <t>SCITT provides a standardized way to:</t>
          <ul spacing="normal">
            <li>provide a tiered and transparent framework that allows for verification of integrity and authenticity of the integrated software at both component and product level before installation</li>
            <li>provide valid annotations on build integrity to ensure conformance</li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms defined in this section have special meaning in the context of SCITT and are used throughout this document.</t>
      <t>This document has been developed in coordination with the COSE, OAUTH, and RATS working groups (WGs) and uses terminology common to these WGs as often as possible.</t>

      <t>The terms "header", "payload", and "to-be-signed bytes" are defined in <xref target="STD96"/>.</t>
      <t>The term "claim" is defined in <xref target="RFC8392"/>.</t>
      
  <t>When used in text in the sense defined, the following terms are capitalized.
To ensure readability, only a core set of terms is included in this section.</t>
      
      <dl anchor="mybody">
        <dt>Append-only Log:</dt>
        <dd>
          <t>a Statement Sequence comprising the entire registration history of the TS.
To make the append-only property verifiable and transparent, the TS defines how Signed Statements are made available to Auditors.</t>
        </dd>
        <dt>Artifact:</dt>
        <dd>
          <t>a physical or non-physical item that is moving along a supply chain.</t>
        </dd>
        <dt>Attestation:</dt>
        <dd>
          <t><xref target="NIST.SP.1800-19"/> defines "attestation" as:</t>
	  <blockquote><t>The process of providing a digital signature for a set of measurements securely stored in hardware, and then having the requester validate the signature and the set of measurements.</t></blockquote>
	  <t>NIST guidance "Software Supply Chain Security Guidance EO 14028" <xref target="NIST_EO14028"/> uses the definition from <xref target="ISO_IEC_17000"/>, which states that an "attestation" is:</t><blockquote>
	  <t>The issue of a statement, based on a decision, that fulfillment of specified requirements has been demonstrated.</t></blockquote>
<t>It is often useful for the intended audience to qualify the term "attestation" in their specific context to avoid confusion and ambiguity.</t>
        </dd>
	  
	
        <dt>Auditor:</dt>
        <dd>
          <t>an entity that checks the correctness and consistency of all Transparent Statements, or the transparent Statement Sequence, issued by a TS.
An Auditor is an example of a specialized Relying Party.</t>
        </dd>
        <dt>Client:</dt>
        <dd>
          <t>an application making protected TS resource requests on behalf of the resource owner and with its authorization.</t>
        </dd>
        <dt>Envelope:</dt>
        <dd>
          <t>metadata, created by the Issuer to produce a Signed Statement.
The Envelope contains the identity of the Issuer and information about the Artifact, enabling TS Registration Policies to validate the Signed Statement.
A Signed Statement is a COSE Envelope wrapped around a Statement, binding the metadata in the Envelope to the Statement.
In COSE, an Envelope consists of a protected header (included in the Issuer's signature) and an unprotected header (not included in the Issuer's signature).</t>
        </dd>
        <dt>Equivocation:</dt>
        <dd>
          <t>a state where a TS provides inconsistent proofs to Relying Parties, containing conflicting claims about the Signed Statement bound at a given position in the VDS.</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
	  
          <t>an identifier representing an organization, device, user, or entity securing Statements about supply chain Artifacts.
An Issuer may be the owner or author of Artifacts or an independent third party such as an Auditor, reviewer, or endorser.
In SCITT Statements and Receipts, the <tt>iss</tt> Claim is a member of the COSE header parameter <tt>15: CWT Claims</tt> defined in <xref target="RFC9597"/>, which embeds a CBOR Web Token (CWT) Claims Set <xref target="RFC8392"/> within the protected header of a COSE Envelope.
This document uses the terms "Issuer" and "Subject" as described in <xref target="RFC8392"/>; however, the usage is consistent with the broader interpretation of these terms in both JSON Object Signing and Encryption (JOSE) and COSE, and the guidance in <xref target="RFC8725"/> generally applies the COSE equivalent terms with consistent semantics.</t>
        </dd>
        <dt>Non-equivocation:</dt>
        <dd>
          <t>a state where all proofs provided by the TS to Relying Parties are produced from a single VDS describing a unique sequence of Signed Statements and are therefore consistent <xref target="EQUIVOCATION"/>.
Over time, an Issuer may register new Signed Statements about an Artifact in a TS with new information.
However, the consistency of a collection of Signed Statements about the Artifact can be checked by all Relying Parties.</t>
        </dd>
        <dt>Receipt:</dt>
        <dd>
          <t>a COSE Single Signer Data Object as defined in <xref target="RFC9942"/>.
See <xref target="RFC9942"/> for implementations.
Receipts are signed proofs of VDS properties.
Receipt Profiles implemented by a TS <bcp14>MUST</bcp14> support inclusion proofs and <bcp14>MAY</bcp14> support other Proof Types (see <xref section="3" sectionFormat="of" target="RFC9942"/>), such as consistency proofs.</t>
        </dd>
        <dt>Registration:</dt>
        <dd>
          <t>the process of submitting a Signed Statement to a TS, applying the TS's Registration Policy, adding to the VDS, and producing a Receipt.</t>
        </dd>
        <dt>Registration Policy:</dt>
        <dd>
          <t>the precondition enforced by the TS before registering a Signed Statement, based on information in the non-opaque header and metadata contained in its COSE Envelope.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>Relying Parties consume Transparent Statements, verifying their proofs and inspecting the Statement payload, either before using corresponding Artifacts or later to audit an Artifact's provenance on the supply chain.</t>
        </dd>
        <dt>Signed Statement:</dt>
        <dd>
          <t>an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.
In SCITT, Signed Statements are encoded as Enveloped COSE Structures; the <tt>payload</tt> of the COSE structure contains the issued Statement.</t>
        </dd>
	  
        <dt>Statement:</dt>
        <dd>
          <t>any serializable information about an Artifact.
To help interpret Statements, they must be tagged with a relevant media type (as specified in <xref target="RFC6838"/>).
A Statement may represent an SBOM that lists the ingredients of a software Artifact, contains an endorsement or attestation about an Artifact, indicates the End of Life (EOL), redirects to a newer version, or contains any content an Issuer wishes to publish about an Artifact.
Additional Statements about an Artifact are correlated by the Subject Claim as defined in the "CBOR Web Token (CWT) Claims" registry <xref target="IANA.cwt"/> and used as a protected header parameter as defined in <xref target="RFC9597"/>.
The Statement is considered opaque to TS and <bcp14>MAY</bcp14> be encrypted.</t>
        </dd>
        <dt>Statement Sequence:</dt>
        <dd>
          <t>a sequence of Signed Statements captured by a VDS.
See Verifiable Data Structure.</t>
        </dd>
        <dt>Subject:</dt>
        <dd>
          <t>an identifier, defined by the Issuer, that represents the organization, device, user, entity, or Artifact about which Statements (and Receipts) are made and by which a logical collection of Statements can be grouped.
It is possible that there are multiple Statements about the same Artifact.
In these cases, distinct Issuers (<tt>iss</tt>) might agree to use the <tt>sub</tt> CWT Claim, defined in <xref target="RFC8392"/>, to create a coherent sequence of Signed Statements about the same Artifact, and Relying Parties can leverage <tt>sub</tt> to ensure completeness and Non-equivocation across Statements by identifying all Transparent Statements associated to a specific Subject.</t>
        </dd>
        <dt>Transparency Service:</dt>
        <dd>
          <t>an entity that maintains and extends the VDS and endorses its state.
The identity of a TS is captured by a public key that must be known by Relying Parties in order to validate Receipts.</t>
        </dd>
        <dt>Transparent Statement:</dt>
        <dd>
          <t>a Signed Statement that is augmented with a Receipt created via Registration in a TS.
The Receipt is stored in the unprotected header of COSE Envelope of the Signed Statement.
A Transparent Statement remains a valid Signed Statement and may be registered again in a different TS.</t>
        </dd>
        <dt>Verifiable Data Structure:</dt>
        <dd>
          <t>a data structure defined in <xref target="RFC9942"/> in which Signed Statements can be inserted as they are Registered by a TS.
SCITT supports multiple VDSs and Receipt formats as defined in <xref target="RFC9942"/>, accommodating different TS implementations.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-definition-of-transparency">
      <name>Definition of Transparency</name>
      <t>In this document, the definition of transparency is intended to build over abstract notions of append-only Logs and Receipts.
Existing transparency systems such as CT <xref target="RFC9162"/> are instances of this definition.
SCITT supports multiple VDSs, as defined in <xref target="RFC9942"/>.</t>
      <t>A Signed Statement is an identifiable and non-repudiable Statement made by an Issuer.
The Issuer selects additional metadata and attaches a proof of endorsement (in most cases, a signature) using the identity key of the Issuer that binds the Statement and its metadata.
Signed Statements can be made transparent by attaching a proof of Registration by a TS in the form of a Receipt.
Receipts demonstrate inclusion of Signed Statements in the VDS of a TS.
By extension, the Signed Statement may say an Artifact (for example, a firmware binary) is transparent if it comes with one or more Transparent Statements from its author or owner, though the context should make it clear what type of Signed Statement is expected for a given Artifact.</t>
      <t>Transparency does not prevent dishonest or compromised Issuers, but it holds them accountable.
Any Artifact that may be verified is subject to scrutiny and auditing by other parties.
The TS provides a history of Statements, which may be made by multiple Issuers, enabling Relying Parties to make informed decisions.</t>
      <t>Transparency is implemented by providing a consistent, append-only, cryptographically verifiable, publicly available record of entries.
Implementations of TSs may protect their registered sequence of Signed Statements and VDS using a combination of trusted hardware, consensus protocols, and cryptographic evidence.
A Receipt is a signature over one or more VDP that a Signed Statement is registered in the VDS.
It is universally verifiable without online access to the TS.
Requesting a Receipt can result in the production of a new Receipt for the same Signed Statement.
A Receipt's verification key, signing algorithm, validity period, header parameters or other claims <bcp14>MAY</bcp14> change each time a Receipt is produced.</t>
      <t>Anyone with access to the TS can independently verify its consistency and review the complete list of Transparent Statements registered by each Issuer.</t>
      <t>Thus, reputable Issuers are incentivized to carefully review their Statements before signing them to produce Signed Statements.
Similarly, reputable TSs are incentivized to secure their VDS, as any inconsistency can easily be pinpointed by any Auditor with read access to the TS.</t>
      <t>The building blocks specified in this document enable the unequivocal and auditable production of statements about software supply chain artifacts. The extensible design of the SCITT architecture potentially allows future usage with other supply chains in different domains, for example, advanced manufacturing or food supply.</t>
      <t>SCITT is a generalization of CT <xref target="RFC9162"/>, which can be interpreted as a transparency architecture for the supply chain of X.509 certificates.
Considering CT in terms of SCITT:</t>
      <ul spacing="normal">
        <li>Certificate Authorities (CAs) (Issuers) sign the ASN.1 DER-encoded tbsCertificate structure to produce an X.509 certificate (Signed Statements)</li>
        <li>CAs submit the certificates to one or more CT logs (TSs)</li>
        <li>CT logs produce Signed Certificate Timestamps (Transparent Statements)</li>
        <li>Signed Certificate Timestamps, Signed Tree Heads, and their respective consistency proofs are checked by Relying Parties</li>
        <li>The VDS can be checked by Auditors</li>
      </ul>
    </section>
    <section anchor="sec-architecture-overview">
      <name>Architecture Overview</name>
      <t>The SCITT architecture enables TSs in a given application domain to implement a collective baseline by providing a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements.</t>
      <t>In order to accommodate as many TS implementations as possible, this document only specifies the format of Signed Statements (which must be used by all Issuers) and a very thin wrapper format for Receipts, which specifies the TS identity and the agility parameters for the signed proofs.
The remaining details of the Receipt's contents are specified in <xref target="RFC9942"/>.</t>
      <t><xref target="fig-concept-relationship"/> illustrates the roles and processes that comprise a TS independent of any one use case:</t>
      <ul spacing="normal">
        <li>Issuers that use their credentials to create Signed Statements about Artifacts.</li>
        <li>TSs that evaluate Signed Statements against Registration Policies producing Receipts upon successful Registration.
The returned Receipt may be combined with the Signed Statement to create a Transparent Statement.</li>
        <li>
          <t>Relying Parties that:
          </t>
          <ul spacing="normal">
            <li>collect Receipts of Signed Statements for subsequent registration of Transparent Statements;</li>
            <li>retrieve Transparent Statements for analysis of Statements about Artifacts themselves (e.g., verification);</li>
            <li>or replay all the Transparent Statements to check for the consistency and correctness of the TS's VDS (e.g., auditing).</li>
          </ul>
        </li>
      </ul>
      <t>In addition, <xref target="fig-concept-relationship"/> illustrates multiple TSs and multiple Receipts as a single Signed Statement <bcp14>MAY</bcp14> be registered with one or more TS.
Each TS produces a Receipt, which may be aggregated in a single Transparent Statement, demonstrating the Signed Statement was registered by multiple TSs.</t>
      <t>The arrows indicate the flow of information.</t>
      <figure anchor="fig-concept-relationship">
        <name>Relationship of Concepts in SCITT</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="512" width="536" viewBox="0 0 536 512" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,224 L 8,240" fill="none" stroke="black"/>
              <path d="M 32,448 L 32,480" fill="none" stroke="black"/>
              <path d="M 40,352 L 40,368" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,88" fill="none" stroke="black"/>
              <path d="M 56,128 L 56,200" fill="none" stroke="black"/>
              <path d="M 72,256 L 72,328" fill="none" stroke="black"/>
              <path d="M 88,176 L 88,200" fill="none" stroke="black"/>
              <path d="M 96,384 L 96,408" fill="none" stroke="black"/>
              <path d="M 120,288 L 120,328" fill="none" stroke="black"/>
              <path d="M 128,224 L 128,240" fill="none" stroke="black"/>
              <path d="M 152,352 L 152,368" fill="none" stroke="black"/>
              <path d="M 160,448 L 160,480" fill="none" stroke="black"/>
              <path d="M 208,272 L 208,288" fill="none" stroke="black"/>
              <path d="M 216,464 L 216,496" fill="none" stroke="black"/>
              <path d="M 224,304 L 224,320" fill="none" stroke="black"/>
              <path d="M 224,384 L 224,408" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
              <path d="M 288,128 L 288,144" fill="none" stroke="black"/>
              <path d="M 288,272 L 288,288" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,88" fill="none" stroke="black"/>
              <path d="M 304,304 L 304,320" fill="none" stroke="black"/>
              <path d="M 344,208 L 344,272" fill="none" stroke="black"/>
              <path d="M 344,384 L 344,408" fill="none" stroke="black"/>
              <path d="M 344,464 L 344,496" fill="none" stroke="black"/>
              <path d="M 368,272 L 368,336" fill="none" stroke="black"/>
              <path d="M 384,176 L 384,200" fill="none" stroke="black"/>
              <path d="M 384,448 L 384,480" fill="none" stroke="black"/>
              <path d="M 392,64 L 392,88" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,64" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,144" fill="none" stroke="black"/>
              <path d="M 440,336 L 440,360" fill="none" stroke="black"/>
              <path d="M 440,376 L 440,408" fill="none" stroke="black"/>
              <path d="M 472,208 L 472,272" fill="none" stroke="black"/>
              <path d="M 488,256 L 488,336" fill="none" stroke="black"/>
              <path d="M 504,160 L 504,352" fill="none" stroke="black"/>
              <path d="M 512,448 L 512,480" fill="none" stroke="black"/>
              <path d="M 24,32 L 96,32" fill="none" stroke="black"/>
              <path d="M 288,32 L 408,32" fill="none" stroke="black"/>
              <path d="M 24,64 L 96,64" fill="none" stroke="black"/>
              <path d="M 288,64 L 408,64" fill="none" stroke="black"/>
              <path d="M 24,96 L 88,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 344,96" fill="none" stroke="black"/>
              <path d="M 384,96 L 472,96" fill="none" stroke="black"/>
              <path d="M 24,128 L 88,128" fill="none" stroke="black"/>
              <path d="M 240,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 368,128 L 456,128" fill="none" stroke="black"/>
              <path d="M 432,144 L 488,144" fill="none" stroke="black"/>
              <path d="M 104,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 304,160 L 368,160" fill="none" stroke="black"/>
              <path d="M 24,208 L 112,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 472,208" fill="none" stroke="black"/>
              <path d="M 128,224 L 336,224" fill="none" stroke="black"/>
              <path d="M 24,256 L 112,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 272,256" fill="none" stroke="black"/>
              <path d="M 472,256 L 488,256" fill="none" stroke="black"/>
              <path d="M 136,272 L 208,272" fill="none" stroke="black"/>
              <path d="M 296,272 L 312,272" fill="none" stroke="black"/>
              <path d="M 344,272 L 472,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 168,288" fill="none" stroke="black"/>
              <path d="M 224,304 L 272,304" fill="none" stroke="black"/>
              <path d="M 200,320 L 224,320" fill="none" stroke="black"/>
              <path d="M 312,320 L 368,320" fill="none" stroke="black"/>
              <path d="M 56,336 L 136,336" fill="none" stroke="black"/>
              <path d="M 240,336 L 288,336" fill="none" stroke="black"/>
              <path d="M 368,336 L 488,336" fill="none" stroke="black"/>
              <path d="M 152,368 L 208,368" fill="none" stroke="black"/>
              <path d="M 360,368 L 488,368" fill="none" stroke="black"/>
              <path d="M 56,384 L 136,384" fill="none" stroke="black"/>
              <path d="M 24,416 L 176,416" fill="none" stroke="black"/>
              <path d="M 200,416 L 368,416" fill="none" stroke="black"/>
              <path d="M 384,416 L 528,416" fill="none" stroke="black"/>
              <path d="M 8,448 L 160,448" fill="none" stroke="black"/>
              <path d="M 368,448 L 512,448" fill="none" stroke="black"/>
              <path d="M 176,464 L 344,464" fill="none" stroke="black"/>
              <path d="M 32,480 L 160,480" fill="none" stroke="black"/>
              <path d="M 384,480 L 512,480" fill="none" stroke="black"/>
              <path d="M 216,496 L 344,496" fill="none" stroke="black"/>
              <path d="M 8,448 L 24,416" fill="none" stroke="black"/>
              <path d="M 240,128 L 256,96" fill="none" stroke="black"/>
              <path d="M 160,448 L 176,416" fill="none" stroke="black"/>
              <path d="M 328,128 L 344,96" fill="none" stroke="black"/>
              <path d="M 176,464 L 200,416" fill="none" stroke="black"/>
              <path d="M 368,128 L 384,96" fill="none" stroke="black"/>
              <path d="M 456,128 L 472,96" fill="none" stroke="black"/>
              <path d="M 344,464 L 368,416" fill="none" stroke="black"/>
              <path d="M 368,448 L 384,416" fill="none" stroke="black"/>
              <path d="M 512,448 L 528,416" fill="none" stroke="black"/>
              <path d="M 24,32 C 15.16936,32 8,39.16936 8,48" fill="none" stroke="black"/>
              <path d="M 96,32 C 104.83064,32 112,39.16936 112,48" fill="none" stroke="black"/>
              <path d="M 24,64 C 15.16936,64 8,56.83064 8,48" fill="none" stroke="black"/>
              <path d="M 96,64 C 104.83064,64 112,56.83064 112,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 88,96 C 96.83064,96 104,103.16936 104,112" fill="none" stroke="black"/>
              <path d="M 24,128 C 15.16936,128 8,120.83064 8,112" fill="none" stroke="black"/>
              <path d="M 88,128 C 96.83064,128 104,120.83064 104,112" fill="none" stroke="black"/>
              <path d="M 488,144 C 496.83064,144 504,151.16936 504,160" fill="none" stroke="black"/>
              <path d="M 104,160 C 95.16936,160 88,167.16936 88,176" fill="none" stroke="black"/>
              <path d="M 272,160 C 280.83064,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 304,160 C 295.16936,160 288,152.83064 288,144" fill="none" stroke="black"/>
              <path d="M 368,160 C 376.83064,160 384,167.16936 384,176" fill="none" stroke="black"/>
              <path d="M 24,208 C 15.16936,208 8,215.16936 8,224" fill="none" stroke="black"/>
              <path d="M 112,208 C 120.83064,208 128,215.16936 128,224" fill="none" stroke="black"/>
              <path d="M 344,240 C 335.16936,240 328,247.16936 328,256" fill="none" stroke="black"/>
              <path d="M 24,256 C 15.16936,256 8,248.83064 8,240" fill="none" stroke="black"/>
              <path d="M 112,256 C 120.83064,256 128,248.83064 128,240" fill="none" stroke="black"/>
              <path d="M 224,256 C 215.16936,256 208,263.16936 208,272" fill="none" stroke="black"/>
              <path d="M 272,256 C 280.83064,256 288,263.16936 288,272" fill="none" stroke="black"/>
              <path d="M 136,272 C 127.16936,272 120,279.16936 120,288" fill="none" stroke="black"/>
              <path d="M 312,272 C 320.83064,272 328,264.83064 328,256" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 168,288 C 176.83064,288 184,295.16936 184,304" fill="none" stroke="black"/>
              <path d="M 288,288 C 296.83064,288 304,295.16936 304,304" fill="none" stroke="black"/>
              <path d="M 224,304 C 215.16936,304 208,296.83064 208,288" fill="none" stroke="black"/>
              <path d="M 272,304 C 280.83064,304 288,296.83064 288,288" fill="none" stroke="black"/>
              <path d="M 200,320 C 191.16936,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 56,336 C 47.16936,336 40,343.16936 40,352" fill="none" stroke="black"/>
              <path d="M 136,336 C 144.83064,336 152,343.16936 152,352" fill="none" stroke="black"/>
              <path d="M 240,336 C 231.16936,336 224,328.83064 224,320" fill="none" stroke="black"/>
              <path d="M 288,336 C 296.83064,336 304,328.83064 304,320" fill="none" stroke="black"/>
              <path d="M 208,368 C 216.83064,368 224,375.16936 224,384" fill="none" stroke="black"/>
              <path d="M 360,368 C 351.16936,368 344,375.16936 344,384" fill="none" stroke="black"/>
              <path d="M 488,368 C 496.83064,368 504,360.83064 504,352" fill="none" stroke="black"/>
              <path d="M 56,384 C 47.16936,384 40,376.83064 40,368" fill="none" stroke="black"/>
              <path d="M 136,384 C 144.83064,384 152,376.83064 152,368" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="448,408 436,402.4 436,413.6 " fill="black" transform="rotate(90,440,408)"/>
              <path class="jump" d="M 440,376 C 446,376 446,360 440,360" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,88 388,82.4 388,93.6 " fill="black" transform="rotate(90,392,88)"/>
              <polygon class="arrowhead" points="392,200 380,194.4 380,205.6 " fill="black" transform="rotate(90,384,200)"/>
              <polygon class="arrowhead" points="352,408 340,402.4 340,413.6 " fill="black" transform="rotate(90,344,408)"/>
              <polygon class="arrowhead" points="344,224 332,218.4 332,229.6 " fill="black" transform="rotate(0,336,224)"/>
              <polygon class="arrowhead" points="320,320 308,314.4 308,325.6 " fill="black" transform="rotate(180,312,320)"/>
              <polygon class="arrowhead" points="312,88 300,82.4 300,93.6 " fill="black" transform="rotate(90,304,88)"/>
              <polygon class="arrowhead" points="304,272 292,266.4 292,277.6 " fill="black" transform="rotate(180,296,272)"/>
              <polygon class="arrowhead" points="232,408 220,402.4 220,413.6 " fill="black" transform="rotate(90,224,408)"/>
              <polygon class="arrowhead" points="128,328 116,322.4 116,333.6 " fill="black" transform="rotate(90,120,328)"/>
              <polygon class="arrowhead" points="104,408 92,402.4 92,413.6 " fill="black" transform="rotate(90,96,408)"/>
              <polygon class="arrowhead" points="96,200 84,194.4 84,205.6 " fill="black" transform="rotate(90,88,200)"/>
              <polygon class="arrowhead" points="80,328 68,322.4 68,333.6 " fill="black" transform="rotate(90,72,328)"/>
              <polygon class="arrowhead" points="64,200 52,194.4 52,205.6 " fill="black" transform="rotate(90,56,200)"/>
              <polygon class="arrowhead" points="64,88 52,82.4 52,93.6 " fill="black" transform="rotate(90,56,88)"/>
              <g class="text">
                <text x="60" y="52">Artifact</text>
                <text x="348" y="52">Issuer</text>
                <text x="56" y="116">Statement</text>
                <text x="292" y="116">sign</text>
                <text x="420" y="116">verify</text>
                <text x="68" y="228">Signed</text>
                <text x="404" y="228">Transparency</text>
                <text x="72" y="244">Statement</text>
                <text x="400" y="260">Service</text>
                <text x="248" y="276">Receipt</text>
                <text x="428" y="292">Transparency</text>
                <text x="264" y="324">Receipt</text>
                <text x="424" y="324">Service</text>
                <text x="96" y="356">Transparent</text>
                <text x="96" y="372">Statement</text>
                <text x="56" y="436">Collect</text>
                <text x="124" y="436">Receipts</text>
                <text x="228" y="436">Verify</text>
                <text x="304" y="436">Transparent</text>
                <text x="428" y="436">Replay</text>
                <text x="472" y="436">Log</text>
                <text x="272" y="452">Statement</text>
                <text x="72" y="468">Relying</text>
                <text x="128" y="468">Party</text>
                <text x="424" y="468">Relying</text>
                <text x="480" y="468">Party</text>
                <text x="256" y="484">Relying</text>
                <text x="312" y="484">Party</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
 .----------.                      +--------------+
|  Artifact  |                     |    Issuer    |
 '----+-----'                      +-+----------+-+
      v                              v          v
 .----+----.                   .-----+----.    .+---------.
| Statement |                 /   sign   /    /  verify  /
 '----+----'                 '-----+----+    '-------+--+
      |                            |                 '-------.
      |    .----------------------' '---------.               |
      |   |                                    |              |
      v   v                                    v              |
 .----+---+---.                           +----+----+-----+   |
|    Signed    +------------------------->+ Transparency  |   |
|   Statement  |                         .+               |   |
 '------+-----'           .-------.     | |   Service     +-+ |
        |      .---------+ Receipt +<--'  +--+------------+ | |
        |     |.-----.   |         +.        | Transparency | |
        |     |       |   '+------'  |       |              | |
        v     v        '---+ Receipt +<------+   Service    | |
     .--+-----+--.          '-------'        +--------+-----+ |
    | Transparent |                                   |       |
    |  Statement  +-------.                .----------)------'
     '-----+-----'         |              |           |
           v               v              v           v
  .--------+---------.  .--+--------------+--. .------+----------.
 / Collect Receipts /  / Verify Transparent / /   Replay Log    /
'--+---------------+  /      Statement     / '-+---------------+
   | Relying Party | '----+---------------+    | Relying Party |
   +---------------+      | Relying Party |    +---------------+
                          +---------------+
]]></artwork>
        </artset>
      </figure>
      <t>The subsequent sections describe the main concepts, namely TS, Signed Statements, Registration, and Transparent Statements in more detail.</t>
      <section anchor="sec-transparency-service">
        <name>Transparency Service</name>
        <t>TSs <bcp14>MUST</bcp14> produce COSE Receipts <xref target="RFC9942"/>.</t>
        <t>Typically, a TS has a single Issuer identity that is present in the <tt>iss</tt> Claim of Receipts for that service.</t>
        <t>Multi-tenant support can be enabled through the use of identifiers in the <tt>iss</tt> Claim; for example, <tt>ts.example.</tt> may have a distinct Issuer identity for each subdomain, such as "<tt>tenant1.ts.example.</tt>" and "<tt>tenant2.ts.example.</tt>".</t>
        <section anchor="sec-registration-policies">
          <name>Registration Policies</name>
          <t>Registration Policies refer to additional checks over and above the mandatory Registration checks that are performed before a Signed Statement is registered to the VDS.
To enable auditability, TSs <bcp14>MUST</bcp14> maintain Registration Policies.
The presence of an explicit transparent registration policy, even if it allows all authenticated submissions, facilitates service audit, and enables potential future changes to that policy.</t>
          <t>Beyond the mandatory Registration checks, the scope of additional checks, including no additional checks, is up to the implementation.</t>
          <t>This specification leaves implementation, encoding, and documentation of Registration Policies and trust anchors to the operator of the TS.</t>
	  
          <section anchor="sec-mandatory-registration-checks">
            <name>Mandatory Registration Checks</name>
            <t>During Registration, a TS <bcp14>MUST</bcp14> syntactically check the Issuer of the Signed Statement by cryptographically verifying the COSE signature according to <xref target="STD96"/>.
The Issuer identity <bcp14>MUST</bcp14> be bound to the Signed Statement by including an identifier in the protected header.
If the protected header includes multiple identifiers, all those that are registered by the TS <bcp14>MUST</bcp14> be checked.</t>
            <t>TSs <bcp14>MUST</bcp14> maintain a list of trust anchors (see definition of trust anchor in <xref target="RFC4949"/>) in order to check the signatures of Signed Statements either separately or inside Registration Policies.
	    TSs <bcp14>MUST</bcp14> authenticate Signed Statements as part of a Registration Policy.  For instance, a trust anchor could be an X.509 root certificate (directly or its thumbprint), a pointer to an OpenID Connect identity provider, or any other trust anchor that can be referenced in a COSE header parameter.</t>
            <t>When using X.509 Signed Statements, the TS <bcp14>MUST</bcp14> build and validate a complete certification path from an Issuer's certificate to one of the root certificates currently registered as a trust anchor by the TS.
The protected header of the COSE_Sign1 Envelope <bcp14>MUST</bcp14> include either the Issuer's certificate as <tt>x5t</tt> or the chain including the Issuer's certificate as <tt>x5chain</tt>, as defined in <xref target="RFC9360"/>.
If <tt>x5t</tt> is included in the protected header, an <tt>x5chain</tt> with a leaf certificate corresponding to the <tt>x5t</tt> value <bcp14>MAY</bcp14> be included in the unprotected header.</t>
            <t>Registration Policies and trust anchors <bcp14>MUST</bcp14> be made Transparent and available to all Relying Parties of the TS by Registering them as Signed Statements on the VDS.</t>
            <t>The TS <bcp14>MUST</bcp14> apply the Registration Policy that was most recently committed to the VDS at the time of Registration.</t>
          </section>
          <section anchor="sec-auditability-of-registration">
            <name>Auditability of Registration</name>
            <t>The operator of a TS <bcp14>MAY</bcp14> update the Registration Policy or the trust anchors of a TS at any time.</t>
            <t>TSs <bcp14>MUST</bcp14> ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration.
At a minimum, this consists of the Signed Statements themselves, any additional collateral data required to perform their authentication, and the applicable Registration Policy at the time of Registration.</t>
          </section>
        </section>
        <section anchor="ts-initialization">
          <name>Initialization and Bootstrapping</name>
          <t>Since the mandatory Registration checks rely on having registered Signed Statements for the Registration Policy and trust anchors, TSs <bcp14>MUST</bcp14> support at least one of the three following bootstrapping mechanisms:</t>
          <ul spacing="normal">
            <li>Preconfigured Registration Policy and trust anchors;</li>
            <li>Acceptance of a first Signed Statement whose payload is a valid Registration Policy, without performing Registration checks; or</li>
            <li>An out-of-band authenticated management interface.</li>
          </ul>
        </section>
        <section anchor="sec-verifiable-data-structure">
          <name>Verifiable Data Structure</name>
          <t>The security properties are determined by the choice of the VDS (see <xref target="RFC9942"/>) used by the TS implementation.
This VDS <bcp14>MUST</bcp14> support the following security requirements:</t>
          <dl>
            <dt>Append-only:</dt>
            <dd>
              <t>a property required for a VDS to be applicable to SCITT, ensuring that the Statement Sequence cannot be modified, deleted, or reordered.</t>
            </dd>
            <dt>Non-equivocation:</dt>
            <dd>
              <t>there is no fork in the registered sequence of Signed Statements accepted by the TS and committed to the VDS.
Everyone with access to its content sees the same ordered collection of Signed Statements and can check that it is consistent with any Receipts they have verified.</t>
            </dd>
            <dt>Replayability:</dt>
            <dd>
              <t>the VDS includes sufficient information to enable authorized actors with access to its content to check that each data structure representing each Signed Statement has been correctly registered.</t>
            </dd>
          </dl>
          <t>In addition to Receipts, some VDSs might support additional Proof Types, such as proofs of consistency or proofs of non-inclusion.</t>
          <t>Specific VDSs, such those describes in <xref target="RFC9162"/> and <xref target="RFC9942"/>, and the review of their security requirements for SCITT are out of scope for this document.</t>
        </section>
        <section anchor="sec-adjacent-services">
          <name>Adjacent Services</name>
          <t>TSs can be deployed alongside other database or object storage technologies.
For example, a TS that supports a software package management system, might be referenced from the APIs exposed for package management.
It can also provide the ability to request a fresh Receipt for a given software package or a list of Signed Statements associated with that package.</t>
        </section>
      </section>
    </section>
    <section anchor="signed-statements">
      <name>Signed Statements</name>
      <t>This specification prioritizes conformance to <xref target="STD96"/> and its required and optional properties.
Signed Statements produced by Issuers must be COSE_Sign1 messages, as defined by <xref target="STD96"/>.
Profiles and implementation-specific choices should be used to determine admissibility of conforming messages.
This specification is left intentionally open to allow implementations to make Registration restrictions that make the most sense for their operational use cases.</t>
      <t>There are many types of Statements (such as an SBOM, malware scans, audit reports, policy definitions) that Issuers may want to turn into Signed Statements.
An Issuer must first decide on a suitable format (<tt>3</tt>: payload type) to serialize the Statement payload.
      For a software supply chain, payloads describing the software Artifacts may include:</t>


      
      <ul spacing="normal">
        <li>
          Concise Software Identification Tags format <xref target="RFC9393"/></li>
        <li>
          Bill of Materials format <xref target="CycloneDX"/></li>
        <li>
          Supply chain description metadata <xref target="in-toto"/></li>
        <li>
          Software component description format <xref target="SPDX-CBOR"/></li>
        <li>
          Software component description format <xref target="SPDX-CBOR"/></li>
        <li>
          Supply-chain Levels for Software Artifacts  <xref target="SLSA"/></li>
        <li>
         Software Identification Tag format <xref target="SWID"/></li>
      </ul>
      <t>Issuers can produce Signed Statements about different Artifacts under the same Identity.
Issuers and Relying Parties must be able to recognize the Artifact to which the Statements pertain by looking at the Signed Statement.
The <tt>iss</tt> and <tt>sub</tt> Claims, within the <tt>CWT Claims</tt> protected header, are used to identify the Artifact the Statement pertains to.
(See Subject in <xref target="terminology"/>.)</t>
      <t>Issuers <bcp14>MAY</bcp14> use different signing keys (identified by <tt>kid</tt> in the protected header from <xref target="STD96"/>) for different Artifacts or sign all Signed Statements under the same key.</t>
      <t>An Issuer can make multiple Statements about the same Artifact.
For example, an Issuer can make amended Statements about the same Artifact as their view changes over time.</t>
      <t>Multiple Issuers can make different, even conflicting, Statements about the same Artifact.
Relying Parties can choose which Issuers they trust.</t>
      <t>Multiple Issuers can make the same Statement about a single Artifact, affirming multiple Issuers agree.</t>
      <t>Additionally, an <tt>x5chain</tt> that corresponds to either <tt>x5t</tt> or <tt>kid</tt> identifying the leaf certificate in the included certification path <bcp14>MAY</bcp14> be included in the unprotected header of the COSE Envelope.</t>
      <ul spacing="normal">
        <li>When using X.509 certificates, support for either <tt>x5t</tt> or <tt>x5chain</tt> in the protected header is <bcp14>REQUIRED</bcp14> to implement.</li>
        <li>Support for <tt>kid</tt> in the protected header and <tt>x5chain</tt> in the unprotected header is <bcp14>OPTIONAL</bcp14> to implement.</li>
      </ul>
      <t>When <tt>x5t</tt> or <tt>x5chain</tt> is present in the protected header, the <tt>iss</tt> Claim value <bcp14>MUST</bcp14> be a string that meets URI requirements defined in <xref target="RFC8392"/>.
The <tt>iss</tt> Claim value's length <bcp14>MUST</bcp14> be between 1 and 8192 characters in Length.</t>
      <t>The <tt>kid</tt> header parameter <bcp14>MUST</bcp14> be present when neither <tt>x5t</tt> nor <tt>x5chain</tt> is present in the protected header.
Key discovery protocols are out of scope of this document.</t>
      <t>The protected header of a Signed Statement and a Receipt <bcp14>MUST</bcp14> include the <tt>CWT Claims</tt> header parameter as specified in <xref section="2" sectionFormat="of" target="RFC9597"/>.
The <tt>CWT Claims</tt> value <bcp14>MUST</bcp14> include the <tt>Issuer Claim</tt> (Claim label 1) and the <tt>Subject Claim</tt> (Claim label 2) <xref target="IANA.cwt"/>.</t>
      <t>A Receipt is a Signed Statement (COSE_Sign1) with additional Claims in its protected header related to verifying the inclusion proof in its unprotected header.
See <xref target="RFC9942"/>.</t>
      <section anchor="sec-signed-statement-examples">
        <name>Signed Statement Examples</name>
        <t><xref target="fig-signed-statement-cddl"/> illustrates a normative CDDL definition <xref target="RFC8610"/> for the protected header and unprotected header of Signed Statements and Receipts.</t>
        <t>The SCITT architecture specifies the minimal mandatory labels.
Implementation-specific Registration Policies may define additional mandatory labels.</t>
        <figure anchor="fig-signed-statement-cddl">
          <name>CDDL Definition for Signed Statements and Receipts</name>
          <sourcecode type="cddl"><![CDATA[
Signed_Statement = /6.18(COSE_Sign1)
Receipt = /6.18(COSE_Sign1)

COSE_Sign1 = [
  protected   : bstr .cbor Protected_Header,
  unprotected : Unprotected_Header,
  payload     : bstr / nil,
  signature   : bstr
]

Protected_Header = {
  &(CWT_Claims: 15) => CWT_Claims
  ? &(alg: 1) => int
  ? &(content_type: 3) => tstr / uint
  ? &(kid: 4) => bstr
  ? &(x5t: 34) => COSE_CertHash
  ? &(x5chain: 33) => COSE_X509
  * label => any
}

CWT_Claims = {
  &(iss: 1) => tstr
  &(sub: 2) => tstr
  * label => any
}

Unprotected_Header = {
  ? &(x5chain: 33) => COSE_X509
  ? &(receipts: 394)  => [+ Receipt]
  * label => any
}

label = int / tstr]]></sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-edn"/> illustrates an instance of a Signed Statement in Extended Diagnostic Notation (EDN), with a payload that is detached.
Detached payloads support large Statements and ensure Signed Statements can integrate with existing storage systems.</t>
        <figure anchor="fig-signed-statement-edn">
          <name>CBOR-Extended Diagnostic Notation Example of a Signed Statement</name>
          <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE_Sign1       /
    [
      h'a4012603...6d706c65',       / Protected        /
      {},                           / Unprotected      /
      nil,                          / Detached payload /
      h'79ada558...3a28bae4'        / Signature        /
    ]
)]]></sourcecode>
        </figure>
        <t><xref target="fig-signed-statement-protected-header-edn"/> illustrates the decoded protected header of the Signed Statement in <xref target="fig-signed-statement-edn"/>.
It indicates the Signed Statement is securing a JSON content type and identifying the content with the <tt>sub</tt> Claim "vendor.product.example".</t>
        <figure anchor="fig-signed-statement-protected-header-edn">
          <name>CBOR-Extended Diagnostic Notation Example of a Signed Statement's Protected Header</name>
          <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected        /
  1: -7,                            / Algorithm        /
  3: application/example+json,      / Content type     /
  4: h'50685f55...50523255',        / Key identifier   /
  15: {                             / CWT Claims       /
    1: software.vendor.example,     / Issuer           /
    2: vendor.product.example,      / Subject          /
  }
}]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-signing-large-or-sensitive-statements">
        <name>Signing Large or Sensitive Statements</name>
        <t>Statement payloads might be too large or too sensitive to be sent to a remote TS.
	In these cases, a Statement can be made over the hash of a payload rather than the full payload bytes.</t>

	<figure anchor="fig6">
	  <name>Workflow for Signing Large or Sensitive Statements</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="736" width="376" viewBox="0 0 376 736" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
              <path d="M 8,112 L 8,144" fill="none" stroke="black"/>
              <path d="M 8,416 L 8,432" fill="none" stroke="black"/>
              <path d="M 40,64 L 40,80" fill="none" stroke="black"/>
              <path d="M 40,176 L 40,200" fill="none" stroke="black"/>
              <path d="M 56,64 L 56,104" fill="none" stroke="black"/>
              <path d="M 56,456 L 56,480" fill="none" stroke="black"/>
              <path d="M 56,512 L 56,584" fill="none" stroke="black"/>
              <path d="M 56,656 L 56,680" fill="none" stroke="black"/>
              <path d="M 104,416 L 104,432" fill="none" stroke="black"/>
              <path d="M 144,128 L 144,224" fill="none" stroke="black"/>
              <path d="M 272,432 L 272,520" fill="none" stroke="black"/>
              <path d="M 272,560 L 272,584" fill="none" stroke="black"/>
              <path d="M 328,192 L 328,288" fill="none" stroke="black"/>
              <path d="M 328,352 L 328,584" fill="none" stroke="black"/>
              <path d="M 40,32 L 112,32" fill="none" stroke="black"/>
              <path d="M 40,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 40,112 L 112,112" fill="none" stroke="black"/>
              <path d="M 128,128 L 144,128" fill="none" stroke="black"/>
              <path d="M 40,144 L 112,144" fill="none" stroke="black"/>
              <path d="M 264,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 144,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 216,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 264,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 40,208 L 104,208" fill="none" stroke="black"/>
              <path d="M 120,224 L 144,224" fill="none" stroke="black"/>
              <path d="M 40,240 L 104,240" fill="none" stroke="black"/>
              <path d="M 24,400 L 88,400" fill="none" stroke="black"/>
              <path d="M 104,432 L 272,432" fill="none" stroke="black"/>
              <path d="M 24,448 L 88,448" fill="none" stroke="black"/>
              <path d="M 24,480 L 112,480" fill="none" stroke="black"/>
              <path d="M 24,512 L 112,512" fill="none" stroke="black"/>
              <path d="M 240,528 L 296,528" fill="none" stroke="black"/>
              <path d="M 240,560 L 296,560" fill="none" stroke="black"/>
              <path d="M 40,592 L 152,592" fill="none" stroke="black"/>
              <path d="M 216,592 L 352,592" fill="none" stroke="black"/>
              <path d="M 144,624 L 200,624" fill="none" stroke="black"/>
              <path d="M 8,656 L 120,656" fill="none" stroke="black"/>
              <path d="M 216,656 L 352,656" fill="none" stroke="black"/>
              <path d="M 24,688 L 112,688" fill="none" stroke="black"/>
              <path d="M 24,720 L 112,720" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,656" fill="none" stroke="black"/>
              <path d="M 352,592 L 368,624" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,216" fill="none" stroke="black"/>
              <path d="M 196,136 L 216,176" fill="none" stroke="black"/>
              <path d="M 176,176 L 196,136" fill="none" stroke="black"/>
              <path d="M 196,216 L 216,176" fill="none" stroke="black"/>
              <path d="M 8,656 L 40,592" fill="none" stroke="black"/>
              <path d="M 120,656 L 152,592" fill="none" stroke="black"/>
              <path d="M 200,624 L 216,592" fill="none" stroke="black"/>
              <path d="M 352,656 L 368,624" fill="none" stroke="black"/>
              <path d="M 40,32 C 31.16936,32 24,39.16936 24,48" fill="none" stroke="black"/>
              <path d="M 112,32 C 120.83064,32 128,39.16936 128,48" fill="none" stroke="black"/>
              <path d="M 40,64 C 31.16936,64 24,56.83064 24,48" fill="none" stroke="black"/>
              <path d="M 112,64 C 120.83064,64 128,56.83064 128,48" fill="none" stroke="black"/>
              <path d="M 24,96 C 15.16936,96 8,103.16936 8,112" fill="none" stroke="black"/>
              <path d="M 24,96 C 32.83064,96 40,88.83064 40,80" fill="none" stroke="black"/>
              <path d="M 40,112 C 31.16936,112 24,119.16936 24,128" fill="none" stroke="black"/>
              <path d="M 112,112 C 120.83064,112 128,119.16936 128,128" fill="none" stroke="black"/>
              <path d="M 40,144 C 31.16936,144 24,136.83064 24,128" fill="none" stroke="black"/>
              <path d="M 112,144 C 120.83064,144 128,136.83064 128,128" fill="none" stroke="black"/>
              <path d="M 24,160 C 15.16936,160 8,152.83064 8,144" fill="none" stroke="black"/>
              <path d="M 24,160 C 32.83064,160 40,167.16936 40,176" fill="none" stroke="black"/>
              <path d="M 264,160 C 255.16936,160 248,167.16936 248,176" fill="none" stroke="black"/>
              <path d="M 336,160 C 344.83064,160 352,167.16936 352,176" fill="none" stroke="black"/>
              <path d="M 264,192 C 255.16936,192 248,184.83064 248,176" fill="none" stroke="black"/>
              <path d="M 336,192 C 344.83064,192 352,184.83064 352,176" fill="none" stroke="black"/>
              <path d="M 40,208 C 31.16936,208 24,215.16936 24,224" fill="none" stroke="black"/>
              <path d="M 104,208 C 112.83064,208 120,215.16936 120,224" fill="none" stroke="black"/>
              <path d="M 40,240 C 31.16936,240 24,232.83064 24,224" fill="none" stroke="black"/>
              <path d="M 104,240 C 112.83064,240 120,232.83064 120,224" fill="none" stroke="black"/>
              <path d="M 24,400 C 15.16936,400 8,407.16936 8,416" fill="none" stroke="black"/>
              <path d="M 88,400 C 96.83064,400 104,407.16936 104,416" fill="none" stroke="black"/>
              <path d="M 24,448 C 15.16936,448 8,440.83064 8,432" fill="none" stroke="black"/>
              <path d="M 88,448 C 96.83064,448 104,440.83064 104,432" fill="none" stroke="black"/>
              <path d="M 24,480 C 15.16936,480 8,487.16936 8,496" fill="none" stroke="black"/>
              <path d="M 112,480 C 120.83064,480 128,487.16936 128,496" fill="none" stroke="black"/>
              <path d="M 24,512 C 15.16936,512 8,504.83064 8,496" fill="none" stroke="black"/>
              <path d="M 112,512 C 120.83064,512 128,504.83064 128,496" fill="none" stroke="black"/>
              <path d="M 240,528 C 231.16936,528 224,535.16936 224,544" fill="none" stroke="black"/>
              <path d="M 296,528 C 304.83064,528 312,535.16936 312,544" fill="none" stroke="black"/>
              <path d="M 240,560 C 231.16936,560 224,552.83064 224,544" fill="none" stroke="black"/>
              <path d="M 296,560 C 304.83064,560 312,552.83064 312,544" fill="none" stroke="black"/>
              <path d="M 24,688 C 15.16936,688 8,695.16936 8,704" fill="none" stroke="black"/>
              <path d="M 112,688 C 120.83064,688 128,695.16936 128,704" fill="none" stroke="black"/>
              <path d="M 24,720 C 15.16936,720 8,712.83064 8,704" fill="none" stroke="black"/>
              <path d="M 112,720 C 120.83064,720 128,712.83064 128,704" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="336,584 324,578.4 324,589.6 " fill="black" transform="rotate(90,328,584)"/>
              <polygon class="arrowhead" points="280,584 268,578.4 268,589.6 " fill="black" transform="rotate(90,272,584)"/>
              <polygon class="arrowhead" points="280,520 268,514.4 268,525.6 " fill="black" transform="rotate(90,272,520)"/>
              <polygon class="arrowhead" points="248,176 236,170.4 236,181.6 " fill="black" transform="rotate(0,240,176)"/>
              <polygon class="arrowhead" points="176,176 164,170.4 164,181.6 " fill="black" transform="rotate(0,168,176)"/>
              <polygon class="arrowhead" points="152,624 140,618.4 140,629.6 " fill="black" transform="rotate(180,144,624)"/>
              <polygon class="arrowhead" points="64,680 52,674.4 52,685.6 " fill="black" transform="rotate(90,56,680)"/>
              <polygon class="arrowhead" points="64,584 52,578.4 52,589.6 " fill="black" transform="rotate(90,56,584)"/>
              <polygon class="arrowhead" points="64,456 52,450.4 52,461.6 " fill="black" transform="rotate(270,56,456)"/>
              <polygon class="arrowhead" points="64,104 52,98.4 52,109.6 " fill="black" transform="rotate(90,56,104)"/>
              <polygon class="arrowhead" points="48,200 36,194.4 36,205.6 " fill="black" transform="rotate(90,40,200)"/>
              <g class="text">
                <text x="76" y="52">Artifact</text>
                <text x="60" y="132">Hash</text>
                <text x="196" y="180">OR</text>
                <text x="296" y="180">Payload</text>
                <text x="72" y="228">Statement</text>
                <text x="104" y="292">...</text>
                <text x="164" y="292">Producer</text>
                <text x="232" y="292">Network</text>
                <text x="280" y="292">...</text>
                <text x="192" y="324">...</text>
                <text x="104" y="356">...</text>
                <text x="164" y="356">Issuer</text>
                <text x="224" y="356">Network</text>
                <text x="272" y="356">...</text>
                <text x="52" y="420">Identity</text>
                <text x="168" y="420">(iss,</text>
                <text x="212" y="420">x5t)</text>
                <text x="52" y="436">Document</text>
                <text x="48" y="500">Private</text>
                <text x="96" y="500">Key</text>
                <text x="268" y="548">Header</text>
                <text x="76" y="628">Sign</text>
                <text x="220" y="628">To</text>
                <text x="244" y="628">Be</text>
                <text x="284" y="628">Signed</text>
                <text x="336" y="628">Bytes</text>
                <text x="60" y="708">COSE_Sign1</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
   .----+-----.
  |  Artifact  |
   '+-+-------'
    | |
 .-'  v
|  .--+-------.
| |  Hash      +-+
|  '----------'  |     /\
 '-.             |    /  \     .----------.
    |            +-->+ OR +-->+  Payload   |
    v            |    \  /     '--------+-'
   .+--------.   |     \/               |
  | Statement +--+                      |
   '---------'                          |
                                        |
                                        |
           ...  Producer Network ...    |

                      ...

           ...   Issuer Network ...     |
                                        |
                                        |
 .---------.                            |
| Identity  |     (iss, x5t)            |
| Document  +--------------------+      |
 `----+----`                     |      |
      ^                          |      |
 .----+-------.                  |      |
| Private Key  |                 |      |
 '----+-------'                  v      |
      |                     .----+---.  |
      |                    |  Header  | |
      |                     '----+---'  |
      v                          v      v
    .-+-----------.       .------+------+--.
   /             /       /                  \
  /    Sign     +<------+ To Be Signed Bytes |
 /             /         \                  /
'-----+-------'           '----------------'
      v
 .----+-------.
| COSE_Sign1   |
 '------------'
]]></artwork>
        </artset>
      </figure>
      </section>
      <section anchor="sec-registration-of-signed-statements">
        <name>Registration of Signed Statements</name>
        <t>To register a Signed Statement, the TS performs the following steps:</t>
        <ol spacing="normal" type="1">	  
          <li>

	    
            <t>Client Authentication</t> <t>A Client authenticates with the TS before registering Signed Statements on behalf of one or more Issuers.
Authentication and authorization are implementation specific and out of scope of the SCITT architecture.</t></li>
          <li>
            <t>TS Signed Statement Verification and Validation</t><t>The TS <bcp14>MUST</bcp14> perform signature verification per Section <xref section="4.4" sectionFormat="bare" target="RFC9052"/> of RFC 9052 <xref target="STD96"/> and <bcp14>MUST</bcp14> verify the signature of the Signed Statement with the signature algorithm and verification key of the Issuer per <xref target="RFC9360"/>.
The TS <bcp14>MUST</bcp14> also check that the Signed Statement includes the required protected headers.
The TS <bcp14>MAY</bcp14> validate the Signed Statement payload in order to enforce domain-specific registration policies that apply to specific content types.</t></li>
          <li>
            <t>Apply Registration Policy</t><t>The TS <bcp14>MUST</bcp14> check the attributes required by a Registration Policy are present in the protected headers.
  Custom Signed Statements are evaluated given the current TS state and the entire Envelope and may use information contained in the attributes of named policies.</t></li>
          <li>
            <t>Register the Signed Statement</t></li>
          <li>
            <t>Return the Receipt</t> <t>This <bcp14>MAY</bcp14> be asynchronous from Registration.
The TS <bcp14>MUST</bcp14> be able to provide a Receipt for all registered Signed Statements.
Details about generating Receipts are described in <xref target="Receipt"/>.</t></li>
        </ol>
        <t>The last two steps may be shared between a batch of Signed Statements registered in the VDS.</t>
        <t>A TS <bcp14>MUST</bcp14> ensure that a Signed Statement is registered before releasing its Receipt.</t>
        <t>A TS <bcp14>MAY</bcp14> accept a Signed Statement with content in its unprotected header and <bcp14>MAY</bcp14> use values from that unprotected header during verification and registration policy evaluation.</t>
        <t>However, the unprotected header of a Signed Statement <bcp14>MUST</bcp14> be set to an empty map before the Signed Statement can be included in a Statement Sequence.</t>
        <t>The same Signed Statement may be independently registered in multiple TSs, producing multiple independent Receipts.
The multiple Receipts may be attached to the unprotected header of the Signed Statement creating a Transparent Statement.</t>
        <t>An Issuer that knows of a changed state of quality for an Artifact <bcp14>SHOULD</bcp14> Register a new Signed Statement using the same <tt>15</tt> CWT <tt>iss</tt> and <tt>sub</tt> Claims.</t>
      </section>
    </section>
    <section anchor="Receipt">
      <name>Transparent Statements</name>
      <t>The Client (which is not necessarily the Issuer) that registers a Signed Statement and receives a Receipt can produce a Transparent Statement by adding the Receipt to the unprotected header of the Signed Statement.
Client applications <bcp14>MAY</bcp14> register Signed Statements on behalf of one or more Issuers.
Client applications <bcp14>MAY</bcp14> request Receipts regardless of the identity of the Issuer of the associated Signed Statement.</t>
      <t>When a Signed Statement is registered by a TS a Receipt becomes available.
When a Receipt is included in a Signed Statement, a Transparent Statement is produced.</t>
      <t>Receipts are based on signed proofs as described in COSE Receipts <xref target="RFC9942"/>, which also provides the COSE header parameter semantics for label 394.</t>
      <t>The Registration time is recorded as the timestamp when the TS added the Signed Statement to its VDS.</t>
      <t><xref target="fig-transparent-statement-cddl"/> illustrates a normative CDDL definition of Transparent Statements.
See <xref target="fig-signed-statement-cddl"/> for the CDDL rule that defines COSE_Sign1 as specified in Section <xref section="4.2" sectionFormat="bare" target="RFC9052"/> of RFC 9052 <xref target="STD96"/>.</t>
      <figure anchor="fig-transparent-statement-cddl">
        <name>CDDL Definition for a Transparent Statement</name>
        <sourcecode type="cddl"><![CDATA[
Transparent_Statement = /6.18(COSE_Sign1)

Unprotected_Header = {
  &(receipts: 394)  => [+ Receipt]
}]]></sourcecode>
      </figure>
      <t><xref target="fig-transparent-statement-edn"/> illustrates a Transparent Statement with a detached payload and two Receipts in its unprotected header.
The type of label 394 <tt>receipts</tt> in the unprotected header is a CBOR array that can contain one or more Receipts (each entry encoded as a .cbor-encoded Receipt).</t>
      <figure anchor="fig-transparent-statement-edn">
        <name>CBOR-Extended Diagnostic Notation Example of a Transparent Statement</name>
        <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE_Sign1                /
    [
      h'a4012603...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        394:   [                    / Receipts (2)              /
          h'd284586c...4191f9d2'    / Receipt 1                 /
          h'c624586c...8f4af97e'    / Receipt 2                 /
        ]
      },
      nil,                          / Detached payload          /
      h'79ada558...3a28bae4'        / Signature                 /
    ]
)]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-edn"/> illustrates one of the decoded Receipts from <xref target="fig-transparent-statement-edn"/>.
The Receipt contains inclusion proofs for VDSs.
The unprotected header contains VDP.
See the protected header for details regarding the specific VDS used.
Per the "COSE Verifiable Data Structure Algorithms" registry documented in <xref target="RFC9942"/>, the COSE Key Type RFC9162_SHA256 is value <tt>1</tt>.
Labels identify inclusion proofs (<tt>-1</tt>) and consistency proofs (<tt>-2</tt>).</t>
      <figure anchor="fig-receipt-edn">
        <name>CBOR-Extended Diagnostic Notation Example of a Receipt</name>
        <sourcecode type="cbor-diag"><![CDATA[
18(                                 / COSE_Sign1                /
    [
      h'a4012604...6d706c65',       / Protected                 /
      {                             / Unprotected               /
        -222: {                     / Proofs                    /
          -1: [                     / Inclusion proofs (1)      /
            h'83080783...32568964', / Inclusion proof 1         /
          ]
        },
      },
      nil,                          / Detached payload          /
      h'10f6b12a...4191f9d2'        / Signature                 /
    ]
)]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-protected-header-edn"/> illustrates the decoded protected header of the Transparent Statement in <xref target="fig-transparent-statement-edn"/>.    
The VDS (<tt>-111</tt>) uses <tt>1</tt> from RFC9162_SHA256.</t>
      <figure anchor="fig-receipt-protected-header-edn">
        <name>CBOR-Extended Diagnostic Notation Example of a Receipt's Protected Header</name>
        <sourcecode type="cbor-diag"><![CDATA[
{                                   / Protected                 /
  1: -7,                            / Algorithm                 /
  4: h'50685f55...50523255',        / Key identifier            /
  -111: 1,                          / Verifiable Data Structure /
  15: {                             / CWT Claims                /
    1: transparency.vendor.example, / Issuer                    /
    2: vendor.product.example,      / Subject                   /
  }
}]]></sourcecode>
      </figure>
      <t><xref target="fig-receipt-inclusion-proof-edn"/> illustrates the decoded inclusion proof from <xref target="fig-receipt-edn"/>.
This inclusion proof indicates that the size of the VDS was <tt>8</tt> at the time the Receipt was issued.
The structure of this inclusion proof is specific to the VDS used by RFC9162_SHA256.</t>
      <figure anchor="fig-receipt-inclusion-proof-edn">
        <name>CBOR-Extended Diagnostic Notation Example of a Receipt's Inclusion Proof</name>
        <sourcecode type="cbor-diag"><![CDATA[
[                                   / Inclusion proof 1         /
  8,                                / Tree size                 /
  7,                                / Leaf index                /
  [                                 / Inclusion hashes (3)      /
     h'c561d333...f9850597'         / Intermediate hash 1       /
     h'75f177fd...2e73a8ab'         / Intermediate hash 2       /
     h'0bdaaed3...32568964'         / Intermediate hash 3       /
  ]
]]]></sourcecode>
      </figure>
      <section anchor="validation">
        <name>Validation</name>
        <t>Relying Parties <bcp14>MUST</bcp14> apply the verification process as described in Section <xref section="4.4" sectionFormat="bare" target="RFC9052"/> of RFC 9052 <xref target="STD96"/> when checking the signature of Signed Statements and Receipts.</t>
        <t>A Relying Party <bcp14>MUST</bcp14> trust the verification key or certificate and the associated identity of at least one Issuer of a Receipt.</t>
        <t>A Relying Party <bcp14>MAY</bcp14> decide to verify only a single Receipt that is acceptable to them and not check the signature on the Signed Statement or Receipts that rely on VDSs they do not understand.</t>
        <t>APIs exposing verification logic for Transparent Statements may provide more details than a single boolean result.
For example, an API may indicate if the signature on the Receipt or Signed Statement is valid, if Claims related to the validity period are valid, or if the inclusion proof in the Receipt is valid.</t>
        <t>Relying Parties <bcp14>MAY</bcp14> be configured to re-verify the Issuer's Signed Statement locally.</t>
        <t>In addition, Relying Parties <bcp14>MAY</bcp14> apply arbitrary validation policies after the Transparent Statement has been verified and validated.
Such policies may use as input all information in the Envelope, the Receipt, and the Statement payload, as well as any local state.</t>
      </section>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Interactions with TSs are expected to use appropriately strong encryption and authorization technologies.</t>
      <t>The TS is trusted with the confidentiality of the Signed Statements presented for Registration.
Issuers and Clients are responsible for verifying that the TS's privacy and security posture is suitable for the contents of the Signed Statements they submit prior to Registration.
Issuers must carefully review the inclusion of private, confidential, or Personally Identifiable Information (PII) in their Statements against the TS's privacy posture.</t>
<t>In some deployments, a special role such as an Auditor might require and be given access to both the TS and related Adjacent Services.</t>



      <t>TSs can leverage VDSs that only retain cryptographic metadata (e.g., a hash) rather than the complete Signed Statement as part of an in-depth defensive approach to maintaining confidentiality.
By analyzing the relationship between data stored in the TS and data stored in Adjacent Services, it is possible to perform metadata analysis, which could reveal the order in which artifacts were built, signed, and uploaded.</t>
    </section>
    <section anchor="SecConSec">
      <name>Security Considerations</name>
      <t>SCITT provides the following security guarantees:</t>
      <ol spacing="normal" type="1">
        <li>Statements made by Issuers about supply chain Artifacts are identifiable and can be authenticated.</li>
        <li>Statement provenance and history can be independently and consistently audited.</li>
        <li>Issuers can efficiently prove that their Statement is logged by a TS.</li>
      </ol>
      <t>The first guarantee is achieved by requiring Issuers to sign their Statements.
The second guarantee is achieved by proving a Signed Statement is present in a VDS.
The third guarantee is achieved by the combination of both of these steps.</t>
      <t>In addition to deciding whether to trust a TS, Relying Parties can use the history of registered Signed Statements to decide which Issuers they choose to trust.
This decision process is out of scope of this document.</t>
      <section anchor="sec-ordering-of-signed-statements">
        <name>Ordering of Signed Statements</name>
        <t>Statements are signed prior to submitting to a SCITT Transparency service.
Unless advertised in the TS Registration Policy, the Relying Party cannot assume that the ordering of Signed Statements in the VDS matches the ordering of their issuance.</t>
      </section>
      <section anchor="sec-accuracy-of-statements">
        <name>Accuracy of Statements</name>
        <t>Issuers can make false Statements either intentionally or unintentionally; registering a Statement only proves it was produced by an Issuer.
A registered Statement may be superseded by a subsequently submitted Signed Statement from the same Issuer, with the same subject in the <tt>CWT Claims</tt> protected header.
Other Issuers may make new Statements to reflect new or corrected information.
Relying Parties may choose to include or exclude Statements from Issuers to determine the accuracy of a collection of Statements.</t>
      </section>
      <section anchor="sec-issuer-participation">
        <name>Issuer Participation</name>
        <t>Issuers can refuse to register their Statements with a TS or selectively submit some but not all the Statements they issue.
It is important for Relying Parties not to accept Signed Statements for which they cannot discover Receipts issued by a TS they trust.</t>
      </section>
      <section anchor="sec-key-management">
        <name>Key Management</name>
        <t>Issuers and TSs <bcp14>MUST</bcp14>:</t>
        <ul spacing="normal">
          <li>carefully protect their private signing keys</li>
          <li>avoid using keys for more than one purpose</li>
          <li>rotate their keys at a cryptoperiod (defined in <xref target="RFC4949"/>) appropriate for the key-algorithm and domain-specific regulations</li>
        </ul>
        <section anchor="sec-verifiable-data-structure-1">
          <name>Verifiable Data Structure</name>
          <t>The security considerations for specific VDSs are out of scope for this document.
See <xref target="RFC9942"/> for the generic security considerations that apply to VDSs and Receipts.</t>
        </section>
        <section anchor="sec-key-compromise">
          <name>Key Compromise</name>
          <t>It is important for Issuers and TSs to clearly communicate when keys are compromised so that Signed Statements can be rejected by TSs or Receipts can be ignored by Relying Parties.
TSs whose receipt signing keys have been compromised can roll back their Statement Sequence to a point before compromise, establish new credentials, and use the new credentials to issue fresh Receipts going forward.
Issuers are encouraged to follow existing best practices if their credentials are compromised.
Revocation strategies for compromised keys are out of scope for this document.</t>
        </section>
        <section anchor="sec-bootstrapping">
          <name>Bootstrapping</name>
          <t>Bootstrapping mechanisms that solely rely on Statement registration to set and update registration policy can be audited without additional implementation-specific knowledge; therefore, they are preferable.
Mechanisms that rely on preconfigured values and do not allow updates are unsuitable for use in long-lived service deployments in which the ability to patch a potentially faulty policy is essential.</t>
        </section>
      </section>
      <section anchor="MediaTypeSecConSec">
        <name>Implications of Media Type Usage</name>
        <t>The Statement (scitt-statement+cose) and Receipt (scitt-receipt+cose) media types describe the expected content of COSE envelope headers.
The payload media type (content type) is included in the COSE envelope header.
<xref target="STD96"/> describes the security implications of reliance on this header parameter.</t>
        <t>Both media types describe COSE_Sign1 messages, which include a signature and therefore provide integrity protection.</t>
      </section>
      <section anchor="sec-cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>Because the SCITT architecture leverages <xref target="STD96"/> for Statements and Receipts, it benefits from the format's cryptographic agility.</t>
      </section>
      <section anchor="sec-threat-model">
        <name>Threat Model</name>
        <t>This section provides a generic threat model for SCITT, describing its residual security properties when some of its actors (Issuers, TSs, and Auditors) are either corrupt or compromised.</t>
        <t>SCITT primarily supports checking of Signed Statement authenticity, both from the Issuer (authentication) and from the TS (transparency).
Issuers and TSs can both be compromised.</t>
        <t>The SCITT architecture does not require trust in a single centralized TS.
Different actors may rely on different TSs, each registering a subset of Signed Statements subject to their own policy.
Running multiple, independent TSs provides different organizations to represent consistent or divergent opinions.
It is the role of the relying party to decide which TSs and Issuers they choose to trust for their scenario.</t>
        <t>In both cases, the SCITT architecture provides generic, universally verifiable cryptographic proofs to hold Issuers or TSs accountable.
On one hand, this enables valid actors to detect and disambiguate malicious actors who employ Equivocation with Signed Statements to different entities.
On the other hand, their liability and the resulting damage to their reputation are application specific and out of scope of the SCITT architecture.</t>
        <t>Relying Parties and Auditors need not be trusted by other actors.
So long as actors maintain proper control of their signing keys and identity infrastructure they cannot "frame" an Issuer or a TS for Signed Statements they did not issue or register.</t>
      </section>
    </section>

<!--[rfced] FYI - the RPC will communicate any changes to Sections
     10.1 and 10.2 to IANA for them to update the following registries
     respectively to exactly match the document once AUTH48 completes.
     https://www.iana.org/assignments/media-types/application/scitt-statement+cose
     
https://www.iana.org/assignments/media-types/application/scitt-receipt+cose,

-->
    
    <section anchor="sec-iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA has registered the following media types in the "application" subregistry of the "Media Types" registry group <xref target="IANA.media-types"/>:</t>
      <ul spacing="normal">
        <li>application/scitt-statement+cose (see <xref target="sec-media-type-applicationscitt-statementcose-registration"/>)</li>
        <li>application/scitt-receipt+cose (see <xref target="sec-media-type-applicationscitt-receiptcose-registration"/>)</li>
      </ul>
      <section anchor="sec-media-type-applicationscitt-statementcose-registration">
        <name>Registration of application/scitt-statement+cose</name>

        <table anchor="new-media-types-scitt-statement">
          <name>SCITT Signed Statement Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-statement+cose</td>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">
                <xref target="signed-statements"/> of RFC 9943</td>
            </tr>
          </tbody>
        </table>
        <dl>
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>statement+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFC 9943</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFC 9943</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to provide an identifiable and non-repudiable Statement about an Artifact signed by an Issuer.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Additional information:</dt>
          <dd><t><br/></t>
            <dl spacing="compact">
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.scitt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            iesg@ietf.org
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-media-type-applicationscitt-receiptcose-registration">
        <name>Registration of application/scitt-receipt+cose Registration</name>
        <table anchor="new-media-types-receipt">
          <name>SCITT Receipt Media Type Registration</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">scitt-receipt+cose</td>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">
                <xref target="Receipt"/> of RFC 9943</td>
            </tr>
          </tbody>
        </table>
        <dl>
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>receipt+cose</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary (CBOR data item)</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref target="MediaTypeSecConSec"/> of RFC 9943</t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFC 9943</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Used to establish or verify transparency over Statements. Typically emitted by a TS for the benefit of Relying Parties wanting to ensure Non-equivocation over all or part of a Statement Sequence.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>N/A</t>
          </dd>
          <dt>Additional information:</dt>
          <dd><t><br/></t>
            <dl spacing="compact">
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.receipt</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>N/A</t>
              </dd>
            </dl>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            iesg@ietf.org
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA has registered the following Content-Format numbers in the "CoAP Content-Formats" subregistry within the "Constrained RESTful Environments (CoRE) Parameters" registry group <xref target="IANA.core-parameters"/> in the 256-9999 range:</t>
        <table anchor="new-content-formats">
          <name>SCITT Content-Formats Registration</name>
          <thead>
            <tr>
              <th align="left">Content Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/scitt-statement+cose</td>
              <td align="left">-</td>
              <td align="left">277</td>
              <td align="left">RFC 9943</td>
            </tr>
            <tr>
              <td align="left">application/scitt-receipt+cose</td>
              <td align="left">-</td>
              <td align="left">278</td>
              <td align="left">RFC 9943</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>

    <displayreference target="RFC9393" to="CoSWID"/>

    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8392.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml9/reference.STD.94.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml9/reference.STD.96.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9360.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9597.xml"/>
<!-- [RFC9942]
draft-ietf-cose-merkle-tree-proofs-18
companion doc RFC 9942
-->
<reference anchor="RFC9942" target="https://www.rfc-editor.org/info/rfc9942">
  <front>
    <title>CBOR Object Signing and Encryption (COSE) Receipts</title>
    <author initials="O." surname="Steele" fullname="Orie Steele">
      <organization>Tradeverifyd</organization>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
    </author>
    <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
      <organization>Microsoft</organization>
    </author>
    <author initials="C." surname="Fournet" fullname="Cedric Fournet">
      <organization>Microsoft</organization>
    </author>
    <date month='April' year='2026'/>
  </front>
  <seriesInfo name="RFC" value="9942"/>
  <seriesInfo name="DOI" value="10.17487/RFC9942"/>
</reference>

        <reference anchor="IANA.cwt" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="NIST.SP.1800-19" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">
          <front>
            <title>Trusted cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments</title>
            <author fullname="Michael Bartock" surname="Bartock">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Donna Dodson" surname="Dodson">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Murugiah Souppaya" surname="Souppaya">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Daniel Carroll" surname="Carroll">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Robert Masten" surname="Masten">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Gina Scinta" surname="Scinta">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Paul Massis" surname="Massis">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Hemma Prafullchandra" surname="Prafullchandra">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jason Malnar" surname="Malnar">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Harmeet Singh" surname="Singh">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rajeev Ghandi" surname="Ghandi">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Laura E Storey" surname="Storey">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Raghuram Yeluri" surname="Yeluri">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Tim Shea" surname="Shea">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Michael Dalton" surname="Dalton">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Rocky Weber" surname="Weber">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Karen Scarfone" surname="Scarfone">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Anthony Dukes" surname="Dukes">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Jeff Haskins" surname="Haskins">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Carlos Phoenix" surname="Phoenix">
              <organization>Information Technology Laboratory</organization>
            </author>
            <author fullname="Brenda Swarts" surname="Swarts">
              <organization>Information Technology Laboratory</organization>
            </author>
            <date day="20" month="April" year="2022"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.1800-19"/>
          <seriesInfo name="NIST SP" value="1800-19"/>
        </reference>
        <reference anchor="NIST.SP.800-204C" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204C.pdf">
          <front>
            <title>Implementation of DevSecOps for a Microservices-based Application with Service Mesh</title>
            <seriesInfo name="DOI" value="10.6028/NIST.SP.800-204C"/>
            <seriesInfo name="NIST Special Publications (General)" value="800-204C"/>
            <author fullname="Ramaswamy Chandramouli" surname="Chandramouli">
              <organization>Information Technology Laboratory</organization>
            </author>
            <date month="March" year="2022"/>
          </front>
          <seriesInfo name="NIST SP" value="800-204C"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-204C"/>
        </reference>
        <reference anchor="NIST_EO14028" target="https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf">
          <front>
            <title>Software Supply Chain Security Guidance Under Executive Order (EO) 14028 Section 4e</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2022" month="February" day="04"/>
          </front>
        </reference>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4949.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8725.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9162.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9393.xml"/>
        <reference anchor="CycloneDX" target="https://cyclonedx.org/specification/overview/">
          <front>
            <title>CycloneDX</title>
            <author>
              <organization/>
            </author>
          </front>
        </reference>
        <reference anchor="in-toto" target="https://in-toto.io/">
          <front>
            <title>in-toto</title>
            <author>
              <organization/>
            </author>
          </front>
        </reference>
        <reference anchor="SLSA" target="https://slsa.dev/">
          <front>
            <title>SLSA</title>
            <author>
              <organization/>
            </author>
          </front>
        </reference>

        <reference anchor="SPDX-CBOR" target="https://spdx.dev/use/specifications/">
          <front>
            <title>SPDX Specification</title>
            <author>
              <organization/>
            </author>
          </front>
        </reference>
       
        <reference anchor="SWID" target="https://csrc.nist.gov/Projects/Software-Identification-SWID/guidelines">
          <front>
            <title>SWID Specification</title>
            <author>
              <organization>NIST</organization>
            </author>
          </front>
        </reference>
        <reference anchor="EQUIVOCATION" target="https://www.read.seas.harvard.edu/~kohler/class/08w-dsi/chun07attested.pdf">
          <front>
            <title>Attested Append-Only Memory: Making Adversaries Stick to their Word</title>
            <author fullname="Byung-Gon Chun"/>
            <author fullname="Petros Maniatis"/>
            <author fullname="Scott Shenker"/>
            <author fullname="John Kubiatowicz"/>
            <date day="14" month="October" year="2007"/>
          </front>
          <refcontent>ACM SIGOPS Operating Systems Review, vol. 41, no. 6, pp. 189-204</refcontent>
          <seriesInfo name="DOI" value="10.1145/1323293.1294280"/>
        </reference>


        <reference anchor="ISO_IEC_17000" target="https://www.iso.org/standard/73029.html">
          <front>
            <title>Conformity assessment — Vocabulary and general principles</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
          <seriesInfo name="ISO/IEC" value="17000:2020"/>
        </reference>	
	
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="O." surname="Steele" fullname="Orie Steele">
        <organization>Tradeverifyd</organization>
        <address>
          <postal>
            <country>United States of America</country>
          </postal>
          <email>orie@or13.io</email>
        </address>
      </contact>
      <t>Orie contributed to improving the generalization of COSE building blocks and document consistency.</t>
      <contact initials="A." surname="Chamayou" fullname="Amaury Chamayou">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United Kingdom</country>
          </postal>
          <email>amaury.chamayou@microsoft.com</email>
        </address>
      </contact>
      <t>Amaury contributed elemental parts to finalize normative language on registration behavior and the single-issuer design, as well as overall document consistency</t>
      <contact initials="D." surname="Brooks" fullname="Dick Brooks">
        <organization>Business Cyber Guardian</organization>
        <address>
          <postal>
            <country>United States of America</country>
          </postal>
          <email>dick@businesscyberguardian.com</email>
        </address>
      </contact>
      <t>Dick contributed to the software supply chain use cases.</t>
      <contact initials="B." surname="Knight" fullname="Brian Knight">
        <organization>Microsoft</organization>
        <address>
          <postal>
            <country>United States of America</country>
          </postal>
          <email>brianknight@microsoft.com</email>
        </address>
      </contact>
      <t>Brian contributed to the software supply chain use cases.</t>
      <contact initials="R. A." surname="Martin" fullname="Robert Martin">
        <organization>MITRE Corporation</organization>
        <address>
          <postal>
            <country>United States of America</country>
          </postal>
          <email>ramartin@mitre.org</email>
        </address>
      </contact>
      <t>Robert contributed to the software supply chain use cases.</t>
    </section>    
  </back>

</rfc>
