<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-posture-assessment-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="RPASCA">Remote Posture Assessment for Systems, Containers, and Applications at Scale</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-posture-assessment-04"/>
    <author initials="K. M." surname="Moriarty" fullname="Kathleen M. Moriarty">
      <organization>Transforming Information Security LLC</organization>
      <address>
        <postal>
          <region>MA</region>
          <country>USA</country>
        </postal>
        <email>kathleen.Moriarty.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization>Beyond Identity</organization>
      <address>
        <postal>
          <street>3 Park Avenue</street>
          <city>NY</city>
          <region>NY</region>
          <code>10016</code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@beyondidentity.com</email>
      </address>
    </author>
    <author initials="A.J." surname="Stein" fullname="A.J. Stein">
      <organization/>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ajstein.standards@gmail.com</email>
        <uri>https://orcid.org/0000-0003-1092-2642</uri>
      </address>
    </author>
    <author initials="C." surname="Nelogal" fullname="Chandra Nelogal">
      <organization abbrev="Dell">Dell Technologies</organization>
      <address>
        <postal>
          <street>176 South Street</street>
          <region>MA</region>
          <code>01748</code>
          <country>USA</country>
        </postal>
        <email>chandra.nelogal@dell.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="08"/>
    <area>Security</area>
    <abstract>
      <?line 74?>

<t>This document establishes an architectural pattern whereby Attestation Results could be produced for a complete set of benchmarks or controls that are defined and grouped by an external entity, eliminating the need to convey individual Evidence items for each item within a benchmark or control framework.
This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats for use as an Entity Attestation Token (EAT). While the discussion below pertains mostly to TPM, other Roots of Trust such as TCG DICE and non-TCG defined components will also be included.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-rats-wg.github.io/draft-moriarty-attestationsets/draft-moriarty-rats-posture-assessment.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-rats-posture-assessment/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS (rats) Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats-wg/draft-moriarty-attestationsets"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Posture assessment has long been desired, but has been difficult to achieve due to complexities of customization requirements at each organization.
By using policy and measurement sets that may be offered at various assurance levels, local appraisal of Evidence can be performed to continuously assess compliance.</t>
      <t>For example, the Trusted Computing Group's Trusted Platform Module (TPM) format and assessment method can provide this kind of compliance.  This and other methods employ a secured log for transparency on the results of the appraised Evidence against Reference Values.</t>
      <t>In order to support continuous monitoring of posture assessment and integrity in an enterprise or large data center, local appraisal and remediation are useful to reduce load on the network and remote resources.
This is currently done today in measured boot mechanisms.</t>
      <t>It is useful to be able to share these results in order to gain a big picture view of the governance, risk, and compliance posture for a network.</t>
      <t>As such, communicating a summary result as Evidence including a link to supporting logs within an Entity Attestation Token (EAT) profile <xref target="I-D.ietf-rats-eat"/> provides a way to accomplish that goal.</t>
      <t>This level of integration, which includes the ability to remediate, makes posture assessment through remote attestation achievable for organizations of all sizes.  This is enabled through integration with existing toolsets and systems, built as an intrinsic capability.</t>
      <t>The measurement and policy grouping results summarized in an EAT profile may be provided by the vendor or by a neutral third party, acting as a Reference Value Provider, to enable ease of use and consistent implementations.</t>
      <t>The local system or server host, acting as a local Verifier, performs the appraisal of posture Evidence and remediation.
This provides simpler options to enable posture assessment at selected levels by organizations without the need to have in-house expertise.</t>
      <t>The measurement and policy sets may also be customized, but not necessary to achieve posture assessment to predefined options.</t>
      <t>This document describes a method to use existing remote attestation formats and protocols.
The method described allows for defined profiles of policies, benchmarks, and measurements for specific assurance levels.
This provides transparency on posture assessment results summarized as Attestation Results.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="posture-assessment-scenarios">
      <name>Posture Assessment Scenarios</name>
      <t>By way of example, the Center for Internet Security (CIS) hosts recommended configuration settings to secure operating systems, applications, and devices in CIS Benchmarks <xref target="BENCHMARKS"/> developed with industry experts.
Attestation Results aligned to the CIS Benchmarks or other configuration guide such as one of the Defense Information Systems Agency's Security Technical Implement Guides <xref target="STIG"/> could be used to assert that the configuration meets expectations.
This has already been done for multiple platforms to demonstrate assurance for firmware according to NIST SP 800-193, Firmware Resiliency Guidelines <xref target="FIRMWARE"/>.  In order to scale remote attestation, a single set of Attestation Results for a set of benchmarks or policies being met, with a link to the verification logs from the local appraisals, is the Evidence that may be conveyed to the Verifier and then the Relying Party.
On traditional servers, assurance to NIST SP 800-193 is provable through Evidence generated from a Root of Trust (RoT), using the Trusted Computing Group (TCG) Trusted Platform Module (TPM) chip and attestation formats. However, this remains local and one knows the policies and measurements have been met when other functions that rely on the assurance are running.</t>
      <t>At boot, policy and measurement expectations are verified against a set of Reference Values from collected Evidence and are verified to meet expected values.  Device identity and measurements can also be attested at runtime, producing Evidence for appraisal.
The generation of Evidence (e.g. hash of boot element) and appraisal of Evidence are typically contained within a system and are limited to the control plane for management.
The policy and measurement sets for comparison are protected to assure the result in the Evidence appraisal process for boot elements.
Event logs and PCR values may be exposed to provide transparency into the appraised Evidence.  The Attestation Results defined in this document provide a summary of a local appraisal of posture for managed systems and across various layers (operating system, application, containers) in each of these systems in a managed environment as Evidence. The Relying Party uses the Attestation Results to understand posture of interconnected operating systems, applications, and systems that are communicated in summary Attestation Results.</t>
      <t>There is a balance of exposure and evidence needed to assess posture when providing assurance of controls and system state.
Currently, if using the TPM, logs and TPM PCR values may be passed to provide assurance that appraised Evidence meets set requirements.
Providing the set of Evidence as assurance to a policy set can be accomplished with a remote attestation
format such as the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/> aligned to the RATS Architecture <xref target="RFC9334"/> and Attestation Results for Secure Interactions <xref target="I-D.ietf-rats-ar4si"/>
and a RESTful interface such as ROLIE <xref target="RFC8322"/> or RedFish <xref target="REDFISH"/>.
Policy definition blocks may be scoped to control measurement sets, where the EAT profile asserts compliance to the policy or measurement block specified and may include claims with the log and PCR value Evidence.
Measurement and Policy sets, referenced in an EAT profile may be published and
maintained by separate entities (e.g.  CIS Benchmarks, DISA STIGs).
The policy and measurement sets should be maintained separately even if associated with the same benchmark or control set.
This avoids the need to transition the verifying entity to a remote system for individual policy and measurements which are performed locally for more immediate remediation as well as other functions.</t>
      <t>Examples of measurement and policy sets that could be defined in EAT profiles include, but are not limited to:</t>
      <ul spacing="normal">
        <li>
          <t>Hardware attribute certificates, TCG</t>
        </li>
        <li>
          <t>Hardware Attribute Certificate Comparison Results, TCG</t>
        </li>
        <li>
          <t>Reference Integrity Measurements for firmware, TCG</t>
        </li>
        <li>
          <t>Operating system benchmarks at Specified Assurance Levels, CIS</t>
        </li>
        <li>
          <t>Application hardening Benchmarks at Specified Assurance Levels, CIS, DISA STIG</t>
        </li>
        <li>
          <t>Container security benchmarks at Specified Assurance Levels, CIS</t>
        </li>
      </ul>
      <t>Scale, ease of use, full automation, and consistency for customer consumption of a remote attestation function or service are essential toward the goal of consistently securing systems against known threats and vulnerabilities.
Mitigations may be baked into policy.
Claim sets of measurements and policy verified to meet or not meet Endorsed Values <xref target="I-D.ietf-rats-eat"/> are conveyed in an Entity Attestation Token made available to a RESTful
interface in aggregate for the systems managed as Evidence for the Attestation Results. The Measurement or Policy Set may be registered in the IANA registry <xref target="iana">created in this document</xref>, detailing the specific configuration policies and measurements required to adhere or prove compliance to the associated document to enable interoperability. Levels (e.g. high, medium, low, 1, 2, 3) or vendor specific instances of the policy defined in code required to verify the policy and measurements would be registered using a name for the policy set, that would also be used in the reporting EAT that includes the MPS along with other artifacts to prove compliance.</t>
    </section>
    <section anchor="policy-and-measurement-set-definitions">
      <name>Policy and Measurement Set Definitions</name>
      <t>This document defines EAT claims in the JWT <xref target="RFC7519"/> and CWT <xref target="RFC8392"/> registries to provide Attestation Results for a set of verified claims within a defined grouping.
The trustworthiness will be conveyed on original appraised Evidence as well as the Attestation Results on the grouping. The claims provide the additional information needed for an EAT to convey compliance to a defined policy or measurement set to a system or application collecting evidence on policy and measurement assurance, for instance a Governance, Risk, and Compliance (GRC) system.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Claim</th>
            <th align="left">Long Name</th>
            <th align="left">Claim Description</th>
            <th align="left">Format</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">mps</td>
            <td align="left">Measurement or Policy Set</td>
            <td align="left">Name for the MPS</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">lem</td>
            <td align="left">Log Evidence of MPS</td>
            <td align="left">Log File or URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">pcr</td>
            <td align="left">TPM PCR Values</td>
            <td align="left">URI</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">fma</td>
            <td align="left">Format of MPS Attestation Results</td>
            <td align="left">Format of included Attestation Results</td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">hsh</td>
            <td align="left">Hash Value/Message Digest</td>
            <td align="left">Hash value of claim-set</td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="supportability-and-re-attestation">
      <name>Supportability and Re-Attestation</name>
      <t>The remote attestation framework shall include provisions for a Verifier Owner and Relying Party Owner to declare an Appraisal Policy for Attestation Results and Evidence that allows for modification of the Target Environment (e.g. a product, system, or service).</t>
      <t>Over its lifecycle, the Target Environment may experience modification due to: maintenance, failures, upgrades, expansion, moves, etc..</t>
      <t>The Relying Party Owner managing the Target Environment (e.g. customer using the product) can choose to:</t>
      <ul spacing="normal">
        <li>
          <t>Update the Appraisal Policy for Attestation Results and re-assess posture with this updated policy, summarizing with a remote attestation to the new policy or level, or</t>
        </li>
        <li>
          <t>Run remote attestation after modification of the Target Environment as external validation, or</t>
        </li>
        <li>
          <t>Continue operation of the Target Environment as-is, without verification, potentially increasing risk</t>
        </li>
      </ul>
      <t>In the case of Re-Attestation:</t>
      <ul spacing="normal">
        <li>
          <t>framework needs to invalidate previous Reference Values (e.g. TPM PCR values and tokens),</t>
        </li>
        <li>
          <t>framework needs to specify an Appraisal Policy for Evidence that requires fresh Evidence,</t>
        </li>
        <li>
          <t>framework needs to maintain history or allow for history to be logged to enable change traceability attestation, and</t>
        </li>
        <li>
          <t>framework needs to notify that the previous Attestation Results has been invalidated</t>
        </li>
      </ul>
    </section>
    <section anchor="configuration-sets">
      <name>Configuration Sets</name>
      <t>In some cases, it may be difficult to attest to configuration settings for the initial or subsequent attestation and verification processes.
The use of an expected hash value for configuration settings can be used to compare against the attested configuration set.
In this case, the creator of the Evidence appraisal measurements would define a set of values for which a message digest would be created and then signed by the Attester.
The expected measurements would include the expected hash value for comparison.</t>
      <t>The configuration set could be the full attestation set to a Benchmark or a defined subset. These configuration sets can be registered for general use to reduce the need to replicate the policy and measurement assessments by others aiming to assure at the same level for a benchmark or hardening guide.</t>
      <t>This document creates an IANA registry for this purpose, creating consistency between automated policy and measurement set levels and the systems used to collect and report aggregate views for an organization across systems and applications, such as a GRC platform.</t>
    </section>
    <section anchor="remediation">
      <name>Remediation</name>
      <t>If policy and configuration settings or measurements attested do not meet expected values, remediation is desirable.
Automated remediation performed with alignment to zero trust architecture principles would require that the remediation be performed prior to any relying component executing.
The relying component would verify before continuing in a zero trust architecture.</t>
      <t>Ideally, remediation would occur on-system as part of the process to generate Evidence for a set of claims, similar to how Evidence is generated for firmware in the boot process.
If automated remediation is not possible, an alert should be generated to allow for notification of the variance from expected values.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document establishes a pattern to list sets of benchmarks and controls within CWT and JWT formats.
The contents of the benchmarks and controls are out of scope for this document.
This establishes an architectural pattern whereby Attestation Results could be produced for a complete set of benchmarks or controls as defined and grouped by external entities, preventing the need to convey individual Evidence items for each item within a benchmark or control framework.
This document does not add security consideration over what has been described in the EAT, JWT, or CWT specifications.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="reuse-of-cbor-and-json-web-token-cwt-and-jwt-claims-registries">
        <name>Reuse of CBOR and JSON Web Token (CWT and JWT) Claims Registries</name>
        <t>Claims defined in this document are a profile of EAT. Like the base claims of EAT, the claims below are compatible with those of CWT and JWT so the CWT and JWT Claims Registries, <xref target="IANA.CWT.Claims"/> and <xref target="IANA.JWT.Claims"/>, are re-used. No new IANA registry is created. All EAT claims defined in this document are placed in both registries.</t>
      </section>
      <section anchor="cwt-and-jwt-claims-registered-by-this-document">
        <name>CWT and JWT Claims Registered by This Document</name>
        <t>This document requests the creation of a Measurement and Policy Set (MPS) registry. The MPS registry will contain the names of the Benchmarks, Policy sets, DISA STIGS, controls, or other groupings as a  policy and measurement set that <bcp14>MAY</bcp14> correlate to standards documents containing assurance guidelines, compliance requirements, or other defined claim sets for verification of posture assessment to that MPS. The MPS registry will include the policy definition for specific levels of MPS assurance to enable interoperability between Attestation Results asserting compliance (or lack thereof) and reporting systems.</t>
        <table>
          <thead>
            <tr>
              <th align="left">MPS Name</th>
              <th align="left">MPS Description</th>
              <th align="left">File with MPS definition</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Ubuntu-CIS-L1</td>
              <td align="left">Ubuntu CIS Benchmark, level 1 assurance</td>
              <td align="left">http://   /Ubuntu-CIS-L1.txt</td>
            </tr>
          </tbody>
        </table>
        <t>The MPS name includes versions or level information, allowing for distinct policy or measurement sets and definitions of those sets (including the supporting formats used to write the definitions).</t>
      </section>
      <section anchor="additions-to-the-jwt-and-cwt-registries-requested">
        <name>Additions to the JWT and CWT registries requested</name>
        <t>This document requests the following JWT claims per the specification requirement required for the JSON Web Token (JWT) registry defined in RFC7519.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestation Results</td>
              <td align="left">Format of included Attestation Results</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mps-measurement-or-policy-set-claim">
        <name>MPS (Measurement or Policy Set) Claim</name>
        <t>The MPS (Measurement or Policy Set) claim identifies the policy and measurement set being reported. The MPS <bcp14>MAY</bcp14> be registered to the MPS IANA registry. The MPS may be specified to specific levels of assurance to hardening, loosening guides or benchmarks to provide interoperability in reporting. The processing of this claim is generally application specific.
   The MPS value is a case-sensitive string containing a StringOrURI
   value.  Use of this claim is <bcp14>OPTIONAL</bcp14>.</t>
        <t>This document requests the following CWT claims per the specification requirement required for the CBOR Web Token (CWT) registry defined in RFC8392.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description</th>
              <th align="left">JWT Claim Name</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">MPS</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Name for the MPS</td>
              <td align="left">MPS</td>
            </tr>
            <tr>
              <td align="left">LEM</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Log File or URI</td>
              <td align="left">LEM</td>
            </tr>
            <tr>
              <td align="left">PCR</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">URI</td>
              <td align="left">PCR</td>
            </tr>
            <tr>
              <td align="left">FMA</td>
              <td align="left">Format of MPS Attestation Results</td>
              <td align="left">Format of included Attestation Results</td>
              <td align="left">FMA</td>
            </tr>
            <tr>
              <td align="left">HSH</td>
              <td align="left">Hash Value/Message Digest</td>
              <td align="left">Hash value of claim-set</td>
              <td align="left">HSH</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="appendix-a-extended-claims-table-with-rot-variants">
      <name>Appendix A – Extended Claims Table with RoT Variants</name>
      <section anchor="a1-chained-attestation-and-measurement-exposure-across-hardware-roots-of-trust">
        <name>A.1 – Chained Attestation and Measurement Exposure Across Hardware Roots of Trust</name>
        <table>
          <thead>
            <tr>
              <th align="left">Platform</th>
              <th align="left">Hardware Root of Trust</th>
              <th align="left">Measurement Chaining</th>
              <th align="left">Attestation Evidence</th>
              <th align="left">PCR/Measurement Exposure</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DICE</td>
              <td align="left">Minimal hardware + UDS</td>
              <td align="left">Yes</td>
              <td align="left">Stage certificates, attestation chain</td>
              <td align="left">CDIs (not standard PCRs)</td>
            </tr>
            <tr>
              <td align="left">Apple</td>
              <td align="left">Boot ROM &amp; Secure Enclave</td>
              <td align="left">Yes</td>
              <td align="left">Internal logs, biometric/auth evidence</td>
              <td align="left">Not standard PCRs (internal use)</td>
            </tr>
            <tr>
              <td align="left">OpenTitan</td>
              <td align="left">Open-source silicon chip</td>
              <td align="left">Yes</td>
              <td align="left">Logs, certificates</td>
              <td align="left">TPM-like PCRs</td>
            </tr>
            <tr>
              <td align="left">Amazon Nitro</td>
              <td align="left">Nitro Security Chip</td>
              <td align="left">Yes</td>
              <td align="left">NitroTPM logs, AWS-signed attestation</td>
              <td align="left">NitroTPM PCRs</td>
            </tr>
            <tr>
              <td align="left">Nitro Enclaves</td>
              <td align="left">Nitro Security Chip + Hypervisor</td>
              <td align="left">Yes</td>
              <td align="left">AWS-signed attestation tokens</td>
              <td align="left">Enclave PCRs</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="a2-extended-claims-table-with-dice-apple-secure-enclave-opentitan-and-amazon-nitro">
        <name>A.2 – Extended Claims Table with DICE, Apple Secure Enclave, OpenTitan, and Amazon Nitro</name>
        <table>
          <thead>
            <tr>
              <th align="left">Platform</th>
              <th align="left">Claim</th>
              <th align="left">Long Name</th>
              <th align="left">Claim Description (with RoT Mechanism)</th>
              <th align="left">Format</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">DICE</td>
              <td align="left">mps</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">DICE CDI lineage: Minimalist hardware root of trust (UDS in ROM/SoC), performs measured boot, derives Compound Device Identifiers (CDIs) at each boot stage, binding device and firmware state.</td>
              <td align="left">CDI derivation chain; certificate-based attestation</td>
            </tr>
            <tr>
              <td align="left">DICE</td>
              <td align="left">lem</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Implementation-specific logs and attestation certificates; evidence is the chain of CDIs and alias certificates, often used in TLS client authentication.</td>
              <td align="left">Log file, attestation certificate, or URI</td>
            </tr>
            <tr>
              <td align="left">DICE</td>
              <td align="left">pcr</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">Not applicable; DICE does not use TPM PCRs. Instead, it uses derived cryptographic identities (CDIs) per boot stage.</td>
              <td align="left">—</td>
            </tr>
            <tr>
              <td align="left">Apple</td>
              <td align="left">mps</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Secure Enclave root identity and enclave measurements: Hardware root of trust (immutable Boot ROM in SoC), secure boot of SEP OS, device-unique UID, monotonic counter for anti-replay/rollback, local attestation.</td>
              <td align="left">Local attestation (UID + monotonic counter); enclave measurement logs</td>
            </tr>
            <tr>
              <td align="left">Apple</td>
              <td align="left">lem</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">SEP logs, anti-replay/rollback counters, internal secure boot logs (not externally exposed); used for local security and policy enforcement.</td>
              <td align="left">Internal log file or counter</td>
            </tr>
            <tr>
              <td align="left">Apple</td>
              <td align="left">pcr</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">Not applicable; Apple does not expose TPM PCRs. Integrity is enforced using UID, monotonic counters, and secure boot chain.</td>
              <td align="left">—</td>
            </tr>
            <tr>
              <td align="left">OpenTitan</td>
              <td align="left">mps</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Boot-time firmware validation and Creator Identity checks: Open-source silicon root of trust (boot ROM in silicon), measured boot, stable Creator Identity, hardware-backed key management, remote attestation.</td>
              <td align="left">Hardware-backed attestation logs and certificates</td>
            </tr>
            <tr>
              <td align="left">OpenTitan</td>
              <td align="left">lem</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">Firmware integrity logs, certificate-based attestation, logs tied to Creator Identity and measured boot state.</td>
              <td align="left">Certificate-based attestation, log file</td>
            </tr>
            <tr>
              <td align="left">OpenTitan</td>
              <td align="left">pcr</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">Custom attestation logs; supports TPM-like PCRs for remote attestation, but uses a stable Creator Identity rather than evolving device identity at each firmware layer.</td>
              <td align="left">Hardware-backed boot state, TPM-like PCRs</td>
            </tr>
            <tr>
              <td align="left">Amazon Nitro</td>
              <td align="left">mps</td>
              <td align="left">Measurement or Policy Set</td>
              <td align="left">Secure boot and firmware validation: Nitro Security Chip as hardware root of trust, NitroTPM provides virtual TPM instance with PCRs, measured boot, and remote attestation for cloud servers and Nitro Enclaves.</td>
              <td align="left">NitroTPM PCR values, AWS-signed attestation</td>
            </tr>
            <tr>
              <td align="left">Amazon Nitro</td>
              <td align="left">lem</td>
              <td align="left">Log Evidence of MPS</td>
              <td align="left">NitroTPM logs, attestation evidence, logs signed by AWS; used for remote attestation and verification of cloud instance or enclave state.</td>
              <td align="left">AWS-signed attestation, NitroTPM log file</td>
            </tr>
            <tr>
              <td align="left">Amazon Nitro</td>
              <td align="left">pcr</td>
              <td align="left">TPM PCR Values</td>
              <td align="left">NitroTPM PCR values (cryptographically signed, used for attestation and sealing secrets to boot state); standard TPM 2.0 interface for EC2 instances and Nitro Enclaves.</td>
              <td align="left">Cryptographically signed PCR values, standard TPM 2.0 format</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati"/>
            <author fullname="Eric Voit" initials="E." surname="Voit"/>
            <author fullname="Sergei Trofimov" initials="S." surname="Trofimov"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>This document defines a format for Attestation Results used in secure interactions, building on the RATS Architecture (RFC 9334) to enable Relying Parties to make trust decisions based on the security state of Attesters.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-07"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="IANA.CWT.Claims" target="https://www.iana.org/assignments/cwt">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8322">
          <front>
            <title>Resource-Oriented Lightweight Information Exchange (ROLIE)</title>
            <author fullname="J. Field" initials="J." surname="Field"/>
            <author fullname="S. Banghart" initials="S." surname="Banghart"/>
            <author fullname="D. Waltermire" initials="D." surname="Waltermire"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a resource-oriented approach for security automation information publication, discovery, and sharing. Using this approach, producers may publish, share, and exchange representations of software descriptors, security incidents, attack indicators, software vulnerabilities, configuration checklists, and other security automation information as web-addressable resources. Furthermore, consumers and other stakeholders may access and search this security information as needed, establishing a rapid and on-demand information exchange network for restricted internal use or public access repositories. This specification extends the Atom Publishing Protocol and Atom Syndication Format to transport and share security automation resource representations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8322"/>
          <seriesInfo name="DOI" value="10.17487/RFC8322"/>
        </reference>
        <reference anchor="FIRMWARE">
          <front>
            <title>Platform firmware resiliency guidelines</title>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <date month="May" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-193"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="REDFISH" target="https://www.dmtf.org/sites/default/files/standards/documents/DSP0266_1.20.0.pdf">
          <front>
            <title>Redfish Specification Version 1.20.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="STIG" target="https://public.cyber.mil/stigs/">
          <front>
            <title>Defense Information Systems Agency Security Technical Implementation Guides</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="BENCHMARKS" target="https://www.cisecurity.org/cis-benchmarks">
          <front>
            <title>Center for Internet Security Benchmarks List</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 302?>

<section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Thank you to reviewers and contributors who helped to improve this document.
Thank you to Nick Grobelney, Dell Technologies, for your review and contribution to separate out the policy and measurement sets.
Thank you, Samant Kakarla and Huijun Xie from Dell Technologies, for your detailed review and corrections on boot process details.
Section 3 has been contributed by Rudy Bauer from Dell as well and an author will be added on the next revision.
IANA section added in version 7 by Kathleen Moriarty, expanding the claims registered and adding a proposed registry to define policy and measurement sets.
Thank you to Henk Birkholz for his review and edits.
Thanks to Thomas Fossati, Michael Richardson, and Eric Voit for their detailed reviews on the mailing list.
Thank you to A.J. Stein for converting the XMLMind workflow to Markdown and GitHub, editorial contributions, and restructuring of the document.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA9Vd/XLbSHL/n08x8VZlpRwIWfJm16u9XJamZEt3kqWI8u1t
uVwpEBiScwIBBgNI5q63Ku+QPECeJY+SJ0l/zBdAUJLvtHWJ6q5MgsBMT0/3
rz8HOxwOB7eH4sVgUKs6l4fiSi7LWorLUtdNJcVIa6n1Uha1mJWVmKx1LZc6
EuOyqBNVyAo+J0UmRqtVrtKkVmWhRVKLSZrkcpBMp5WE4a8uR5PxaJCVaZEs
YZKsSmb1UMl6NqySWg9XPNswcbMNn78YwHCHQtfZIIVBZaEbfSjWUg90M10q
rWGqer2C0U6Pr18PimY5ldXhIEtqeRg+UVcNEFLJ5FBMZNpUql4PbuT6rqyy
w8FgcCuLBh4QYl6VzepQPDMMGF3XUte0IHFZlanMgMCJ2EF6d5/B/Tz3sx/K
6kYVc/EGH8fry0TlcB3v+x5XGJfVHK8nVbo4FIu6XunDvT28C6+oWxnbu/bw
wt60Ku+03MPn95AsVS+a6aHwzLqb7zH/lmWlkqpeD5Pa0aplreGpPMErfrrw
6ZiHjFX5wDjdn7dsVbyol/lgkDT1ooQNGAre4z8k9SKXshDnsTg3QwBlsM5D
cV0lhQZ5WiLnTgv8xJy2OyTOzsZws2Rm3pihYjsOsez7Of4ap+US7qzkHJ4/
FOcj+JKWTVFX60PxbjJy9JyjuIgflIZBC0vIK7kuQXpPM1iHIvrMlEu8O77j
u7+f0m3K3GWm1HUlJfD4hbhMqhsxIkmi2TOY7sv958/3v/4Sv8Mjh+LtjwGV
9KWXylH8+1hMaqkKT0vyZ40XYtiaIkuqTLdWDvzy+1xWqcpIlp7D3xD+/2K4
//zbg+HB118dbJtzvIBxq0S8lXk5T3LLmyOZ5+JapouihOtKolxZhcbfPIEp
DxAXPMD3GfzaYdL+N1+LSQkiAovDK55Pz/e/+erll/du4aBgAbklRb16PT7Y
3//WfHz54tsD8/Gbf3RXv33x4iv8eDo8ir3sSwAUvDh6O4rHP1zH4zxRS4AI
upDe1fa333d/+zP8NlBWTh0ZL18cHAC4XZydHsOF16dX5z+Mro6BOxen8f7z
+OvnBy/33p5OruPJZfwStmP/2xf44PHR69PJCY4BKJJUcxko6t3dXZwtDR5o
Bfq4l8lZ0uT13kzl8M0JwR6gaYP6p/eOJpfPD77++l/344Pn8fN4lc14bIvo
2UxpYPxKpmpmQFr8EaAb/+Vn4P7J9embfppWzRSwPU7XALDxUuVAg5oTOLk5
juQM4Fa2dZlthRjNZZGuvWqTSAEZuThdrnKJS+AH3jSgYShlr47fjk/OR1d/
mGxnUgqqyQMSq+DrcArzLJagizokbQzjy4qs1yl+KmTtaXnlHhFnSsMmD4dD
EHKQ2iSFb9cLpYXls0BsBE7ohQQTVxCgwwalAIewlhWCZ1WIu4Ws5HQtEpBn
MiQBqKJU55mYSgHmq5EZEZXAVeQD3AqgK8qZ8OsARYRfQRHKXIt6AXYVDJkA
gQDLm5HdJasFn3HGQsiPSANQw0AVCZkrwFiYHHC2XkhRSLi3LmEmeLa8Bb4o
wLVblTXwUAj/RJpM0oWAJS7FHZgMBUv2tAWkiVkFOAIG9Sa+j2OORTA/XKtx
ubqzXlySW7CZFDSVroNWCpYupq4BeUtoJ45ptWIUcPq6vAHTs3M8ut6NxQ8L
UB1af6Z02pDrALPm5Z1YyQr9GA2Ar+t8jbRdX55HooS7K3FVlkziddUgwQ3w
A6a8Hr8RR6fjY3Z9irIY4hW7LbidZYGKCSsACE1yXdKeF2neZDKLWcqWKsvA
RRp8gWJZlVmTIuGDgfW8vIEVC5gzL2ELp2hPQUdUJbNITBv+ia+qGeg24AQu
AfZNyVtYbiPxKwvYR1UDiONqgAV1uVQ/Masq+W8NDEhQgq4b7TroVFKYO+LB
qzVwG2VoVQISrGnZS5nohh/jnST5XCZrXGs5m4EaZDjcbVKpstG4HlCUIpUi
B9Jy8BvzEkEgWCeQJm/RysJNaYJbhPuDe85Si5KhigZGg53i53htCscFvr5G
of2Y4Goj2m/aN3h4DHc1tfPTvtTul0twlXAG8A+yBqRkB7Z/18gZrTOgbynB
xcmItFVVIqUwCcg7OIAZ8dXTIgRpAg7AosTPajCZq7xEeCD4AgLAZJI41+gT
rUC/ESxhW5D8SmrYUdoz/MqkwDOOS8kchRf27COAOy7nNskbqYEVpwXsYQYT
o7Y3q1VZ1QH/0L9RNXhTwBEYfLUpc0i5ArycE06i7heCkHRVAfKi9ueIygL8
bUAw+oVZ3t1VZgIKSqZY4BDDQHlnTY7EAQ8aFIoyyeyyAaIRTeyDiKLAibKp
UlwaMRb+B+wDZqHSZqBuMFSWEKFGMAETQXvhG3onSi+JKTU+6OcGAQN8Ih3R
CyQLZtee7SrgITIa8U+BEqiUuHWr5J3dmjmCaYFbHwlg0E1koMwKhGMxQ75Z
IZA00gQrEd67bAoyz7ApIB/NEjBxbYhB2HG7DnqcGTjhe3NV3AQbjRdBrBhB
+y2RBSve2PsBFIUdnQ/xfsOd+mAVAfH9Llkz+PCyweUgSJiXSR4bW0qqjzxj
0aKpIrCZCg0N46NmUZ+qHEkiAWHRAc4ukxv4vUda6wWo9XzRt1LGQtpm5H0I
bKRYCUC0Vj+BZBmdhf/JAu/P3LABtcxTAFPNRrUESyWNkGsbHU8bxVsGvIVn
Qc20SgE3VmZZxA7ZglB83qAr2XQc3MohiwLQ6PZrdO02xSCu2QfyBJCBEI1k
tFxyDUDgmhrdFMCrCibCIAp5ywsFyEeVnrFJZROsYYFIl2r5aNpQzkrO68U5
tKzQmVjAzljI1gFkWXR3O9dGBKPTTpQ0TQrEr3iXPKF9QIXmJ2f0Y8uCK25v
M+4ZBB8tF2iR3KJNHsIPsGoEUFAcLe/fGtpq5Lg16taUWntcAOQUEnBKo+4G
prhPaEtYsrSaaBYbd71OYEhaqSlpmDFA8CDTbISwR+qto0S0V2VdpiCnsVka
DWLHzVADyjv2qSwxRrg0bxosHTyHKHDUoq4LwI9rE2JsGPvuDneNXQ93eoSf
VG9zscizLzAjdYtuLyWggLgjXIqi77ylN3ItMOujxbPzd5PrZxH/K95e0Oer
4395dwqxGX6enIzOztyHgbljcnLx7uzIf/JPji/Oz4/fHvHDcFW0Lg2enY9+
fMYse3ZxeX168XZ09gxVuW7tNBkg4yqSoZUo04ke+K2CZ16NL//7v/a/Ej//
/HcmEv7lF/PlJYTS8AVCkIJnKwuwjvwVRH89SFYrmVQEIoB6gEeqTtATA6TS
i/KuEBi8ADf/4T1y5sOh+O00Xe1/9TtzARfcumh51rpIPNu8svEwM7HnUs80
jput6x1Ot+kd/dj6bvkeXPztP4PdlGK4//KffzdAEepJek7AtUEHFmQInGC0
cOikhi7mvfHlzvh0skuwqEFw0cQDLFOMUMzUvDEmBVAF9VhzZIZuIaCBrNgT
cEYlCVKsvL0ZeAQANbifME8YzL73IfQHvA1inZVVIHBWAbQAnRjzQHtGYeCX
5GpeMETS8toDo0khf7a9gjmG7i4+QnfM+EUPJwbAF78vNWCyAuI95ic++Ai6
0UwjIkbFyN4maSkRq9kxtjBBIIQhU5JXMsnWJnRCenH/lgA4aoVmxgQFtCMZ
AE6BGYFaBriG989UtbxDrUWXp8rYHxCY8RGTS2EyPpF4bW+7gsgtV4R5tCoU
P1iZTRx9AA+k5bZjDr0H7yL0DmGyfAPyKazoySFYCIfLSCRYAOsaWs+RXYbK
54fIf5xV5bLfqY/QTcJfvFMahH/amDc/KqwIJRYu2MgmX1NASencwUWBJiEj
uEbHgtwJAibL703GCmNQ2IM3nlqLIUg9eL8YBqA4Ugy/c1Ve70YmnL0nRIRA
cPxm94EwEWz7ioPETdMbi5PyDjSPwiKF6r+kRINhJaEzGKUCTS/S4fZow7KS
p0KSihunZkYDZ02RGv8IWY8ctQGUZxuKXdUUBawLg42agqJoWxwfags9ajYv
c4GmE7Bn8zKHjXdkP2N2g5thfDEfoyJ/wrFgK1E5N4JWAWiBgCZson2TFRh6
W9eLec5JBlhirZaSHZxWHgs44ijZkfE8Rv1fkIqgXEhGmV2aqqUAGBq0cBGt
83qF6ASMTk39K/OpMeMN2+Vi5q32OGpzZQAtFm2SIpnT7Ez2fbmVGWXblqAt
SpsIGr06Zh+jYMPhq40XlZGEQDBby1thTUvzyCEn4sExulGs/0jL5fjKbJDV
bti30qCvS4OE/hx4Ly3Vz9rOGoZZfbAWxqRtxyiIMW1UjLvTm0AK42zmsIvL
eGvSqoRl26xUnqwBaMRO1962zG3ktrvSu0gep8hmJl1ghycpsHPK4lZVZcGO
nY/dY1r8lUG/S4rDwJTpNr88qIKnX6A5oLS/W5wJoCsgq2AZeJS/YAl1mWSf
c2C2t3MOJtirMF2NqY8kJ0ghBwgosYGcIxYjK2+UtQ/U0QM1m0j5CodOlDMz
2V5PIC62Bl0e2wRPhKAXIDYmaJ18wrceGV0luiOirVnv0XS/HgQp4qisW0nS
eHDp1oL0GET0gKfbdisJokeb1/RJEuuW9aVpBiYPaR0rnO2BXE1PjmZAcg+e
8uQa814kObMk9f4aVbAghhjSB4ggQHeuZPYaUzjvTbnqA6yaV5G5wEpMQQNv
HM91Sk6mSdQi2HVxLOLyCK8jyGGwExcmcy1sGs6hMgdj0bw22jSVkCVl/yiF
JFIq3jFf2X2Zt7HM6+PgvBPpX/pIP4ItwTw23Hdf5qWZmn2Exwdo5I1lmOIo
AIroOJJBQ+vONqjjVkfi6HQyohKc3n3YGkCsZrzgYDY7FRgn8DoKVBlga5kq
Um7HCp0sZX8VB4Y2HnJyW6pMt7IlBPC86Q6pCMKMpSYxNwJstBgROKgu9S9I
m+QfWTSX6ydgh4UQiJcIQEuTA2wnkuFpLFJjyNF2iQC5jjlIoxTGfdkcAkMX
VgQ2KNhqbSWLkzxILCZ6vIk/HAyG4iSpMg4H6hrC9QaoTTGpRECD+RPwKMPb
Ru62sb+N/FBj5q8Yhu2DV1YYKdDkxPx5NwVjYxL70EXHMLSqbbUtCsMiRg6y
zkx9BmQUBgg6e8B1gtgEfckwJHx4lEC8YUDXOiRsBfczaRpQc1EUZi0j2HoU
hKYulzZGCvOYKcsSZ+s4egVbt3Lw35tCM8Jk85vKuNNYggGhx2RqCZzOTP4/
yY05M5nTfG3W522y86LR60dFgiDU5Ohumxw4wulhhVWOc/h3blxPAzTT5IYk
E40aCTCYSAQ6V0ht6VUg5xueN6yooNoIfD7GPLF2Xnhvkp99heJWrh8uGSwT
NLa32N9kSivO9Ay86cFB5vNKzlHkqfy18I6U9aHCmoe9Z3Oj2KUKYRxuNSg+
kS4mxfYSGL6yDqak1g5zGXye9ynuRo/7+WHnCzBJCQSNmQTBzZ3Zt8nOdt5h
exxnfAj2kDIyhBibgy8heyxfAN7OEfaJcOIkOX2momA0xMY4ar6IBCJls0Rf
6S4S+5E4iMSLXZzTFAfcClAocW5XaVwFpp5Zgt06rRWwCQjv3oR2i6oB79mN
S6j1yG2qx+OI8ZiftJEe5XqUTRzYChfiM93cKhydX07gOSyWk8lju5AgvCZp
ra1DKNt14y+svOASQklC+ekkktu5+RmlcJAU43MYMrFZ4b3pSfpAw47NFWxY
+mDFDuUk9FEDbSLFMa6lU+DAsaFow26QLRmx70CZjjtg0wKpM20I00CFCdTU
XGGuZTPoCMxqN4Q05t9NR6pniPIlcXgmc7kcFWT+TIRAmSo2sOwsAlUdDfBL
6/cAkTHMIVeDCuIdm4YgB8Uuy+rmplPlvPXIOC2sDTD6m6Cse+XKumNP6s6b
q/GuIQIE6ZNgRP4kzlAE36KQb/zZm44orc9GaOOW1+z5fxp8GvKf/bf3794f
O7fAkGK50jTLdtSEH9+GKop6tUml/QBD5rALghYOqul4Pgsf5B9fo+8Mo767
Ou3jTTDkKq3okg3x/sgWqn1/7zBbh5wtk5C9hr5WAjz80fbstFNB7SEXECXh
pRPMKxGJe+dY/5tLcaTm8JT7kUMP9BJw/4cow31UAhxNuJBvq+AodFdyGJDJ
Ja0+r8X2YmFHQ567kIi0U7vWrgQbADkve3FXmOxsOy3B1ykBDvRSsI/OYJUo
DWptRAXHCn0A47LScMet1HBQZVyWWSv6pqCeevzArfBpEzZlCZKO3VGRS814
hwyCpcEFtbHBnLmayXSdut6fzRHRFaCqh+IAP6SDe6UOOaSSRudnYO9BP8Dx
bFbzCjwb+AQDYCyEPuYS4AGv1Gls6sZ9LCR3xiUvtq3T+aY+0WEWvktJg3RR
amlDjXcr7HOnmz5rS1zjts/NcGCIbTE0pgXcyBVelbWlvV6y8VYKeRcgNRV9
cZ8wammK3raMGVbNHikJ3EnhuhtBj1Rm3HyaY8yNTa5s9sBgQ4WZCNMTEKaC
MDFes3OfUzYBXELaDWzpoZ4qSuWauKOtkbQvXvvQ1JFtV4UhF/cTjBFmHX0k
ZyCNRaCTyqKCCfrUejfqH5sduPVWzWxroPHesKwjAY3sj1vGtqkF8CVBMCva
V9JhGtle5Hp1Xs7n7BUa9xR7ruaUFk6lA7FWBavI+qeFuITdyqQ2OmB41ifS
rvvRMzkzvQCBRz7BMxG4eRr0i3YPy1cuMGh3TtIsxi3pK9Fae0guIcZ8gEXN
VANruRklkPBuRcGk3KXpw2hYikiwTSFk4a0EZ/x7STApRFsB5bqADHy1vgJz
zNKLfXOJNghJEQ9WdGf31wp6nHr2zgIPlUUWqTYJHXiKjWDGRtAFAzbOcvVA
zQVn07jEVJQVM8mxpocGa9rq8L4NFtpsigHoDcb43A+Ow2mEgBHO0XwV5sy8
e0qbX5MjrHtGd7sVhEBI11xiuJ+TEPgmyDDjBoFOzhmh7SFWq80Su54w2gHg
UEtTizZ1IaNLlPvjFjz2AVp5QJ/coWr+RiMS7xshcTtyZpXAamxTYWUo4ltx
pDABM5X1HeqqSdJ4174nx2k7uYyMuMyAl3ny741No+ZWn07Avkxtg4ywEcwW
f1r1oFaVxGbEwfO/Grs2AIoQr3ziEcBkFhK/RU/bIYv2ypmVPv3SKYJGrQQn
sp+6vRFU48HIcS68yadN2Upj/4bNFvwkq9IUvoPjCoiqoDyK0qOsS8Y2eNwN
Z2j1YcOjJbmFSbF2ZXzX8w7rkSmV0WPjoXZv4PlM9mAqZyXnltB+440U1m4h
Gzt4M4m2uc0mHrJM06bCKM8WYjV1F7iUhil4tkDe4Vfo30fYgIjH86hNEAxe
iAco5o4XrSYQE/lTMdVMFqOgJL27BuOgDIC+aDVFl5Uq29jK4rP7DBK2xOts
L5nIjtOE9UzuS8Eq/GY7+Be+yWaMOpkZP2kjpfFrHdmILfrWpAuG7G3jID/R
OYPbqKrkMcYSakoVf+MzOYnedhqnfRSH2ifRlcFvf5uzOFkpWeSSLPOZ9zQU
BqbiDiHAnysJew9N3S7CjaUwDDdah+fKWNbIPrTlTPxMWdRf4GfEUuP8jF9d
XLGkTC7eih/k1NYyAwna5XQJes02ZzYYmEtbWwYoXnWVOpgJyI7FmbphczpF
F97krfhH4xHxJT4bZCrkIEWooTZSKg3lgYhr0yoXXNogORLvO+cOOS34vnPi
8EPEPTtyiLYuFm9Liq3aFhe9OPaiYjEChyXIP97LETBoppQ5LamV1lIX07Zs
XQC5LSDUJFFHZsQucqAJkbrW3rV01ZUtNVbMM+2cX0523cpMLv9y4tdKyUvT
f8F6AwLuACSsobYqt67iNImcuka+fdFmMDVb+/tcETKJ56MfYZgKzBl5ZKVw
5zAdA7Slst3jMHedflGY4wwbCgK63CEyX9iZUcK+3a/Q303OlF5OtnExdJhX
G8X8VgO38b9MfqzVzrClAuH9Oyrm2+MVwZJ36NBQeoPzV7Kc7QbuW1AlozQq
zuqzp/z9nnxpkEaj9CLpKj4TrM/k6z4/c/q4OzEV+G7aFHUzHJ9Ohmf7wn5v
F/sj44HvB1z9REdbD/f2gMS91iBx/RGTwAO7oVQ2cQWPWz7Eq13OJcy2R+wy
IGeptZ8OC6T19oS6Nk3FrtzBSoaAR7/u+CNH5JP7w0b2tIF1z+/AtpgDl360
XQaZkSkNaJs6+r1BHUSfoCxi4AQD+ntwZlbaNeIwthIhq1aFbuOcoy9k2XC+
a3/I7jjtCUDV1HSeMtf/dCl+ozhPkNmHkc6Oz8UTJPRhJMxpPUEeH0Z6fT4S
T5C+h5FOJifiCbL2A5JpJGJnK8eNA+OV+L5bGfi5A3ampA7Bus86cUc3gyi6
A3YONFjttINRN/yx5U34Z2wfl+u/cCnGlkVoWQOXNcAyM0CFTyAQKgV+c1Dn
3LAdqvB2gOkxEZQ5oMqJK2aNtskTPAQc1PwspTGe/rdL4s2j/kXMew3xrTAK
X+GAb6YwGQpns/HdFPDhogJZxEHo4ViId1puEmEPlGzkSbbg0/ivwidylNv+
8VZ8wgrzk9YinT/Ig/wKNclfAcG6V58Q0sw4raGfCOPMOK2hnwj0zDitoZ8I
Bc04wdAQBI5WK4hs1UcxEv/z7/8hjiEgprNPJrK4TlxQdVVew+SYwMBEPfoI
8T49M15wb+Ook1YPRePY9iKPOLnn2uvaL29AfXCHOBzZ4b3+PQ9+XeFERAxq
8qcWPU6ONvZxr5dMx/zP1Zdtv/8letand/hGi9YSzmG5yyQniCcu/Ua8OwoU
5ceOfNvrkxrlp9362Mq4ICMReY5OwanElIQNppBrejeQT2w+lOHYr3Cjri7O
xd9zQgv7oUEib+UDNPHRPFgM9o1HYqrKpQSwT/fwtVW+RwSApUsOur3mWXBv
d4msC5DsawV32eHxwpDfUCDwjFdKy1Srh1h1RtSErNq4BQBlmGPegojZHAO5
tEx+ggnfKohy6Rn+5DN+jpIHyKHnEMGYS6MfJkNTnAn3L7ivlyYkiSkwe6O3
kPQbcbJeYSFfA9T2U/VpGxFcGOVbrAj0c8g6aaP44CEg4pe6sNC1xSvye25e
eBfwfANbHmN6+yzvjoPDc/vait2NB/9P/zlD9NeO08XHTxsf/jIo/H/492Sr
2kB52wh2r7dlngG0xtOiErD90JoGLAk469A5Z4mmAv3Ri/O9STnejfx7IVov
aMGu2kohRmBXXdnQyX3qtT61MRCez0JbseveTkQ1Fo1mBqG8oJQEH4Ym3XQl
GT5ItEVQcUE0d2CVvguxeIhZ4jbq9Apql6fcCXevm/mp8+6zoQ+z7LmmlsUM
DMR33lqZI7hsTzEnjQaVns1VojsWuJwB7LlW2uuzCXhyihKyDVbhaxOG9HPr
kUpLK8aMe7SN/GirV30/T7kV8F7/mm23iQgB0r/jMVzdA0sO1mbF4BBAWJxk
1AhCB/BYDDORVutVXc6rZLXAzujMn9xhGcTgzcvfX8OuR/19Apv1n08zUtef
eqT2d/wsUvPWCV1pfgmL3Yfet+7ggloum5pMrvPlQB4ZIszLD6bmicnxpbiY
REa1h02hILIW706PsPMOtrQsqPu+cS9ggABCDbFxIlnvVRB5T5P0xr1nLDwx
gJLauQiIdXoELsnGyLvf9a2QFbWHp4/SflwZ+1h9JNuZsU3J+p4ha2hqcpxt
lTFf21O5QC3pOLLDvKXH+lzBiRCJaeKUD/w+iXCJrpMtZiaEtvvz+HE2efoX
aT+P4dSf+dNCAPd2M20ZYs8n9MuYPUYbbAVh768HAk+r/a2w5ZHaj0o6xLP1
3qr69kvO25suMvsSXeCJTG8AAfqCog4YTAMIMLfsRl0HQTNcdOeJnOsxRKWB
2/ENP/5UfdR7VohXfNJ5MsQBZ4HvCcu28vRR2v/at4xYEcy7geCm82HOPNcm
MbvB9iA7nDkLtc39efK/T+Ehxi3EMyY8MM4mTx+l/WNqn97YyO9smUp3AmnE
x75Xq+D5TvIHkm1yJ6qESrX1Als3b8v8NnA/vWE0rqrTGnrTwOdtxqac+m2N
HkoMdHjayhF8nuWnSVt+tUeAw97APtFbwoLIpw7cSx1uVVVjywtedEdvKBDG
hW2gQfBSyO7bb9K8bDL78hi6sZ2GiEUryeFbrbemOj6Lp4/S/U6Kpe/FA0bR
fVssEBdY9b5m+p6XlzAzHEOxhch4MU8OC9uSNFFrtQ9rfw9PH2f5N3dU7LT8
ePKQmMDIc7LLQi2TnF/4kFaSDwt6hQPHyuUFca6D+HnwKgXqth8fBCcp+8Xv
M3g63rKAltxukDTrpF8w+QWhv0AAMa3xfOq8rPTg50P+zybI7J+ezZJcy2e/
YDUrKW7Eumy4Cxm7aa06pcHD4m5RioXMzSsf1JLPVW406QWDvVXg276pyqnM
Cwn2e+MN83z+Du6uzMTtWc15E/dSBftKx3velRBQEIlJAt5BLf6Q3CRVntD9
J436c1OIPynTOXkfSXz8l/o4A9qqSqbuVUNh86e5H0iY8B3ihW+rc2tiDb9q
srV4lTQYxzgy3DlMjOipb3qB7fXmMGeSZTJ4Y+7HmsjCdpB4QPVdbWblG1Vh
u0XENzij/88zmP+mgjnY5No7TK0yKCATHZl55Swskt8C5IqQdFKMTgU8bj/w
gRMJn1+p6mZR5j/ZgyUhf2Wm3EOkkNeLcgmMeV1qDYobiXMFLrjMxRX+W2Xa
Hv0/rsBv/2OpalslVBsbqC33luZUN+azOgT6/x6DPZFxKyvXwvmn87NzfPcz
9lvOsGUQnjhPqpsMj/cjFW9UfdJMI1oG8jlvCbO21gz412DPqqt2y0CFBv8L
uWc896RlAAA=

-->

</rfc>
