ISO/IEC FDIS 27071
(Main)Cybersecurity — Security recommendations for establishing trusted connections between devices and services
Cybersecurity — Security recommendations for establishing trusted connections between devices and services
Cybersécurité — Recommandations de sécurité pour l'établissement de connexions de confiance entre dispositifs et services
General Information
Standards Content (Sample)
DRAFT INTERNATIONAL STANDARD
ISO/IEC DIS 27071
ISO/IEC JTC 1/SC 27 Secretariat: DIN
Voting begins on: Voting terminates on:
2022-07-12 2022-10-04
Cybersecurity — Security recommendations for
establishing trusted connections between devices and
services
ICS: 35.030
THIS DOCUMENT IS A DRAFT CIRCULATED
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
This document is circulated as received from the committee secretariat.
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS
BEING ACCEPTABLE FOR INDUSTRIAL,
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/IEC DIS 27071:2022(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
PROVIDE SUPPORTING DOCUMENTATION. © ISO/IEC 2022
---------------------- Page: 1 ----------------------
ISO/IEC DIS 27071:2022(E)
DRAFT INTERNATIONAL STANDARD
ISO/IEC DIS 27071
ISO/IEC JTC 1/SC 27 Secretariat: DIN
Voting begins on: Voting terminates on:
Cybersecurity — Security recommendations for
establishing trusted connections between devices and
services
ICS: 35.030
COPYRIGHT PROTECTED DOCUMENT
THIS DOCUMENT IS A DRAFT CIRCULATED
FOR COMMENT AND APPROVAL. IT IS
© ISO/IEC 2022
THEREFORE SUBJECT TO CHANGE AND MAY
This document is circulated as received from the committee secretariat.
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
NOT BE REFERRED TO AS AN INTERNATIONALbe reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on STANDARD UNTIL PUBLISHED AS SUCH.
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
IN ADDITION TO THEIR EVALUATION ASor ISO’s member body in the country of the requester. BEING ACCEPTABLE FOR INDUSTRIAL,
TECHNOLOGICAL, COMMERCIAL ANDISO copyright office
USER PURPOSES, DRAFT INTERNATIONAL
CP 401 • Ch. de Blandonnet 8
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
CH-1214 Vernier, Geneva
POTENTIAL TO BECOME STANDARDS TO
Phone: +41 22 749 01 11
WHICH REFERENCE MAY BE MADE IN
Reference number
Email: copyright@iso.org
NATIONAL REGULATIONS.
Website: www.iso.org ISO/IEC DIS 27071:2022(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
Published in Switzerland
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
© ISO/IEC 2022 – All rights reserved
PROVIDE SUPPORTING DOCUMENTATION. © ISO/IEC 2022
---------------------- Page: 2 ----------------------
ISO/IEC DIS 27071:2022(E)
Contents Page
Foreword ........................................................................................................................................................................................................................................iv
Introduction .................................................................................................................................................................................................................................v
1 Scope ................................................................................................................................................................................................................................. 1
2 Normative references ..................................................................................................................................................................................... 1
3 Terms and definitions .................................................................................................................................................................................... 1
3.1 General ........................................................................................................................................................................................................... 1
3.2 Terms relating to cloud computing ...................................................................................................................................... 1
3.3 Terms relating to cloud computing roles and activities .................................................................................... 2
3.4 Terms relating to security and privacy ............................................................................................................................ 2
3.5 Miscellaneous terms .......................................................................................................................................................................... 5
4 Symbols and abbreviated terms..........................................................................................................................................................5
5 Framework and components for establishing a trusted connection ...........................................................6
5.1 Overview ...................................................................................................................................................................................................... 6
5.2 Hardware security module ...................................................................................................................................................... 10
5.3 Root of trust ........................................................................................................................................................................................... 10
5.4 Identity ....................................................................................................................................................................................................... 10
5.5 Authentication and key establishment .......................................................................................................................... 10
5.6 Remote attestation .......................................................................................................................................................................... 10
5.7 Data integrity and authenticity ............................................................................................................................................ 11
5.8 Trusted user interface .................................................................................................................................................................. 11
6 Security recommendations for establishing a trusted connection ............................................................11
6.1 Hardware security module ...................................................................................................................................................... 11
6.2 Root of trust ........................................................................................................................................................................................... 11
6.3 Identity ....................................................................................................................................................................................................... 11
6.4 Authentication and key establishment ..........................................................................................................................12
6.5 Remote attestation ..........................................................................................................................................................................12
6.6 Data Integrity and authenticity ............................................................................................................................................12
6.7 Trusted user interface .................................................................................................................................................................. 12
Annex A (informative) Threats ...............................................................................................................................................................................13
Annex B (informative) Solutions for components of a trusted connection .............................................................18
Annex C (informative) Example for establishing a trusted connection ......................................................................23
Bibliography .............................................................................................................................................................................................................................24
iii© ISO/IEC 2022 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC DIS 27071:2022(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the national bodies
casting a vote.Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 27071 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information Security, cybersecurity and privacy protection.© ISO/IEC 2022 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC DIS 27071:2022(E)
Introduction
With the development of the Internet of Things (IoT), Mobile Services, Cloud Computing, Big Data and
Artificial Intelligence (AI), more and more scenarios require trusted connections between devices and
services.Security channels (e.g. TLS/SSL) are used between devices and services to protect confidentiality and
integrity of data, but it is not enough. The service needs to distinguish data collected by sensors of the
authorised device from those of other devices or data forged by adversaries. So, it should be able to
ensure the data comes from the authorised device.Conversely, the device also needs to distinguish the genuine service from unintended services or
malicious services. So, it should be able to reliably identify the genuine and intended service, in
particular for cloud services, which may have thousands of such services running.
Identity without a reliable root of trust can be forged, so controls are required to ensure the utilisation
of reliable roots of trust (requirements for establishing reliable virtualized roots of trust as described
in ISO/IEC 27070:2021).Mutual authentication between a device and a service is needed to prevent impersonation attacks.
While insufficient in itself, remote attestation between a device and a service is also needed to protect
the data handling processes and to establish a security channel to prevent interception by an adversary
on the communication network.Data captured from sensors integrated in the device, input by users, or generated (or processed) by
algorithms in the device should have a label and be digitally signed (or by other crypto mechanisms)
using the device’s particular key designed for this purpose, to protect the integrity and authenticity
of the data. Services could know the parameters of the sensor device which can help the service with
the processing of the data. Trusted connections have a strong relationship with Hardware Security
Modules (HSM), Trusted Computing (TC), Public Key Infrastructure (PKI) and Certification Authority
(CA) technology and so on. Trusted connection issues can be broken down into several sub-categories
such as:— Hardware security modules to establish the reliable root of trust
— Identity of devices and services that issued by trusted parties
— Mutual authentication and key establishment between devices and services to estalish security
channel— Mutual remote attestation(or environment assurance) between devices and services
— Data Identity to keep the data integrity and authenticity for a long termThis document proposes security recommendations for establishing trusted connections between
devices and services, which would help the related organisations to set up HSM in devices (including
mobile devices, PCs, or IoT devices) and in the infrastructure of cloud services. This document can
help to build a trusted environment. This document can also help trusted third parties (CA) to issue
certificates to devices and services and help the applications to mitigate against attacks and identify
forged data from the sensors, etc.© ISO/IEC 2022 – All rights reserved
---------------------- Page: 5 ----------------------
DRAFT INTERNATIONAL STANDARD ISO/IEC DIS 27071:2022(E)
Cybersecurity — Security recommendations for
establishing trusted connections between devices and
services
1 Scope
This document provides a framework and recommendations for establishing trusted connections
between devices and services based on hardware security modules, including recommendations
for components such as: hardware security module, roots of trust, identity, authentication and key
establishment, remote attestation, data integrity and authenticity.This document is applicable to establishing trusted connections between devices and services based on
hardware security modules.This document does not address privacy concerns.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27070:2021, Information technology — Security techniques — Requirements for establishing
virtualized roots of trust3 Terms and definitions
3.1 General
For the purposes of this document, the terms and definitions given in ISO/IEC 27070:2021 and the
following apply.ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— IEC Electropedia: available at https:// www .electropedia .org/— ISO Online browsing platform: available at https:// www .iso .org/ obp/
3.2 Terms relating to cloud computing
3.2.1
cloud computing
paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual
resources with self-service provisioning and administration on-demandNote 1 to entry: Examples of resources include servers, operating systems, networks, software, applications, and
storage equipment.[SOURCE: ISO/IEC 22123-1:2021, 3.2.1]
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 6 ----------------------
ISO/IEC DIS 27071:2022(E)
3.2.2
cloud service
one or more capabilities offered via cloud computing (3.2.1) invoked using a defined interface
[SOURCE: ISO/IEC 22123-1:2021, 3.2.2]3.3 Terms relating to cloud computing roles and activities
3.3.1
party
natural person or legal person, whether or not incorporated, or a group of either that can assume one or
more roles[SOURCE: ISO/IEC 22123-1:2021, 3.4.1]
3.3.2
cloud service customer
party (3.3.1) which is in a business relationship for the purpose of using cloud services (3.2.2)
Note 1 to entry: A business relationship does not necessarily imply financial agreements.
[SOURCE: 22123-1:2021, 3.4.2]3.3.3
cloud service provider
party (3.3.1) which makes cloud services (3.2.2) available
[SOURCE: ISO/IEC 22123-1:2021, 3.4.3]
3.3.4
cloud service user
natural person, or entity acting on their behalf, associated with a cloud service customer (3.3.2) that
uses cloud services (3.2.2)Note 1 to entry: Examples of such entities include devices and applications.
[SOURCE: ISO/IEC 22123-1:2021, 3.4.4]
3.3.5
tenant
one or more cloud service users (3.3.4) sharing access to a set of physical and virtual resources
[SOURCE: ISO/IEC 22123-1:2021, 3.5.2]3.4 Terms relating to security and privacy
3.4.1
availability
property of being accessible and usable upon demand by an authorized entity
[SOURCE: ISO/IEC 22123-1:2021, 3.14.7]
3.4.2
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities, or
processes[SOURCE: ISO/IEC 22123-1:2021, 3.11.1]
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 7 ----------------------
ISO/IEC DIS 27071:2022(E)
3.4.3
integrity
property of accuracy and completeness
[SOURCE: ISO/IEC 22123-1:2021, 3.11.2]
3.4.4
information security
preservation of confidentiality (3.4.2), integrity (3.4.3) and availability (3.4.1) of information
Note 1 to entry: In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability
can also be involved.[SOURCE: ISO/IEC 22123-1:2021, 3.11.3]
3.4.5
remote attestation
process of evaluating integrity measurements generated using a root of trust (3.4.11) for measurement,
storage and reporting to establish trust in a platform remotely[SOURCE: ISO/IEC 27070:2021]
3.4.6
hardware security module
HSM
tamper-resistant hardware module which safeguards and manages keys and provides cryptographic
functionsNote 1 to entry: Trusted module (3.4.7) is a specific kind of HSM.3.4.7
trusted module
module for trusted computing providing integrity measurement, integrity report, cryptographic
service, random number generation, secure storage functions and a set of platform configuration
registersNote 1 to entry: There are several implementations of trusted module, such as TPM, TCM, etc.
[SOURCE: ISO/IEC 27070:2021]3.4.8
trust anchor module
TAM
one (or more) hardware security modules (3.4.6) that acts as the roots of trust (3.4.11)
3.4.9trusted user interface
TUI
device component with a user interface whose integrity and authenticity is managed by the trust
anchor module3.4.10
identity key
signing key used to authentication and sign characteristics of the device (or service) environment (e.g.
a digest) in order to prevent forgery and protect the integrity of the device (or service) environment
characteristics© ISO/IEC 2022 – All rights reserved
---------------------- Page: 8 ----------------------
ISO/IEC DIS 27071:2022(E)
3.4.11
root of trust
RoT
component that needs to always behave in the expected manner because its misbehaviour cannot be
detectedNote 1 to entry: The complete set of roots of trust has at least the minimum set of functions to enable a description
of the platform characteristics that affect the trust of the platform.[SOURCE: ISO/IEC 27070:2021]
3.4.12
physical root of trust
in this document, root of trust (3.4.11) refers to a physical root of trust (3.4.11)
3.4.13virtualized root of trust
vRoT
security function component established based on the root of trust (3.4.11), which provides similar
function as the root of trust (3.4.11)Note 1 to entry: In practical environments, there could be multiple virtualized roots of trust based on the single
root of trust (3.4.11) simultaneously3.4.14
root of trust for measurement
computation engine that resets one or more platform configuration registers, makes the initial integrity
measurement, and extends it into a platform configuration registerNote 1 to entry: A root of trust (3.4.11) that collects device environment characteristics (e.g. firmware integrity
measurements) and puts them in a format suitable for attestation (e.g. TPM Platform Configuration Registers).
3.4.15root of trust for storage
component of the root of trust (3.4.11) that provides storing confidential information and measured
values in shielded locations accessed using protected capabilities3.4.16
root of trust for reporting
component of the root of trust (3.4.11) that reliably provides authenticity and nonrepudiation services
for the purposes of attesting to the origin and integrity of platform characteristics
Note 1 to entry: a root of trust (3.4.11) that uses the device’s (or service’s) identity key (3.4.10) to reliably provide
authenticity and nonrepudiation services for the purposes of attesting to the origin and integrity of device (or
service) environment characteristics.3.4.17
secure element
tamper-resistant platform capable of securely hosting applications and their confidential and
cryptographic data (for example cryptographic keys) in accordance with the rules and security
requirements set by well-identified trusted authorities3.4.18
trusted computing
a technology protect computer consistently behave in expected ways
Note 1 to entry: Trusted computing is developed and promoted by the Trusted Computing Group (TCG).
© ISO/IEC 2022 – All rights reserved---------------------- Page: 9 ----------------------
ISO/IEC DIS 27071:2022(E)
3.4.19
trusted execution environment
TEE
execution environment that runs alongside but isolated from the device main operating system
3.4.20trusted network connect
TNC
open architecture for network access control, promulgated by the Trusted Network Connect Work
Group (TNC-WG) of the TCG3.4.21
chain of trust
extension of trust from a component (e.g. a root of trust) to another component accomplished through
the act of measurement and verification of the integrity and authenticity of the new component before
the system begins execution of the new componentNote 1 to entry: Such an act builds a chain of trust from the old component to the new component, which is now a
trusted component. The old component can be either a root of trust or a trusted component.
3.4.22trusted environment
execution mode where the process/mechanism/functionality is protected/launched by a ROT service
Note 1 to entry: TEE is a specific TE.3.5 Miscellaneous terms
3.5.1
device
physical entity that communicates directly or indirectly with one or more cloud services (3.2.2)
[SOURCE: ISO/IEC 22123-1:2021, 3.14.4]3.5.2
device holder
person possesses and using the device
Note 1 to entry: In some cases, the person possesses and using the mobile device is the device holder. But in cases
of IoT, most of the sensors (devices) may not have a corresponding device holder.
4 Symbols and abbreviated termsCA Certification Authority (in a PKI)
CSP Cloud Service Providers
CPU Central Processing Unit
HSM Hardware Security Module
IK Identity Key
IMC Integrity Measurement Collectors
IMV Integrity Measurement Verifiers
OS Operating System
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 10 ----------------------
ISO/IEC DIS 27071:2022(E)
PCR Platform Configuration Register
PKI Public Key Infrastructure
RoT Root of Trust
REE Rich Execution Environment
RTM Root of Trust for Measurement
RTR Root of Trust for Reporting
RTS Root of Trust for Storage
SE Secure Element
TAM Trust Anchor Module
TC Trusted Computing
TCG Trusted Computing Group
TCM Trusted Cryptography Module
TE Trusted Environment
TEE Trusted Execution Environment
TM Trusted Module
TNC Trusted Network Connect
TPM Trusted Platform Module
vIK Virtual Identity Key
vRoT Virtualized Root of Trust
5 Framework and components for establishing a trusted connection
5.1 Overview
This clause provides an overview of the framework and components of a trusted connection between a
device and a service based on hardware security modules.Security channels are used between devices and services to protect confidentiality and integrity of
data, but it is not enough. The service needs to distinguish data collected by sensors of the authorised
device from those of other devices or data forged by adversaries. So, it should be able to ensure the data
comes from the authorised device. Conversely, the device also needs to distinguish the genuine service
from unintended services or malicious services. So, it should be able to reliably identify the genuine and
intended service, in particular for cloud services, which may have thousands of such services running.
Threats on a trusted connection see Annex A. A trusted connection between a device and a service
provides the ability to protect confidentiality, integrity and authenticity of data; provides the ability to
prevent identity spoofing by binding the identity of the device (or service) to root of trust; and provides
the ability to ensure trusted processing of data by remote attestation or environment assurance.
To establish trusted connection between a device and a service faces the risks from several involved
parties. Figure 1 describes the parties involved in establishing a trusted connection, including identity
issuer (e.g. CA), HSM manufacturer, device manufacturer, system integrator, cloud service provider,
tenant, and device holder (may not exist in some scenarios such as IoT).© ISO/IEC 2022 – All rights reserved
---------------------- Page: 11 ----------------------
ISO/IEC DIS 27071:2022(E)
HSM manufacturer produce HSMs. Device manufacturer produce device. Cloud service provider runs
the cloud service. Tenant possesses the service which has a trusted connection with the device. In some
scenarios, Tenant and cloud service provider may be the same party. Device holder possesses and uses
the device (e.g. the holder of mobile phone).There are several scenarios to establish a trusted connection between a device and a service.
Figure 1 — Parties related in trusted connection© ISO/IEC 2022 – All rights reserved
---------------------- Page: 12 ----------------------
ISO/IEC DIS 27071:2022(E)
Note 1 to entry Trusted connection components in the service side are omitted.
Figure 2 — Framework of a trusted connection for a device with TEE/SE and REE
Note 1 to entry Trusted connection components in the service side are omitted.
Figure 3 — Framework of a trusted connection for a device with TE only
© ISO/IEC 2022 – All rights reserved
---------------------- Page: 13 ----------------------
ISO/IEC DIS 27071:2022(E)
Figure 2 gives the framework of a trusted connection for device with both TEE/SE and REE (Such as
a mobile device). Applications run in TEE/SE environment and have a root of trust based on the TAM
can build a trusted connection to service, and a trusted user interface (TUI) component is provided for
interaction between the user and the device.Figure 3 gives the framework of a trusted connection for device with the TE only (such as IoT device).
In this case, the device may not need remote attestation to the service to build a trusted connection. To
establish trust connection between a device (with TE only) and a service, remote attestation component
may not be required, and user interface (or trusted user interface, TUI) may not exist.
Figure 4 — Components of a trusted connectionFigure 4 gives an overview of the components for a trusted connection.
Both the device and the service consist of multiple components. Each of these components performs a
specific task within the trusted connection framework. The components to build a trusted connection
are list as follows:— The HSM component safeguards and manages digital keys and provides cryptographic processing.
A trust anchor module (TAM) is an abstract component that contains one or more HSMs.
— The root of trust component responsible for manages RoTs that anchored in a specific HSM (e.g.
TPM/TCM, TEE/SE) of the TAM.— The identity component manages identity bound to RoT. Trusted parties (including trusted third
parties) issue identities to RoTs bound to the device (or service).— The remote attestation component is responsible for remote attestation between the device and the
service in a trusted connection. In some cases, if the device (or service) meets the corresponding
security requirements (e.g. ISO/IEC 19790:2012 level 3 or greater), the remote attestation component
in the device (or service) side is optional.— The authentication and key establishment component is responsible for building a security channel
between the device and the service based on RoT and IK.— The data integrity and authenticity component is responsible for protect the data integrity and
authenticity by IK using cryptographic mechanisms. Also, this component can provides the non-
repudiation property.© ISO/IEC 2022 – All rights reserved
---------------------- Page: 14 ----------------------
ISO/IEC DIS 27071:2022(E)
— TUI component is responsible for trusted interaction between the user and the device. In scenarios
that do not require trusted interaction, there is no TUI component.The solutions for each component in framework see Annex B. Example to build a trusted connection
between a device and a service see Annex C.5.2 Hardwar
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.