GATEKEEPER COMPLIANCE AUDIT PROGRAM

Size: px
Start display at page:

Download "GATEKEEPER COMPLIANCE AUDIT PROGRAM"

Transcription

1 GATEKEEPER COMPLIANCE AUDIT PROGRAM NOVEMBER 2011

2 Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia ( licence. For the avoidance of doubt, this means this licence only applies to material as set out in this document. Licence: This document is licensed under a Creative Commons Attribution Non- Commercial No Derivs 3.0 licence. The details of the relevant licence conditions are available on the Creative Commons website (accessible using the links provided) as is the full legal code for the CC BY 3.0 AU licence ( ). Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the It's an Honour ( website. Contact: Assistant Secretary Cyber Security and ICT Skills Branch Department of Finance and Deregulation John Gorton Building King Edward Terrace Parkes ACT November 2011 GCAP

3 Contents 1. Introduction 5 2. Objectives Scope WebTrust audit program Terminology 6 4. GCAP Document Structure 7 5. Changes to the GCAP 7 6. Background Gatekeeper Public Key Infrastructure Framework Categories of Gatekeeper Certificates The Gatekeeper Marketplace Audit Requirement for Gatekeeper accredited/recognised Service Providers Head Agreement/Memorandum of Agreement Approved Certificate Policy and Certification Practice Statement Other standards Audit Requirements for Gatekeeper Listed Organisations Deed of Agreement/Memorandum of Understanding GCAP Procedures GCAP Decision-Making Procedures Figure 1: Audit process for GCAP for Service Providers GCAP Audit Engagement Procedure GCAP Reporting Procedure Audit Report Review GCAP Procedure for use of WebTrust audit work Considering Work Conducted on another Service Provider Considering Work Programs - Additional Procedures Appendix A Self Assessment Questionnaire for Gatekeeper accredited/recognised Service Providers 14 A.1 Overview A.2 Instructions to the Gatekeeper accredited/recognised Service Provider A.3 Self Assessment Questionnaire for Gatekeeper Accredited/ Recognised Service Providers November 2011 GCAP

4 Appendix B GCAP for Gatekeeper accredited / recognised Certification Authorities 22 B.1 Overview B.2 Instructions to the Authorised Auditor B.3 GCAP CA Control Questions B.4 KMP Sample Work Program Appendix C GCAP for Gatekeeper accredited Registration Authorities 50 C.1 Overview C.2 Instructions to the Authorised Auditor C.3 GCAP RA Control Questions Appendix D Self Assessment Questionnaire for Gatekeeper Listed Organisations 68 D.1 Overview D.2 Instructions to the Listed Organisation D.3 SELF ASSESSMENT QUESTIONNAIRE FOR KNOWN CUSTOMER ORGANISATIONS (KCOs) AND THREAT AND RISK ORGANISATIONS (TROs) D.4 SELF ASSESSMENT QUESTIONNAIRE FOR VALIDATION AUTHORITIES Appendix E GCAP for Known Customer and Threat and Risk Organisations) 83 E.1 Overview E.2 Instructions to the Authorised Auditor E.3 GCAP Known Customer and Threat and Risk Organisations Control Questions Appendix F GCAP for Validation Authorities 91 F.1 Overview F.2 Instructions to the Authorised Auditor F. 3 GCAP Validation Authority Control Questions Appendix G - References 99 4 November 2011 GCAP

5 1. Introduction Under the Gatekeeper Public Key Infrastructure Framework, annual compliance audits remain a condition of Gatekeeper accreditation and recognition. In accordance with clause 11 of the Gatekeeper Head Agreement/Memorandum of Agreement, the Department of Finance and Deregulation (Finance) requires that Authorised Auditors conduct an annual audit of Service Providers' compliance with the Gatekeeper Framework. Finance requires that Listed Organisations also undergo an external compliance audit in accordance with Gatekeeper Listing Requirements 1. The Gatekeeper Compliance Audit Program (GCAP) provides guidance to Auditors on the scope and conduct of the assessment required under Gatekeeper. The GCAP applies to: Gatekeeper accredited/recognised Certification Authorities (CAs) Gatekeeper accredited Registration Authorities (RAs) Gatekeeper Listed Organisations - Known Customer Organisations; Threat and Risk Organisations; and Validation Authorities. 2. Objectives The primary objective of the GCAP is to provide a work program to assist Service Providers in meeting the external Audit requirement stipulated in the Gatekeeper Head Agreement/Memorandum of Understanding/Deed of Agreement. The work program in the Appendices outlines the various procedures that form the scope of the Audit. 2.1 Scope The scope of the GCAP includes Gatekeeper compliance process checks as well as fundamental Audit control checks. These checks are based on: the Gatekeeper Framework under which the Service Providers are accredited/recognised; Gatekeeper Listing Requirements under which the Known Customer Organisations, Threat and Risk Organisations and Validation Authorities are Listed; and industry and Australian standards. 2.2 WebTrust audit program Service Providers that have completed, or are considering WebTrust audit program, are required to provide status reports to the Auditor. 1 Gatekeeper accredited/recognised Service Providers are required to choose an Auditor from the Gatekeeper Audit Panel listed at whereas Listed Organisations may choose to appoint any qualified Auditor, including from the Gatekeeper Audit Panel. 5 November 2011 GCAP

6 An Auditor may consider WebTrust audit work that has been completed and avoid duplication of audit work. The GCAP ensures it is able to incorporate WebTrust audit work that may have been undertaken within the past six months. Incorporating previous Audit work by the Auditor provides two benefits to Service Providers: reduce expenditure on external Audit requirements; and reduce the extent of interruptions to operations when Audits occur. In the event that a Service Provider has not conducted or completed an external Audit program, the Authorised Auditor will conduct the GCAP as a full Audit with all applicable control tests. The GCAP does not unequivocally accept a WebTrust Audit as sufficient to meet the external Audit requirements for Gatekeeper. Rather, the "modular" structure of GCAP allows where possible, work programs conducted under WebTrust to be used as a substitute for parts of the GCAP work program. This is conditional on the Auditor being satisfied that the WebTrust work program provides adequate assurance within the constraints of the GCAP. 3. Terminology In conducting a GCAP, the Authorised Auditor should have a high degree of competence in PKI and knowledge of Gatekeeper Policies and Criteria. Terms used in the GCAP are available at Note the following terms: Audit Authorised Auditor CA Service Provider only refers to the external Audit process, unless explicitly stated otherwise. While the terms "Audit" and "external Audit" are used extensively, they are used in a generic sense in accordance with their meaning in the Australian Auditing Standards (AAS). The importance of this statement relates to the fact that an external Auditor's opinion in accordance with AAS is not being sought as a result of conducting the GCAP. refers solely to an Auditor who is listed on Finance s Audit Panel to conduct a GCAP, unless explicitly stated otherwise. refers solely to a Gatekeeper Accredited/Recognised Certification Authority; it does not refer to a Chartered Accountant, unless explicitly stated otherwise. refers solely to a Gatekeeper Accredited/Recognised CA, RA, and Gatekeeper Listed Organisations, unless explicitly stated otherwise. For information relating to other terms, abbreviation and acronyms contained in this document, refer to the Gatekeeper Glossary at 6 November 2011 GCAP

7 4. GCAP Document Structure The first part of this GCAP document contains: information and background for Auditors criteria for using WebTrust Audit work; and processes for a Service Provider to engage an Auditor to conduct a GCAP. The second part of this GCAP document contains the following Appendices: Self-Assessment Questionnaire for the Service Provider; GCAP work program for the Auditor; and other relevant information. 5. Changes to the GCAP Finance is responsible for ensuring the applicability and currency of this GCAP document, particularly in light of any changes to the following: Gatekeeper Head Agreement/Memorandum of Agreement Criteria for Accreditation of Certification Authorities Criteria for Accreditation of Registration Authorities Listing Requirements for Known Customer Organisations (KCOs) Listing Requirements for Threat and Risk Organisations (TROs) Listing Requirements for Validation Authorities (VAs); and Deed of Agreement/Memorandum of Understanding for KCOs, TROs, and VAs. To check the currency of this program, contact the Director, Authentication and Identity Management, at gatekeeper@finance.gov.au. Service Providers will be notified of changes to the GCAP document. If a change is deemed to be significant, the review process may incorporate a consultative approach with all relevant stakeholders. 6. Background 6.1 Gatekeeper Public Key Infrastructure Framework The Gatekeeper PKI Framework: facilitates the deployment of a broader range of Digital Certificates designed to meet specific business requirements of agencies and their clients; facilitates adoption of a risk management approach aligned to the National e-authentication Framework (NeAF) and Government Security Standards; 7 November 2011 GCAP

8 facilitates increased use of PKI by both business and the broader community through reducing the cost and complexity of producing, acquiring and using Digital Certificates; and fosters a competitive market for Digital Certificates. 6.2 Categories of Gatekeeper Certificates The Framework comprises three categories of Digital Certificates Special, General and High Assurance - for Individuals and Organisations. The Framework is characterised by flexibility in Evidence of Identity (EOI) requirements and the ability of Relying Parties to readily distinguish between EOI models and EOI assurance levels within those models. Digital Certificates issued under the Framework will be X.509 compliant. 6.3 The Gatekeeper Marketplace The Gatekeeper market place is a unique environment covering a number of PKI domains that provide services from different vendors and organisations. At present, the Australian Gatekeeper marketplace consists of: ; three organisations accredited as both CA and RA - Australian Taxation Office, VeriSign Australia and the Department of Defence two organisations accredited as CA Verizon Australia Pty Ltd and Medicare Australia one organisation accredited as RA - Australia Post one organisation accredited as RA and recognised as a CA (for issuance of IdenTrust digital certificates) - ANZ Bank one organisation listed as a Validation Authority Department of Innovation, Industry Science and Resources; and one organisation listed as a Relationship Organisation - Medicare Australia. 6.4 Audit Requirement for Gatekeeper accredited/recognised Service Providers At the conclusion of the Gatekeeper accreditation/recognition process, Service Providers are required to sign a Gatekeeper Head Agreement (HA)/Memorandum of Agreement (MOA) with the Commonwealth of Australia (represented by Finance). The HA/MOA requires that the Service Provider maintains compliance with the Gatekeeper Framework and the terms of its Gatekeeper accreditation/recognition as set out in its Approved Documents. One condition for maintaining Gatekeeper accreditation is that an annual external Compliance Audit be conducted by qualified Information Technology Auditors authorised by Finance as listed on the Gatekeeper Audit Panel at gatekeeper.gov.au. 8 November 2011 GCAP

9 6.4.1 Head Agreement/Memorandum of Agreement The Gatekeeper Head Agreement specifies under sub-clause 11.1: Finance requires an Audit to be conducted by an Authorised Auditor of the Service Provider's compliance with the Accreditation Policies and Criteria, and Approved Documents Approved Certificate Policy and Certification Practice Statement The Approved Certificate Policies (CPs) and Certification Practices Statement (CPS) of each Gatekeeper accredited/recognised Service Provider also stipulate the need for an external Audit to be conducted Other standards Section 8 of AS : Information Technology - Public Key Authentication Framework (PKAF) - Assurance Framework - Certification Authorities requires a continuous external Audit to be determined by the accreditation body. 6.5 Audit Requirements for Gatekeeper Listed Organisations A Gatekeeper Listed Organisation, except Relationship Organisations, is required to undergo an annual compliance audit of its operations against the Listed Organisation s operational security and privacy criteria. Listed Organisations may select any suitably qualified auditor, including from the Gatekeeper Audit Panel Deed of Agreement/Memorandum of Understanding The Gatekeeper Deed of Agreement specifies under sub-clause 9.1: Finance requires an annual compliance audit to be conducted by a suitably qualified independent auditor (for example, a member of the Gatekeeper Audit Panel) of the Listed Organisation s operational security and privacy criteria. 7. GCAP Procedures The GCAP provides a set of procedures for Auditors to follow when they conduct an Audit of Service Providers. The GCAP provides guidance on how an Auditor can use previously conducted work programs and reduce the possibility of unnecessary re-work. The GCAP is not a substitute for the individual Auditor's professional judgment in determining the Service Provider's overall compliance. Depending upon the results of the GCAP, additional Audit procedures may be required. 9 November 2011 GCAP

10 7.1 GCAP Decision-Making Procedures Figure 1 shows the major decision points that an Auditor may consider when planning the Audit of a Service Provider s PKI operations. This will help Auditors determine the best way to conduct the GCAP. It should be used as a guide when deciding whether to consider prior work performed, along with the criteria specified in Section 7.5 GCAP Procedure for use of WebTrust audit work. If the Auditor chooses not to use Audit work programs that have been conducted within the past sixmonth time frame, then the full GCAP should be applied as set out in the Appendices. Figure 1: Audit process for GCAP for Service Providers Commence GCAP Has a WebTrust audit been conducted within the last six months or in the process of being conducted? NO YES Conduct full GCAP NO Does/would WebTrust audit cover Gatekeeper operations? YES Conduct MODULAR GCAP using previous work where applicable 7.2 GCAP Audit Engagement Procedure Service Providers may follow the following procedures before engaging an Auditor: Gatekeeper accredited/recognised Service Provider completes the Self Assessment Questionnaire at Appendix A and Gatekeeper Listed Organisation completes the Self Assessment Questionnaire at Appendix D; - the Self Assessment Questionnaire assists the Auditor to make an assessment of previously conducted work, the amount of work required to complete the GCAP and if a full GCAP is required. 10 November 2011 GCAP

11 Gatekeeper accredited/recognised Service Provider sends the completed Self-Assessment Questionnaire with its Request for Tender (RFT) for external Audit to Authorised Auditors listed on the Gatekeeper Audit Panel at and Listed Organisations may either choose to send completed Self Assessment Questionnaires either to Authorised Auditors or to any qualified IT Auditors of their choice; Auditors may use the completed Self-Assessment Questionnaire to assist in drafting their responses to the RFT; and the Service Provider reviews the responses to the RFT; and informs the successful Auditor and the Gatekeeper Competent Authority of its decision. Upon appointment, the chosen Auditor: formalises a contract with the Service Provider to conduct the Audit; performs the GCAP as proposed; and reports its findings to the Gatekeeper Competent Authority and the Service Provider and any other parties agreed to between the Auditor and the Service Provider. 7.3 GCAP Reporting Procedure Upon completion of the GCAP, the Auditor will issue a final Audit Report to the Gatekeeper Competent Authority, the Service Provider and any other entities agreed to in the GCAP Audit engagement contract. Unless otherwise specified in the GCAP contract, Audit Reports are considered to be sensitive commercial information and should be treated with the required level of security controls for their protection. The Auditor's report should detail the work conducted, as well as the outcomes of required testing. It will identify any adverse issues, areas of non-compliance or queries that are not resolved to the satisfaction of the Auditor and will also include associated recommendations from the Auditor. The Auditor is not required to provide a formal Audit opinion on the work performed in accordance with Australian Auditing Standards. The Auditor may wish to base its reporting framework on AUS 904 Engagements to Perform Agreed-upon Procedures. The Auditor may also consider AGS Audit Implications of Prudential Reporting Requirements for Authorised Deposit-Taking Institutions as a possible reporting framework. The Auditor should note that AGS 1008 uses AUS 904 as a framework for reporting. When reporting issues, possible compromises and/or failures, the Auditor may, as applicable, wish to make reference to the categories defined within Australia Standard AS 4539: Assurance framework for Certification Authorities, Section 7; as well as sub Clause 11.4 of the Head Agreement/Memorandum of Agreement between Finance and the Service Provider. The Auditor will immediately notify the Service Provider and the Gatekeeper Competent Authority of issues that are considered to represent a failure or significant compromise of the Service Provider's operations. Auditors should note the following: In performing the GCAP, the Auditor's Report will be a "long-form" report detailing the findings resulting from carrying out the prescribed work procedures. Findings that should be reported include potential control and procedural weaknesses. 11 November 2011 GCAP

12 Finance does not require an audit opinion in accordance with Australian Auditing Standards. It is envisaged that the Auditor's reporting will be largely based on AUS Engagement to Perform Agreed-upon Procedures. 7.4 Audit Report Review The specific process for dealing with final Audit Report findings is contained within each Service Provider's Gatekeeper Head Agreement/Memorandum of Understanding/Agreement. Finance will review the findings and Report from the Auditor and will subsequently issue either a: statement to the Service Provider advising that its Gatekeeper Accreditation/Recognition or Listing will be maintained; or notice (whether or not it is a major or minor non-compliance) to the Service Provider specifying any adverse Audit findings and the required remedial actions that will enable the Service Provider to maintain its Gatekeeper accreditation/recognition or Listing (this may also require an additional Audit). 7.5 GCAP Procedure for use of WebTrust audit work The Auditor selected by the Service Provider has discretion in deciding whether to use prior work as part of the GCAP process. It is important that the Auditor performs quality assurance procedures so that the GCAP Audit Report is adequately supported. The Auditor may only consider work programs conducted as part of a WebTrust Audit Program. The current market has indicated that WebTrust is the most common program for external CA Audits. Accordingly, Finance has decided that GCAP does not warrant the inclusion of additional Audit programs. The WebTrust program includes appropriate continuous control checking procedures that may provide a framework for the Auditor to follow. The Auditor is responsible for the conduct of the GCAP in all situations. Under the GCAP, Auditors can only consider prior audit work if it has been undertaken within the past six months. The final report from the Auditor will indicate if prior Audit work has been taken into consideration and the reasons for the decision. The following conditions apply when considering prior work: an Auditor may choose not to consider previous work done and therefore conduct a full GCAP. The Auditor and the Service Provider will discuss and agree to the factors contributing to this assessment; - the Auditor may decide to conduct a full Audit if prior work is deemed to be insufficient, work papers are not available, or there is lack of evidence on the nature of the work undertaken; 12 November 2011 GCAP

13 the beginning of the permitted six month period is the completion date of the "actual" individual work program conducted, not the date on which the final Audit report was issued; - preparation of final Audit Reports can take time, especially if re-assessment of certain areas is required. The GCAP only requires that the entire work-program be conducted to a satisfactory outcome. The Auditor has the final responsibility in deciding whether prior work will be considered for inclusion. Auditors should be aware that some Service Providers may wish to request an early Gatekeeper Audit to co-ordinate with WebTrust audit activities underway in their organisation. It is beneficial for the Service Provider to request the GCAP to be performed within three months after completion of their external audit Considering Work Conducted on another Service Provider Where Service Providers use the services or facilities of another Gatekeeper accredited entity (who may not be subject to an Audit at the specific time), GCAP sets the following additional conditions: the other entity must be Gatekeeper Accredited and provide the service to the Service Provider who is required to undergo the GCAP the constraints of the work program and timing must relate to the specific Service Provider that provides the services; and the other Service Provider must also maintain its Gatekeeper accreditation throughout the conduct of the Service Provider's GCAP. These provisions have been included for situations where a CA may be outsourcing some of its management by using the facilities of another Gatekeeper Accredited CA, or where a CA may be outsourcing its RA operations to another Gatekeeper Accredited Service Provider Considering Work Programs - Additional Procedures When a decision has been made to use work from a WebTrust Audit of a Service Provider, or to use work or controls conducted on another Service Provider, the Auditor must ensure that the decision is adequately supported. In addition to the Auditor's Audit procedures, GCAP requires the Auditor to: review relevant communication with Finance and Gatekeeper Evaluators to determine that: - nothing has changed in the area that the work was based upon; and - there are no outstanding or pending issues that may affect the area on which that work was based. If there are changes to the area that would lessen the security or increase the risk of adverse affects, the Auditor should not consider using the prior work. 13 November 2011 GCAP

14 Appendix A Self Assessment Questionnaire for Gatekeeper accredited/recognised Service Providers A.1 Overview The Self Assessment Questionnaire assists Auditors to assess the nature and extent of audit required for the Service Provider. The Questionnaire facilitates the collection of information necessary to understand the current environment in which the Service Provider operates and any implemented changes. The information also enables the Auditor to consider whether a Modular approach may be proposed under the GCAP, allowing previous work to be taken into account. The Self Assessment Questionnaire will then form part of the supporting work papers for the GCAP carried out by the Auditor. There is a requirement to perform an on-site Audit to review and test the Service Provider s established operations and controls. A.2 Instructions to the Gatekeeper accredited/recognised Service Provider The Service Provider is required to respond to a majority of the Self Assessment questions with a Yes or No. There are also a number of questions that require the Service Provider to enter written details. All information provided by the Service Provider will be taken as a management representation and deemed to be accurate by the Auditor. All responses provided by the Service Provider will be taken as a representation of their activities, which can be subject to testing during on-site visits. Note: Some of the Questions may not be applicable to all Service Providers. 14 November 2011 GCAP

15 A.3 Self Assessment Questionnaire for Gatekeeper Accredited/ Recognised Service Providers No Self Assessment Questions 1. GENERAL BACKGROUND NOTES 1.1 Name of Service Provider 1.2 Type of Service (CA, RA) 1.3 Location/URL of Approved CPs and CPS 1.4 Date of Gatekeeper accreditation/recognition and the latest variation 1.5 Do you remain compliant with the latest Gatekeeper Accreditation Criteria and Policies? If No, provide details. 2. PRIOR AUDITS NOTES 2.1 Has a WebTrust Audit been conducted on your operations within the last year? 2.2 Did the scope of the WebTrust Audit cover your Gatekeeper operations? If No, what did the Audit cover? 2.3 What date was the WebTrust Audit signed off? 2.4 When Who 2 was do your the Auditor WebTrust who Updates conducted occur? the WebTrust Audit? 2.5. Are 4 the work papers used available for release to your eventual GCAP Auditor? 3. RELATIONSHIPS Is your Gatekeeper related operations entirely located in your own facilities? If No, please state where they are located 3.2 Is your operation entirely managed and operated by your own personnel? If No, please state the name of the Gatekeeper Accredited Service Provider you use and which aspects of your activities are managed/operated by this organisation. 3.3 Are you reliant on another Service Provider s Certification Practice Statement? If Yes, please specify the name of the Service Provider, its location and the reason for using this CPS. NOTES NOTE: Questions 3.4 to 3.6 only apply if you outsource your facilities, management or operations to another Gatekeeper Accredited Service Provider (i.e. if the answer to 3.1 or 3.2 is NO or 3.3 is Yes) 3.4 Has the other Service Provider been through an external audit? 15 November 2011 GCAP

16 If Yes: i) who was the auditor? ii) when was the Audit conducted? 3.5 If applicable, did the scope of the other Service Provider s external WebTrust Audit cover your Gatekeeper operations? 3.6 Please specify if any issues were identified. 4. BUSINESS MODEL NOTES 4.1 Have there been changes to your business model since the version set out in your Head Agreement/Memorandum of Agreement? If Yes, please provide details. 5. INTERNAL AUDIT COMPLIANCE NOTES 5.1 Are procedures in place to check that internal Audits are performed in accordance with the Operations Manual and the Security Profile? 5.2 Has an internal compliance audit been conducted within the last 12 months? If yes, please state the date of Audit? 5.3 Did the findings of this internal Audit highlight any deficiencies? If Yes, please detail their status. 6. CA OBLIGATIONS NOTES 6.1 Do you continue to maintain an up-to-date list of all revoked certificates? 6.2 Do you continue to make available this list to all Relying Parties? 6.3 If you are issuing certificates to ROs, do you make the list of revoked certificates available to those Agencies participating in the defined Community of Interest? 6.4 Since your accreditation/recognition or last Audit, have there been instances of compromise, or suspected compromise of Keys and Certificates belonging to the CA or its operational staff or systems that may threaten the integrity of your PKI? If Yes, did you initiate Certificate revocation or suspension (if service provided) following the compromise? 7. RA OBLIGATIONS NOTES 7.1 Are procedures in place to check that your operations conform to the practices described in the CA s CPS? 7.2 Are procedures in place to check that you provide your customers with copies of other documentation required? (e.g. Subscriber Agreement)? 16 November 2011 GCAP

17 If No, do you advise customers how to obtain these documents? 7.3 Are the minimum EOI requirements for end-entities still in accordance with the Gatekeeper EOI Policy? 7.4 Do your procedures and processes for collection and storage of personal information still comply with the requirements of the Approved Documents? 7.5 Since accreditation, has there been instances of compromise, or suspected compromise of data holdings that may threaten the integrity of the PKI? 7.6 Has there been any change to the procedures that you use for conducting EOI? If Yes, please provide details. 8. CERTIFICATION PRACTICE STATEMENT MANAGEMENT NOTES 8.1 Since your accreditation/recognition or last Audit, has the management group undertaken a review of business risks, security requirements and operational procedures? Did the outcome of the review warrant a change in your practices/procedures or your CPS? 8.2 Has your CPS changed since accreditation/recognition or last Audit? If Yes: i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes. Date: 9. CERTIFICATE POLICY MANAGEMENT NOTES 9.1 What types of Certificates do you provide? 9.2 Do you maintain a management group with the final authority and responsibility for your CP(s) (e.g. Policy Approval Authority or Policy Management Authority)? 9.3 Has any of your CP(s) changed since your accreditation or last Audit? If Yes, have you submitted the amended CP(s) to Finance for reevaluation? If Yes: i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes. Date: 17 November 2011 GCAP

18 10. DISASTER RECOVERY AND BUSINESS CONTINUITY PLAN NOTES 10.1 Has your Disaster Recovery and Business Continuity Plan (DRBCP) been reviewed in accordance with its set timeframe? 10.2 Were there any negative/deficient results from the test procedures? If Yes, please detail the outcomes of required actions Are agreements with external service providers in relation to the DRBCP current? 10.4 Have you trained all employees under the provisions of the DRBCP? 10.5 Has your DRBCP been changed since your accreditation or last Audit? If Yes, have you submitted the amended DRBCP to Finance for reevaluation? If Yes i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes. Date: 11. SUBSCRIBER AGREEMENT/RELYING PARTY AGREEMENT 11.1 Do the procedures you have put in place enable Subscribers and Relying Parties to have a good understanding of their responsibilities and obligations (e.g. providing accurate information; safeguarding their Private Keys; CRL checking)? 11.2 Do you notify Agencies, Subscribers, or other parties as required in regard to liability arrangements? 11.3 Have you amended your CPS or CP(s) since your accreditation/recognition or last Audit? If Yes, have you reviewed the Subscriber Agreement/Relying Party Agreement to ensure that the changes have been incorporated? If Yes i) has Finance approved these changes? ii) if yes, state the date when Finance approved the changes. NOTES Date: 18 November 2011 GCAP

19 12 LEGAL REQUIREMENTS NOTES 12.1 Since your Accreditation/Recognition or last Audit, has there been any change in the ownership / management of your organisation that may impact your Gatekeeper Accreditation/ Recognition status? If Yes, please provide details. 13 SECURITY PROFILE [comprises protective security risk review, Threat/Risk Assessment (TRA), protective security plan and policy; and Key Management Plan (KMP)] 13.1 How often are your security policies, procedures and practices reviewed? When was the last review done? 13.2 Have there been changes to your security policies and procedures since your accreditation/recognition or last Audit? If Yes, have you submitted the amended Security Profile to Finance for re-evaluation? If yes: i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes How often do you conduct a TRA? When was this last done? 13.4 Have there been changes to your TRA since your Accreditation/Recognition or last Audit? If Yes, have you submitted the amended TRA to Finance for reevaluation? If Yes: i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes Does the Security Profile address the issue of residual risk? NOTES Date: Date: If Yes, has residual risk been accepted and signed-off by management? 13.6 How often do you conduct a review of your KMP? Specify when this was last done? 13.7 Have there been changes to your KMP since your Accreditation/Recognition or last Audit? If Yes, have you submitted the amended KMP to Finance for reevaluation? If Yes: i) has Finance approved the changes? ii) if yes, state the date when Finance approved the changes. Date: 19 November 2011 GCAP

20 14 PHYSICAL SECURITY NOTES 14.1 Have there been changes to physical security since your accreditation/recognition or last Audit? If Yes, have you notified Finance? 14.2 When was the last time a security assessment of your facility conducted? 14.3 Are there any contracts with an external Security Guard company? 14.4 Since your accreditation/recognition or last Audit, have there been instances of compromise, or suspected compromise of the Physical Security of your establishment? If Yes, please include details of the following: Was the investigation process carried out in accordance with the Approved Documents? Was the investigation and resolution documented? 14.5 Since your accreditation/recognition or last Audit, have there been instances of compromise, or suspected compromise of confidential information? If Yes, please include details of the following: Was the investigation process carried out in accordance with the Approved Documents? Was the investigation and resolution documented? 14.6 Since your accreditation/recognition or last Audit, have all alarm and physical security control systems been tested and reviewed for maintenance (as per Approved Documents and manufacturer s instructions)? If Yes, were all the tests / maintenance results acceptable? Please detail any adverse findings Since your accreditation/recognition or last Audit has the emergency response process been tested? If Yes, were all the tests / maintenance results acceptable? Please detail any adverse findings Since your accreditation/recognition or last Audit, have environmental and fire control systems been tested and reviewed for maintenance (as per manufacturer s instructions)? If Yes, were all the tests / maintenance results acceptable? Please detail any adverse findings Since your accreditation/recognition or last Audit, have the UPS and power generators been tested and reviewed for maintenance (as per manufacturer s instructions)? If Yes, were all the tests/maintenance results acceptable? Please detail any adverse findings Does your Security Profile contain elements dealing with Site Security? If Yes, please provide details. 20 November 2011 GCAP

21 15 PERSONNEL SECURITY NOTES 15.1 Have all relevant personnel obtained the level of security clearance required for performance of their duties? 15.2 When were access rights of personnel last reviewed? 15.3 What were the results of the most recent review of access listings? 15.4 Have there been any security incidents since your accreditation/recognition or last Audit concerning vetted personnel? 15.5 Have there been any security incidents since your accreditation/recognition or last Audit concerning any other personnel? 15.6 Are there any vetted employees with reviewed/lapsed clearances since your accreditation/ recognition or last Audit? Note: Personnel are required to have their clearance reviewed at a minimum of every five years Are there any vetted employees whose circumstances have changed since your accreditation/recognition or last Audit, which may affect their security clearance? 15.8 Has your Facility Security Officer (FSO) changed since accreditation/recognition or last deed of variation? If Yes, has the new FSO received appropriate security clearance? Is your FSO position outsourced? 16 FINANCIAL OBLIGATIONS NOTES 16.1 If applicable, are you registered on the ICT Multi Use List? 16.2 Is your insurance current? E 21 November 2011 GCAP

22 Appendix B GCAP for Gatekeeper accredited / recognised Certification Authorities B.1 Overview The Table below details the accreditation Criteria applicable to Gatekeeper Accredited/ Recognised CAs. For further details on the Criteria, refer to Certification Authority Accreditation Criteria available at PO1 PO1a PO2 SEC1 OPS1 PP1 PHY1 TECH1 PER1 PER1B Certificate Policy (except Special category) Documentation/ Criteria Subscriber / Relying Party Agreements (except Special category) Certification Practice Statement (all categories) Security Profile document will include the following (all categories): i. Protective security risk review ii. Security policy iii. Protective security plan iv. Key management plan i. Operations Manual; and ii. Disaster Recovery & Business Continuity Plan (all categories) ICT Multi Use List (all categories) Compliance with Physical Security to SR1 standard (all categories) Certified Technology ITSEC E3 / EAL:4 (all categories) (In-evaluation products have no status) Fully vetted employment profiles to a minimum Level 1 - Negative Vetting (all categories except High Assurance) including Facility Security Officer (all categories) Fully vetted employment profiles to SECRET (High Assurance Category only) including Facility Security Officer (all categories) 22 November 2011 GCAP

23 B.2 Instructions to the Authorised Auditor This GCAP CA work program is for use by appointed GCAP Authorised Auditors to facilitate their professional assessment of the Service Provider s compliance with Gatekeeper Policies and Criteria as documented in the Service Provider s Approved Documents. The GCAP comprises both Compliance questions and fundamental Audit control questions that are based on Gatekeeper accreditation Criteria and Policies and is also comparable with some WebTrust Program Controls. The GCAP work program should be used in conjunction with the Self Assessment Questionnaire and Service Provider s Approved Documentation. Applicable Australian and Industry Standards may also be used as reference documents. NOTE: Where the Service Provider is accredited as a CA and RA, the Authorised Auditor will be required to perform the work program set out in both Appendix B and Appendix C. As such, a separate audit of the RA and CA operations of the Service Provider will be necessary. Each question specifies where the Authorised Auditor has considered prior work, provided that the conditions stipulated in Section 7.5 GCAP Procedure for use of WebTrust Audit work - are met and supporting procedures are followed. In answering the questions, the Authorised Auditor is required to: respond with results of checks, testing and any associated work; reference where supporting work papers are contained; if a control question receives an adverse response, the Authorised Auditor is to detail the findings; and if a situation occurs where documentation provided by the Service Provider has different date and version numbers supplied by Finance, the Authorised Auditor is to contact Finance before proceeding with the section control questions. 23 November 2011 GCAP

24 B.3 GCAP CA Control Questions PP1 Control Questions (include but are not limited to the following) Multi Use List 1.1 Is the Service Provider registered on the ICT Multi Use List at Prior Work considered Result of testing PO1 CERTIFICATE POLICY (CP) Note: The Auditor should be aware that a Service Provider may have a number of CPs, depending on the structure of its PKI. The questions below refer to the CP in a singular format, though should be applied to all CPs within the Service Provider's Gatekeeper PKI. 2.1 Is there more than one CP? 2.2 Is the CP publicly available from the URL specified in the Self Assessment Questionnaire 1.3? Obtain a copy of the CP from the URL of the Service Provider Obtain the date and version number(s) of the CP(s) from Finance. Review the CP to check if the version number and date are the same as those provided by Finance. 2.3 Determine if the CA has a management group (Policy Approval Authority (PAA), Policy Management Authority (PMA) or equivalent group) with final authority and responsibility for specifying and approving the CA s CP(s) and CPS. (Self Assessment Questionnaire 9.2) Review details of the Group and that the details of Persons are all current. Reference documents if required 24 November 2011 GCAP

25 2.4 If any of the CP s have been changed since accreditation/recognition or the last Audit as stated by Self Assessment Questionnaire (9.3) obtain evidence of: Service Provider s submission to Finance for re-evaluation; and subsequent approval If the amended CPs have been submitted to Finance for re-evaluation and not yet Approved, please detail the date of submission and any reasons why it has not been Approved. 2.6 Check if the Service Provider s CP contains sections for Subscriber/Relying Parties relating to: provision for protection of personal privacy any reliance or financial limits for Certificate usage liability arrangements (Self Assessment Questionnaire 12.1) accuracy of representations in Certificate application information on protection of the subscriber s Private Key restrictions on Private Key and Certificate use; and notification of procedures for Private Key compromise. For Relying Parties, in addition to the above: purposes for which Certificate is used digital signature verification responsibilities revocation and suspension checking responsibilities; and acknowledgement of liability caps and warranties. 25 November 2011 GCAP

26 P002 CERTIFICATION PRACTICES STATEMENT (CPS) Prior Work considered 3.1 Is the CPS publicly available from the URL specified in the Self Assessment Questionnaire 1.3? Result of testing Obtain a copy of the CP from the URL of the Service Provider Obtain the date and version number(s) of the CP(s) from Finance. Review the CPS to check if the version number and date are the same as those provided by Finance. 3.2 If the CPS has been changed since accreditation/recognition or the last Audit as stated by Self Assessment Questionnaire (8.2) or there are differences between the dates and version numbers (3.1 above), obtain evidence of: Service Provider s submission to Finance for re-evaluation; and subsequent approval. 3.3 If the amended CPS has been submitted to Finance for re-evaluation and not yet Approved, please detail the date of submission and any reasons why it has not been Approved. 3.4 Review each of the controls and practices within the CA s CPS and crossreference them against the policies contained within each of the CP(s), to determine if the controls appear to reflect and achieve the objectives and criteria set forth within each CP. 3.5 Review at minimum, two months of recent statistical data relating to Certificates that have been: issued renewed 26 November 2011 GCAP

27 rekeyed revoked suspended (if service provided). Determine using event logging or other means if the Certificates have been processed as prescribed and report on any anomalies. Determine, over the same period, that: certificate distribution to End Users and the Database/Repository (if service provided); and CRL processing was also conducted as prescribed. SEC1 SECURITY PROFILE Prior Work considered 4.1 Obtain Result of testing the latest copy of the Approved Security Profile from the Service Provider; and the date and version number(s) of the Security Profile from Finance. Review the Security Profile to check if the version number and date are the same as those provided by Finance. 4.2 If the Security Profile has been changed since accreditation/recognition or the last Audit as stated by Self Assessment Questionnaire (13.2), obtain evidence of Service Provider s submission to Finance for re-evaluation; and subsequent Approval. 27 November 2011 GCAP

28 4.3 If the amended Security Profile has been submitted to Finance for re-evaluation and it has not yet been Approved, please detail the date of submission and any reason why it has not been Approved. 4.4 Review the Security Profile to determine that it contains the intended security objectives covering the handling and processing of each Certificate contained within the relevant sections of the CP/CPS. 4.5 If the CA is relying on another entity for some particular aspect of security or trust, determine that this is clearly indicated within the Security Profile. (Reference Section 3 Relationships in the Self Assessment Questionnaire) 4.6 Obtain evidence of when the Security Profile was last reviewed as stated by Self Assessment Questionnaire (13.1) 4.7 Has the Security Profile been reviewed within the required time frame? 4.8 Review the Internal Service Provider Report from the last Security Profile review. Have any and all action points been implemented? 4.9 When was the last Threat and Risk Assessment (TRA) done and was it completed within the time frame prescribed in the Approved Documents? (Self Assessment Questionnaire 13.3) 4.10 Have any and all action points from the TRA review been implemented? Detail any that have not and reasons why If any actions do not appear to have been implemented and reasons are not given, are they addressed as residual risks? Have they been officially approved and signed off by management? 4.12 Since accreditation/recognition or last Audit, have there been instances of compromise, or suspected compromise of Keys (Self Assessment Questionnaire 6.3) belonging to end users? Review evidence of the documentation and procedures taken to deal with the Key revocation or suspension (if service provided) following the compromise, for a random sampling of situations. Report on any situations that are not actioned in accordance with Approved 28 November 2011 GCAP

29 Documents Review each of the processes within the Key Management Plan and test to determine if they are implemented as prescribed. Consider in particular the outcomes of the following procedures: generating Keys distributing Keys to intended users, including how Keys should be activated when received storing Keys, including how authorised users obtain access to Keys Changing or updating Keys including rules governing Key changes and how this will be done dealing with compromised Keys revoking Keys including how Keys should be withdrawn or deactivated, e.g. when Keys have been compromised or when a user leaves an organisation (in which case Keys should also be archived) recovering Keys that are lost or corrupted as part of business continuity management, e.g. for recovery of encrypted information backing up and Archiving Keys, e.g. for information archived or backing up destroyed Keys logging and Auditing of Key management related activities; and escrowing Keys (if service is provided) Since accreditation or the last Audit, have there been instances of compromise, or suspected compromise of Keys (Self Assessment Questionnaire 6.3) belonging to the CA or its Operational staff/systems that may threaten the integrity of the PKI. Review evidence of the documentation and procedures taken to deal with the Key revocation or suspension (if service provided) following the compromise for all situations. 29 November 2011 GCAP

30 Report on any situations that are not actioned in accordance with the Approved Documents The Authorised Auditor is to perform testing on each of the Service Provider s procedures and controls detailed within the Approved Documents and identify and report on any deficiencies or issues. Consider in particular the outcomes of the following procedures: is the CA computing and network infrastructure installed and operating in the manner described in the Security Profile, the Operations Manual, the CPS and the DRBCP? access control mechanisms - Audit trail collection and review security incident monitoring, incident management and incident response procedures the maintenance and use of information about vulnerabilities in the CA facility the Key Management Plan (for example, secure generation, storage, archival and disposal of keys) user account management control of removable media backup and recovery of data and systems, including off-site storage (Refer DRBCP) inventory control, including registration procedures to control location of and access to critical assets (for example, private keys); and internet firewall / Gateway installation and management. Approved Defence Signals Directorate Evaluated Products List (DSD EPL) / ITSec Gateway. 30 November 2011 GCAP

31 OPS1. DISASTER RECOVERY AND BUSINESS CONTINUITY PLAN (DRBCP) Prior Work considered 5.1 Obtain Result of testing a copy of the latest Approved DRBCP from the Service Provider; and the date and version number from Finance Review the DRBCP to check if the version number and date are the same as those provided by Finance. 5.2 If the DRBCP has been changed since accreditation or the last Audit as stated by the Self Assessment Questionnaire (10.5) or there are differences between the compared documents (Security Profile), obtain evidence of Service Provider s submission to Finance for re-evaluation; and subsequent Approval. 5.3 If the amended DRBCP has been submitted to Finance for re-evaluation and it has not yet been Approved, please detail the date of submission and any reasons why it has not been Approved. 5.4 Obtain evidence that the DRBCP has been tested in accordance with the required timeframe and procedures. (Reference Self Assessment Questionnaire 10.1) 5.5 Have all actions points from the testing been implemented? Check documentation to determine that the tests are documented and that any issues identified have been resolved. Detail any that have not and reasons why. (Reference Self Assessment Questionnaire 10.2) 5.6 Does the Service Provider maintain an updated list of personnel and organisations responsible for operational and business continuity (Internal and External)? Is this list communicated to Operational Staff in the certified facility? Obtain a sample of the documents and test for accuracy. 5.7 Determine if the agreements with external organisations referenced in the 31 November 2011 GCAP

Gatekeeper Compliance Audit Program

Gatekeeper Compliance Audit Program Gatekeeper Compliance Audit Program V2.0 DECEMBER 2014 Gatekeeper Compliance Audit Program V 2.0 DECEMBER 2014 Contents Contents 2 1. Guide Management 4 1.1. Change Log 5 1.2. Review Date 5 1.3. Conventions

More information

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program

Gatekeeper Public Key Infrastructure Framework. Compliance Audit Program Gatekeeper Public Key Infrastructure Framework Compliance Audit Program V 2.1 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work is copyright. Apart from any use as permitted

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc. Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.

More information

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework.

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework. Gatekeeper Public Key Infrastructure Framework 1 October 2007 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright.

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Security of outsourced services and functions Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this publication

More information

CMS Illinois Department of Central Management Services

CMS Illinois Department of Central Management Services CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES

GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES Level 37, 2 Lonsdale Street Melbourne 3000, Australia Telephone.+61 3 9302 1300 +61 1300 664 969 Facsimile +61 3 9302 1303 GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES ENERGY INDUSTRIES JANUARY

More information

X.509 Certification Practice Statement for the Australian Department of Defence

X.509 Certification Practice Statement for the Australian Department of Defence X.509 Certification Practice Statement for the Australian Department of Defence Version 5.1 December 2014 Document Management This document is controlled by: Changes are authorised by: Defence Public Key

More information

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc. THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by

More information

ARTL PKI. Certificate Policy PKI Disclosure Statement

ARTL PKI. Certificate Policy PKI Disclosure Statement ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed

More information

Certification Practice Statement (ANZ PKI)

Certification Practice Statement (ANZ PKI) Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority

More information

Ford Motor Company CA Certification Practice Statement

Ford Motor Company CA Certification Practice Statement Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate

More information

TR-GRID CERTIFICATION AUTHORITY

TR-GRID CERTIFICATION AUTHORITY TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

Comodo Certification Practice Statement

Comodo Certification Practice Statement Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the

More information

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4

More information

TR-GRID CERTIFICATION AUTHORITY

TR-GRID CERTIFICATION AUTHORITY TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.3 May 15, 2014 Table of Contents TABLE OF CONTENTS:... 2 1. INTRODUCTION... 7 1.1 OVERVIEW... 7 1.2 DOCUMENT

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

VeriSign Trust Network Certificate Policies

VeriSign Trust Network Certificate Policies VeriSign Trust Network Certificate Policies Version 2.8.1 Effective Date: February 1, 2009 VeriSign, Inc. 487 E. Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com - 1-

More information

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :

More information

epki Root Certification Authority Certification Practice Statement Version 1.2

epki Root Certification Authority Certification Practice Statement Version 1.2 epki Root Certification Authority Certification Practice Statement Version 1.2 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1 1.1.1 Certification Practice Statement...

More information

GLOSSARY. In these documents, the following capitalised words and phrases have the following meanings unless a contrary intention is evident:

GLOSSARY. In these documents, the following capitalised words and phrases have the following meanings unless a contrary intention is evident: GLOSSARY The Glossary applies to the following documents: 1. VeriSign Gatekeeper ABN-DSC CP 2. VeriSign Gatekeeper Individual CP 3. VeriSign Gatekeeper Non-Individual CP 4. VeriSign Gatekeeper CPS 5. VeriSign

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

Gandi CA Certification Practice Statement

Gandi CA Certification Practice Statement Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10

More information

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY Document Classification: Public Version Number: 2.5 Issue Date: June 25, 2015 National Center for Digital Certification Policies and Regulations Department Digitally

More information

STATUTORY INSTRUMENTS 2012 No. _

STATUTORY INSTRUMENTS 2012 No. _ STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION

More information

Gatekeeper. Public Key Infrastructure Framework

Gatekeeper. Public Key Infrastructure Framework Gatekeeper Public Key Infrastructure Framework V 3.0 NOVEMBER 2014 Gatekeeper Public Key Infrastructure Framework V 3.0 DECEMBER 2014 Foreword Information and Communication Technologies (ICT) are transforming

More information

Fraunhofer Corporate PKI. Certification Practice Statement

Fraunhofer Corporate PKI. Certification Practice Statement Fraunhofer Corporate PKI Certification Practice Statement Version 1.1 Published in June 2012 Object Identifier of this Document: 1.3.6.1.4.1.778.80.3.2.1 Contact: Fraunhofer Competence Center PKI Fraunhofer

More information

SMKI Recovery Procedure

SMKI Recovery Procedure SMKI Recovery Procedure Consultation open: 1 July 2015 Consultation closes: 29 July 2015 DCC Public Page 1 of 55 Contents 1 Introduction... 3 1.1 Purpose & Interpretation...3 1.2 Scope...3 2 Overview of

More information

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES

COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES COMPLIANCE FRAMEWORK AND REPORTING GUIDELINES DRAFT FOR CONSULTATION June 2015 38 Cavenagh Street DARWIN NT 0800 Postal Address GPO Box 915 DARWIN NT 0801 Email: utilities.commission@nt.gov.au Website:

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS To the Management of Internet Security Research Group: We have examined the assertion by the management of the Internet Security Research Group ( ISRG

More information

Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5

Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1

More information

Government CA Government AA. Certification Practice Statement

Government CA Government AA. Certification Practice Statement PKI Belgium Government CA Government AA Certification Practice Statement 2.16.56.1.1.1.3 2.16.56.1.1.1.3.2 2.16.56.1.1.1.3.3 2.16.56.1.1.1.3.4 2.16.56.1.1.1.6 2.16.56.1.1.1.6.2 2.16.56.9.1.1.3 2.16.56.9.1.1.3.2

More information

Information System Audit Guide

Information System Audit Guide Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Commonwealth of Australia 2011 Page 1 TABLE OF CONTENTS 1. INTRODUCTION TO ACCREDITATION...4 2. THE

More information

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document

More information

Eskom Registration Authority Charter

Eskom Registration Authority Charter REGISTRATION WWW..CO.ZA Eskom Registration Authority Charter Version 2.0 applicable from 20 November 2009 Megawatt Park Maxwell Drive Sunninghill, SOUTH AFRICA, 2157 Phone +27 (0)11 800 8111 Fax +27 (0)11

More information

SECOM Trust.net Root1 CA

SECOM Trust.net Root1 CA CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT May 22, 2006 Version 2.00 SECOM Trust Systems Co.,Ltd. Revision History Version Date Description V1.00 2003.08.01 Initial Draft (Translated from Japanese

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

IRAP Policy and Procedures up to date as of 16 September 2014.

IRAP Policy and Procedures up to date as of 16 September 2014. Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and

More information

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems

CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field

More information

WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM

WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] BASED ON: CA/BROWSER FORUM BASELINE REQUIREMENTS FOR THE ISSUANCE AND MANAGEMENT OF PUBLICLY-TRUSTED CERTIFICATES,

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

GlobalSign CA Certificate Policy

GlobalSign CA Certificate Policy GlobalSign CA Certificate Policy Date: December 17 th 2007 Version: v.3.0 Table of Contents Document History...1 Acknowledgments...2 1. Introduction...3 1.1 Overview...4 1.1.1 GlobalSign Rootsign...5 1.1.2

More information

WESTERN AUSTRALIA HEAVY VEHICLE ACCREDITATION SCHEME (WAHVAS) BUSINESS RULES (DRAFT)

WESTERN AUSTRALIA HEAVY VEHICLE ACCREDITATION SCHEME (WAHVAS) BUSINESS RULES (DRAFT) WESTERN AUSTRALIA HEAVY VEHICLE ACCREDITATION SCHEME (WAHVAS) BUSINESS RULES (DRAFT) June 2015 DRAFT v1.3 Remove on final Contents 1. BUSINESS RULES OVERVIEW 3 1.1 Purpose 3 1.2 Legal Status of the Business

More information

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy Version: 1.0 Issued: August 2014 Status: Final PEXA Certification Authority Certificate Profile 1. Introduction Property

More information

ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015

ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015 ING Public Key Infrastructure Certificate Practice Statement Version 5.3 - June 2015 Colophon Commissioned by Additional copies ING Corporate PKI Policy Approval Authority Additional copies of this document

More information

NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation

NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation Please send your completed renewal confirmation to: Department of Human Services Fax number: 1800 890 698 Number of pages

More information

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement

Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement Version 2.2 Document OID: 1.3.6.1.4.1.36355.2.1.2.2 February 2012 Contents

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Symantec Trust Network (STN) Certificate Policy

Symantec Trust Network (STN) Certificate Policy Symantec Trust Network (STN) Certificate Policy Version 2.8.5 Effective Date: September 8, 2011 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 http//:www.symantec.com

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS 2015 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2015 All material presented in this publication

More information

RTO Delegations Guidelines

RTO Delegations Guidelines RTO Delegations Guidelines ISBN 0 7594 0389 9 Victorian Qualifications Authority 2004 Published by the Victorian Qualifications Authority This publication is copyright. Apart from any use permitted under

More information

Trusted Certificate Service

Trusted Certificate Service TCS Server and Code Signing Personal CA CPS Version 2.0 (rev 15) Page 1/40 Trusted Certificate Service TCS Server CAs, escience Server CA, and Code Signing CA Certificate Practice Statement Version 2.0

More information

GENERAL PROVISIONS...6

GENERAL PROVISIONS...6 Preface This Key Recovery Policy (KRP) is provided as a requirements document to the External Certification Authorities (ECA). An ECA must implement key recovery policies, procedures, and mechanisms that

More information

Management Systems Recognition Booklet

Management Systems Recognition Booklet Management Systems Recognition Booklet Page 1 of 15 Contents Revision History... 4 Related Documents... 4 1 Management Systems Recognition Booklet... 5 2 Accreditation Status... 5 3 The Recognition Process...

More information

REHABILITATION MANAGEMENT SYSTEM AUDIT TOOL

REHABILITATION MANAGEMENT SYSTEM AUDIT TOOL REHABILITATION MANAGEMENT SYSTEM AUDIT TOOL Reviewing rehabilitation management systems and compliance under the Safety, Rehabilitation and Compensation Act 1988 and Guidelines for Rehabilitation Authorities

More information

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version) Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature

More information

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States www.globessl.com TABLE OF CONTENTS 1. INTRODUCTION...

More information

2. The audit of a self managed superannuation fund

2. The audit of a self managed superannuation fund 2. The audit of a self managed superannuation fund 2. The audit of a self managed superannuation fund 2:2 Introduction to this chapter 2:2 ASIC SMSF auditor registration 2:2 Overview of the audit of an

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period. Updated May 2015

FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period. Updated May 2015 FMCF certification checklist 2014-15 (incorporating the detailed procedures) 2014-15 certification period Updated May 2015 The Secretary Department of Treasury and Finance 1 Treasury Place Melbourne Victoria

More information

SMKI Recovery Procedure

SMKI Recovery Procedure - file formats Consultation opens: 23 September 2015 Consultation closes: 7 October 2015 Version: v1.0 Date: 23 September 2015 Author: Classification: Jonathan Jennings, Andy Barraclough DCC Public Document

More information

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3. California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority Version 3.4 April 2015 Table of Contents 1.0 INTRODUCTION... 8 1.1 OVERVIEW... 8 1.2

More information

Australian Government Information Security Manual CONTROLS

Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS 2014 Australian Government Information Security Manual CONTROLS Commonwealth of Australia 2014 All material presented in this publication

More information

Rules for the certification of event sustainability management system

Rules for the certification of event sustainability management system Rules for the certification of event sustainability management system In force from 10/09/2014 RINA Services S.p.A. Via Corsica, 12 16128 Genova Tel. +39 010 53851 Fax +39 010 5351000 E-MAIL: info@rina.org,

More information

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc. CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8

More information

EuropeanSSL Secure Certification Practice Statement

EuropeanSSL Secure Certification Practice Statement EuropeanSSL Secure Certification Practice Statement Eunetic GmbH Version 1.0 14 July 2008 Wagnerstrasse 25 76448 Durmersheim Tel: +49 (0) 180 / 386 384 2 Fax: +49 (0) 180 / 329 329 329 www.eunetic.eu TABLE

More information

Certification Procedure of RSPO Supply Chain Audit

Certification Procedure of RSPO Supply Chain Audit : 1 of 19 Table of Contents 1. Purpose 2. Scope 3. Unit of Certification 3.1 Identity Preserved, Segregation, Mass Balance, 3.2. Book and Claim 4. Definitions 5. Responsibilities 5.1 Head of the Certification

More information

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS) Starfield Technologies, LLC Certificate Policy and Certification Practice Statement (CP/CPS) Version 3.8 April 15, 2016 i Starfield CP-CPS V3.8 Table of Contents 1 Introduction... 1 1.1 Overview... 1 1.2

More information

Transnet Registration Authority Charter

Transnet Registration Authority Charter Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/

More information

Certum QCA PKI Disclosure Statement

Certum QCA PKI Disclosure Statement CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia

More information

Rules for the certification of asset management systems

Rules for the certification of asset management systems Rules for the certification of asset management systems In force from 8/09/2014 RINA Services S.p.A. Via Corsica, 12 16128 Genova Tel. +39 010 53851 Fax +39 010 5351000 E-MAIL: info@rina.org, web: www.rina.org

More information

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) [Draft] Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) Version: 1.00 August, 2015 Bangladesh Bank Page 2 of 42 Document Reference Title Document Type Bangladesh Bank

More information

GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities

GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities GUIDANCE NOTE 1.1.1 Building Control (Amendment) Regulations 2014 Procurement Implications for Contracting Authorities Office of Government Procurement Building Control (Amendment) Regulations 2014 Procurement

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

REQUIREMENTS FOR CERTIFICATION BODIES TO DETERMINE COMPLIANCE OF APPLICANT ORGANIZATIONS TO THE MAGEN TZEDEK SERVICE MARK STANDARD

REQUIREMENTS FOR CERTIFICATION BODIES TO DETERMINE COMPLIANCE OF APPLICANT ORGANIZATIONS TO THE MAGEN TZEDEK SERVICE MARK STANDARD REQUIREMENTS FOR CERTIFICATION BODIES TO DETERMINE COMPLIANCE OF APPLICANT ORGANIZATIONS TO THE MAGEN TZEDEK SERVICE MARK STANDARD Foreword The Magen Tzedek Commission has established a standards and certification

More information

KIBS Certification Practice Statement for non-qualified Certificates

KIBS Certification Practice Statement for non-qualified Certificates KIBS Certification Practice Statement for non-qualified Certificates Version 1.0 Effective Date: September, 2012 KIBS AD Skopje Kuzman Josifovski Pitu 1 1000, Skopje, Republic of Macedonia Phone number:

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

SSL.com Certification Practice Statement

SSL.com Certification Practice Statement SSL.com Certification Practice Statement SSL.com Version 1.0 February 15, 2012 2260 W Holcombe Blvd Ste 700 Houston, Texas, 77019 US Tel: +1 SSL-CERTIFICATE (+1-775-237-8434) Fax: +1 832-201-7706 www.ssl.com

More information

Asset Management Systems Scheme (AMS Scheme)

Asset Management Systems Scheme (AMS Scheme) Joint Accreditation System of Australia and New Zealand Scheme (AMS Scheme) Requirements for bodies providing audit and certification of 13 April 2015 Authority to Issue Dr James Galloway Chief Executive

More information

Page de signatures électroniques / Electronic Signatures Page

Page de signatures électroniques / Electronic Signatures Page Page de signatures électroniques / Electronic Signatures Page Information Documentaire / Document Information Titre / Title : Auteur / Author : Reference : This document has been digitally signed and timestamped.

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Certificate Policy. SWIFT Qualified Certificates SWIFT

Certificate Policy. SWIFT Qualified Certificates SWIFT SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities

More information

SourceIT User Notes. Specific Clauses. Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.

SourceIT User Notes. Specific Clauses. Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2. SourceIT User Notes Specific Clauses Licence and Support Contract Commercial off-the-shelf Software RELEASE VERSION 2.3 DECEMBER 2012 AGIMO is part of the Department of Finance and Deregulation SourceIT

More information

APPLICATION FOR DIGITAL CERTIFICATE

APPLICATION FOR DIGITAL CERTIFICATE Application ID Number (For Official Use only) APPLICATION FOR DIGITAL CERTIFICATE Instructions: 1. Please fill the form in BLOCK LETTERS ONLY. 2. All fields are mandatory. 3. Present one (1) copy and the

More information

-17 2015 OUTSOURCING POLICY

-17 2015 OUTSOURCING POLICY Outsourcing Policy TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Aim & Introduction... 3 POLICY PARAMETERS... 4 Key Terms... 4 Outsourcing Agreement Requirements... 5 MATERIAL OUTSOURCING AGREEMENTS... 6 Board

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Getronics Certification Certificate of Authentic Trustworthy

Getronics Certification Certificate of Authentic Trustworthy Getronics Version 3.0 Effective Date: 15 october, 2008 Getronics Nederland B.V. Fauststraat 1 P.O. Box 9105 7300 HN Apeldoorn The Netherlands Phone: +31 (0)20 570 4511 http://www.pki.getronicspinkroccade.nl

More information