Smart Meters Programme Schedule 4.1

Size: px
Start display at page:

Download "Smart Meters Programme Schedule 4.1"

Transcription

1 Smart Meters Programme Schedule 4.1 (Contractor Solution) (SMKI version) V1.1 1

2 Schedule 4.1 (Contractor Solution) This Schedule 4.1 (Contractor Solution) is formed of the following parts: Part A Introduction 3 Part B Background / Context 3 Part C SMKI Solution Overview 4 Part D SMKI Implementation and Project Management 15 Part E Staff Capability and Capacity 15 Part F Organisational Ability and Supply Chain 16 Part G The Recovery Process 18 Part H RA Management and RA Agents 20 Part I Certificate Issuance Performance Metrics 21 Part J tscheme Compliance 21 Part K Testing 22 Part L Service Management 26 V1.1 2

3 Part A Introduction 1 This schedule sets out the Contractor Solution to meeting the DCC Requirements for SMKI. 2 The Contractor Solution shall deliver the requirements set out in Schedule 2.1. Part B Background / Context The SMKI service is at the absolute centre of a successful delivery of not only the DCC s obligations to the DECC but also in the total success of the entire end to end ecosystem. Scale PKI is a mature technology; however the SMKI Service needs to operate at a scale that is rare in the market. Over recent years PKI has experienced a renaissance being ideally suited to large projects involving device authentication such as this. The leap for a provider to move from designing and operating a service for hundreds of thousands of certificates to millions is significant and requires careful design and experience to be able to provide credible commitment. BT / Symantec have the experience to provide services on a similar scale to what is required for this service. We have provided a reference within our proposal where we deliver around xxxx certificates per year to a single project; therefore we know how to design solutions to meet the scale required for the successful rollout of the SMKI project. Operational experience This service must be reliable and robust and the consequences of failure would be significant. From a field engineer unable to install a Smart Meter in a consumer s home because there is a problem with certificates, to a large scale breach affecting a Utility s brand in the marketplace and damaging customer confidence, this project is significant. Any damage to a Utility s commitment to secure client information would have economic impact and have a damaging effect on confidence in the overall Smart Meter program. The Smart Grid is a key part of the Critical National Infrastructure and must be protected and maintained at all times. Cost and green benefits associated with delivering these services to Consumers could be compromised through failure. Proven maturity and experience in the selected provider of this service is therefore a key factor to ensure these risks are mitigated. A strong history of delivering mission critical Managed PKI Operations to demanding service levels and the experience to implement the solutions using Best Practice Standard in line with what is currently being provided to existing clients is what the BT/Symantec proposal brings to DCC and provides confidence in a selection of the service. Pro-Active Project Communications V1.1 3

4 There is no doubt that for a project of this size and complexity, the required timeframes and deliverables are very aggressive. BT/ Symantec have already demonstrated through the pre-tender process, the desire to be open and to share our joint knowledge and collaborate based on experience that will both improve the end service and ensure the timeframes are achievable. This needs to be a partnership between all stakeholders to ensure success and this is the spirit and landscape in which BT and Symantec wish to conduct this relationship now and into the years to come. There is no desire to promise much, and hope the absolute desire is to deliver and delight and this is critical to ensure success for all involved. Part C 1 Overview SMKI Solution Overview The BT/Symantec solution draws upon the strengths and capabilities of both organisations. The proposed solution has the Symantec PKI Platform (SPP) at its core. The SPP will hosted in two of BT s secure UK data centres and be operated and managed by BT s existing PKI service operations team in the UK, which is staffed by xxxx personnel and has 15 years experience of providing managed PKI solutions to customers. 2 Symantec PKI Platform As a robust PKI solution, the Symantec PKI Platform provides the same rich functionality and robust architecture that Symantec employs for the thousands of customers that use its other managed PKI services. The SPP platform issues some xxxx certificates per annum with xxxx incremental certificates being added per annum. The Symantec PKI Platform: Is highly scalable and extensible. Developed to operate on a multiprocessor distributed architecture, the Symantec PKI Platform contains high-performance transaction engines and scalable database systems Additionally, components of Symantec PKI Platform can be distributed across multiple servers to support very high workloads and availability requirements. Designed to scale from thousands to hundreds of millions of device and user credentials, it is extensible in a way that allows organisations to take advantage of new services and solutions as they become available from service providers. Provides full certificate lifecycle management capabilities Symantec PKI Platform gives service providers end-to-end control over their PKI infrastructure, and is capable of supporting millions of end user digital certificates on a global scale. Supports open standards. Symantec leverages a highly available infrastructure that supports open standards and protocols including X.509 certificate and CRL standards and PKCSx for certificate enrolment and delivery. V1.1 4

5 Proven for large-scale deployments. Symantec PKI Platform is currently deployed in more than 20 large-scale PKI data centres worldwide, and underpins global e- commerce, large scale device ecosystems and government national ID. Symantec PKI Platform Architecture Architecture diagram redacted V1.1 5

6 3 Symantec PKI Platform (SPP) architecture xxxxx 4 Meeting DCC SMKI Service Requirements xxxxx 5 Register new RA agent (CA Manager) The CA management portal allows the administrator to appoint new RA agents as follows: CA Managers perform validation of RA agents according to the defined CP/CPS, and then use the CA management portal to enrol each RA agent and issue credentials for access to the RA agent portal. 6 Register new subscriber (RA Agent) The RA Agent portal allows RA Agents to register new service users to the subscriber portal as follows: The RA Agent performs validation of the service user according to the defined CP/CPS, then uses the RA Agent Portal to enrol the service user as an authorized subscriber, and issues credentials for access to the subscriber portal. Credentials are provided as a PKI certificate on a PIN protected USB token. 7 Request organisational certificate (Authorised Subscriber) V1.1 6

7 This portal provides the following functionality: Request issuance of individual end-entity Organisational certificates by means of uploading a PEM encoded PKCS#10 Certificate Signing Request (CSR) Download of individual end-entity Organisational certificates in PKCS#7 format. The PKCS#7 file will contain the end-entity Organisational certificate and the issuing OCA certificate. The subscriber portal allows authorized service users to request individual organizational certificates as follows: The service user authenticates to the authorised subscriber portal using the credentials provided by the RA agent at registration time. The flow from that point is as follows: i. The service user acknowledges the subscriber agreement and then submits the certificate signing request (CSR) along with the type of organisational certificate required. ii. The SMKI verifies the integrity of the request, and checks whether a certificate has already been issued for that organization. If so, then the service user is asked to acknowledge that fact iii. Once the request is submitted, the RA agent is notified. The agent signs into the RA Agent Portal to review the request, along with any other pending requests V1.1 7

8 iv. The details provided with the request include the requesting organization, user, and certificate type, as well as any other relevant details, such as whether certificates have been issued to this organization before (along with subscriber acknowledgement of the same) v. Once the RA Agent approves the request, the request is submitted to the OCA system for issuance. vi. The OCA system signs the certificate under the OCA issuing CA, publishes the certificate to the PKI Database, and then notifies both the applicant and the RA Agent that the certificate has been issued. vii. The service user then signs back into the subscriber portal to pick up the newly issued certificate. 8 Request device certificate (Authorised Subscriber) This portal provides the following functionality: Request issuance of individual end-entity Device certificates by means of uploading a PEM encoded PKCS#10 Certificate Signing Request (CSR) Presentation of individual issued end-entity Device certificates in PKCS#7 format. The PKCS#7 response will contain the end-entity Device certificate and the issuing DCA certificate V1.1 8

9 The subscriber portal allows authorized service users to request individual device certificates as follows: The service user authenticates to the authorised subscriber portal using the credentials provided by the RA agent at registration time. The flow from that point is as follows: i. The service user acknowledges the subscriber agreement and then submits the certificate signing request (CSR) for a specific device. ii. The SMKI verifies the integrity of the request and checks whether a certificate has already been issued for that organisation. iii. If the request is for the first or second certificate pair for that device, then the request is immediately submitted to the DCA system for issuance. iv. If the request is for the third or subsequent certificate pair for that device, then the request is queued for RA approval, and the RA Agent notified. At that point the RA Agent may reject or approve the enrolment, at which time the applicant will be notified that they should resubmit the request for instant approval. v. The DCA system signs the certificate under the DCA issuing CA, publishes the certificate to the PKI Database and then notifies both the applicant and the RA Agent that the certificate has been issued. V1.1 9

10 vi. The service user then signs back into the subscriber portal to pick up the newly issued certificate. 9 Register device certificate batch (Authorised Subscriber) This portal provides the following functionality: Request issuance of batches of end-entity Device certificates (max 50K per batch) by means of uploading ZIP files containing PEM encoded PKCS#10 Certificate Signing Requests (CSRs) Download of batches of issued end-entity Device certificates by means of downloading ZIP files containing PEM encoded PKCS#7 format files. Each PKCS#7 file will contain an end-entity Device certificate and the issuing DCA certificate View of current SMKI overall batch pipeline in an anonymised form View of own organisation current submitted batch pipeline processing status (older non-downloaded batch results may be present where storage permits) The subscriber portal allows authorized service users to request batches of up to 50,000 device certificates as follows: The service user authenticates to the authorised subscriber portal using the credentials provided by the RA agent at registration time. The flow from that point is as follows: V1.1 10

11 i. The service user acknowledges the subscriber agreement and then uploads a file containing a batch of up to 50,000 certificate signing requests. ii. The SMKI verifies the integrity of the batch, and starts processing the requests one by one. iii. For each request, if the request is for the first or second certificate pair for that device, then the request is immediately submitted to the DCA system for issuance. iv. If the request is for the third or subsequent certificate pair for that device, then the request is queued for RA and the request is added to a list of requests requiring approval. v. The DCA system signs each certificate under the DCA issuing CA, publishes the certificate to the PKI Database and adds the new certificate to the output batch. vi. Once the whole batch has been processed, the RA is notified that the batch is complete, along with a summary of the certificate issued, rejected or queued for approval. The applicant is also notified that the batch has completed processing. vii. The service user then signs back into the subscriber portal to pick up the newly issued certificate batch, along with a summary. viii. If there were any requests which were rejected because of the detection of multiple duplicates, the RA Agent signs into the RA Agent Portal to review and approve/reject each request, after which the service user is notified to allow them to resubmit those requests for instant approval. 10 Request device certificate (Authorised System) This provides the following functionality: Request issuance of individual end-entity Device certificates by means of uploading a PEM encoded PKCS#10 Certificate Signing Request (CSR) within the XML web services message structure Receive individual end-entity Device certificates by means of a PEM encoded PKCS#7 message contained within the XML web services response. The PKCS#7 message will contain the end-entity Device certificate and the issuing DCA certificate The system to system interface allows authorized systems to request individual device certificates as follows: V1.1 11

12 Start Authorised System Authenticates to Portal System submits CSR No SMKI verifies CSR Verifies OK? Reject Enrolment Yes Notify System owner to resubmit Queue for RA approval and notify RA Yes Second Duplicate? No Check for duplicate machine ID Stop Notify System owner No Approved? Yes Stop Request submitted to CA CA issues certificate Stop Certificate returned to Authorised System SMKI publishes certificate(s) to PKID The system authenticates to the system to system interface using the credentials provided by the RA agent at registration time. The flow from that point is as follows: i. The SMKI verifies the integrity of the request and checks whether a certificate has already been issued for that organisation. ii. If the request is for the first or second certificate pair for that device, then the request is immediately submitted to the DCA system for issuance. iii. If the request is for the third or subsequent certificate pair for that device, then the request rejected is queued for RA action, and the RA Agent notified. At that point the RA Agent may reject or approve the enrolment, at which time the System Owner will be notified that they should resubmit the request for instant approval. iv. The DCA system signs the certificate under the DCA issuing CA, publishes the certificate to the PKI Database and returns the certificate to the authorised system. 11 Revoke Organisational Certificate (RA Agent) The RA Agent portal allows RA Agents to revoke organisational certificates as follows: V1.1 12

13 RA agents perform validation of revocation requests according to the defined CP/CPS, then use the RA Agent portal to locate and revoke the required certificate. The revocation request is immediately passed to the OCA system, which marks the certificate as revoked within the CA database. The certificate will be included in all subsequent CRLs issued by the OCA and published to the PKI database. 12 Other RA portal functionality (RA Agent) The RA portal will also give the following functionality to DCC RA people: Revoke Authorised Subscribers View of current SMKI overall batch pipeline 13 Publishing Interface (to DSP PKI database) This will use an interface standard to be agreed with the DSP such as a Web Services interface on the DSP platform. Publishing data to the DSP PKI database within SLAs is reliant upon the database being able accept the published data at the rate at which it is generated. This provides the functionality to publish the following dynamic information: o o o o End Entity Public Key Certificates Issuing DCA Public Key Certificates Authenticity info for issuing DCAs such as hash of DER encoded x509 structure CRLs and ARLs for Organisational PKI The following static information also needs to be published to the PKI Database but the infrequent nature of changes to such information means that this can be transferred by an out of band solution e.g. o o o Certificate Policy and PKI Disclosure Statements Supporting policy docs and agreements Root Public Key Certificates V1.1 13

14 o o Issuing OCA Public Key Certificates Authenticity info for issuing OCAs such as hash of DER encoded x509 structure 14 BT Hosting and Operations BT will deploy the operational SMKI platform in two of its secure ISO27001 accredited data centres. There will also be a Disaster Recovery platform, maintained in a warm stand-by state located in a separate secure ISO27001 accredited data centre. Both of these platforms will be built and operated in a highly resilient configuration. A physically separate test platform will be deployed in one of the locations to facilitate the System Integration Testing and at the end of the testing phase will become the enduring test platform. The test platform is a fully featured, nonresilient model but much lower capacity for the DCCs end users as well as the DCC to test their services with the PKI and to be able to test the PKI services work with end devices. Certificates from the test system will NOT interwork with the main systems and are only to be used for test purposes and will not offer the same level of assurance, or availability. The data centres deploy strict multi-tiered access controls with anti-pass back checks in place. All of the platforms will be managed and operated using BT s secure management systems by xxxx BT teams with many years of experience with Symantec PKI technology. Physical and logical access to the platforms will be restricted to a limited set of individuals with clear separation of roles. The off-line root CA operations will be carried out in BTs Key Ceremony facility under strict scripted and witnessed ceremony conditions with the option of a video recording being made if the CP/CPS dictates as such. Between operations, the Hardware Security Modules protecting the root private keys will be stored in a highly secured storage safe requiring xxxx personnel to be present in order to physically access the HSMs and further multiple individuals required to activate the private key material. The individuals required for both physical access and activation can be a combination of both BT and DCC personnel. V1.1 14

15 BT has an excellent track record hosting and operating tscheme accredited PKI platforms for multiple customers using well proven processes and procedures. The following have been taken through accreditation: the BT Assure PKI service, the BT Managed Secure Messaging service, and; xxxx. Part D SMKI Implementation and Project Management 1 Implementation/Project Approach The SMKI Service needs to operate at a scale that is rare in the market and the scale and complexity of the SMKI project means that the overall timescales are challenging. This represents a significant risk to the overall DCC programme. BT/Symantec has a proven track record of delivering PKI services that operate at this scale to mitigate this risk. In addition BT/Symantec has an existing UK PKI service operation, manned by existing security cleared personnel and supported by robust service management processes, and experience of taking several services through tscheme approval, all of which helps to minimise the risk to DCC. We understand the importance of strong collaborative Programme/Project management and sound governance to deliver on time and against an agreed plan. We also recognise that it is essential that all stakeholders parties buy-in to the Programme/Project delivery process and that the plan defines clearly the responsibilities of each party and the resource commitments that have to be made in support of this. Given this, we are in no doubt that we can develop and agree a project plan for the SMKI service that is aligned with overall DCC delivery programme and supports the required SMKI go live date of April 2015 Part E Staff Capability and Capacity 1 BT/Symantec will provide the SMKI project, the joint strengths and capabilities of two world class implementation and support organisations. At the front line, the BT Operational team are managing the day to day operations and implementation, and the team structure to support this is detailed below. Complementing BT are Symantec s 24x7 Support Organisation with extensive operations, implementation and development expertise. This depth and capability will significantly enhance the implementation and operational phases. 2 There are three teams, structured under common Operations line management that would assume primary responsibility for accepting the contract into service (AIS) and support in-life operation: V1.1 15

16 i. Service Level Management (SLM) and Information Security Management (ISM) Assumes overall responsibility for development and in-life compliance for all service life-cycle stages (strategy, design, transition, operation and service improvement). They provide the first point of customer contact in matters notwithstanding BAU issues (see Service Desk below). The team also produce, maintain and enforce Information Security Policy and lead all activities that ensure associated accreditation (ISO27001and tscheme) is maintained. The team currently provide inlife support for several managed Trust Services platforms including three managed PKI services. The team is accredited to ITIL Service Management foundation standard as a minimum with managers accredited as ITIL Service Manager. ii. Service Desk For BAU this team provide first line customer liaison in accord with agreed Service Level Agreements (SLA). The Desk is organised under a Service Desk manager into 3 key disciplines a) Customer Contact b) Billing and Ordering and c) Key cryptology. Their functional focus is primarily event management They are effectively the bridge between technical support teams and the customer. They currently provide the Service Desk and function for several large Trust Services platforms and the cryptology function for three PKI services. The Service Desk manager is qualified and certified as a Symantec Cryptographic Key Manager with several years experience. For key ceremonies, the Service Desk manager will recruit xxxx personnel from within and without his direct team to resource mandated role segregation. iii. Application Support Group (ASG) The ASG team are the technical bridge that manages all technical issues received from the customer via Service Desk or via service monitoring and alerting. Their primary role is to inaugurate and support the application tier. However they are custodians of the entire technical service and therefore liaise with mid-tier (e.g. database administration, network administration, hardware support, design and development, vendor) and environmental teams (e.g. data centre, media-management) to introduce new services and resolve issues with in-life. They provide 24*7 cover for service affecting issues and system implementations that require deployment outside normal business hours. The ASG team currently manage a portfolio of several large Trust Services platforms including two large PKI services. Engineers are trained by Symantec in PKI application management and are skilled in all flavours of server administration through Unix/Linux and Windows. 3 Other operational teams are engaged to provide support for non-business hours and are involved with the hosting and support of business continuity (BC) capabilities and the Service Desk function. Part F Organisational Ability and Supply Chain 1 BT/Symantec recognises that this project is a complex large scale programme with high profile stakeholder perception in the UK. We have reviewed the Programme and DCC SMKI requirements in detail. We believe that with our mutual capabilities V1.1 16

17 we are perfectly positioned to meet the requirements to budget, and to high standards to deliver a live operational system within the desired timeframes. BT/Symantec senior executives are committed to the delivery of the SMKI service and to ensure that DCC deliver a successful Programme for DECC. 2 BT/ Symantec have been delivering PKI services to clients for over 15 years. BT have the largest enterprise class PKI services provision in the UK and deliver complex National Government Programmes such as xxxx. Symantec PKI platforms delivers over xxxx certificates globally annually with an incremental annual growth rate of over xxxx. Symantec commit significant R&D to the development of PKI services and technologies. 3 BT/ Symantec believe there are key requirements from this project that our unique synergies can enable DCC to deliver within timescales and with reduced risk and management burden: DCC have a high volume roll-out within short timescales We offer a robust, secure operational capability. We offer a managed SMKI service with robust business continuity and risk management through high availability architecture, backed by binding Service Level Agreements, independently audited operations and 24X7 technical support. We offer a scalable platform proven to deliver large scale volumes with within the desired performance metrics; DCC need an experienced provider who can deliver to time, budget and within the structure of the DCC Programme Plan; We can evidence and have the practical experience of large scale roll-outs and working in multiple stakeholder environments such as xxxx. We are delivering and supporting some of the largest PKI projects globally We have tangible experience in working with stakeholders in Government and Utilities markets, and working specifically on European Smart Metering Projects DCC need an established operational service provision to reduce risk and costs; We offer delivery through an established operational service with tscheme accreditation; We offer xxxx resources and multiple levels of support capabilities from technical expertise, to PKI expertise to Service management and tscheme; V1.1 17

18 DCC need a committed service provider who knows and is investing in the market; We have substantial knowledge of, and significant investment in, the future direction of PKI technology BT are working to evolve tscheme and Symantec have a significant range of investment in PKI technology and IPR globally; We are committed to the UK Public sector and PKI market We have a long term presence in both markets. We offer a very competitive commercial model; 4 Running a managed PKI service is the sole focus of the BT operational unit. Both BT/Symantec operations and technical personnel adhere to the highest IT/InfoSec standards and Best Practices. BT data centres are externally audited every year to ensure the services meet certifications and accredited policy statements. Part G The Recovery Process The scenarios which must be planned for as part of the overall DCC service design are as follows: 1 Device key compromise, whereby a smart meter device key store has been compromised, corrupted or rendered unusable. This may occur for an individual device, or a batch of devices for example a production run of metering equipment with a known flaw. 2 Organisational key compromise, whereby an organizational key has been compromised, lost, corrupted or rendered unusable. This scenario may vary in severity, depending on the role assigned by the certificate(s) corresponding to the private key. 3 Certificate Authority key compromise, whereby a Certificate Authority key has been compromised, lost, corrupted or rendered unusable. This is a very unlikely scenario, given the closed and highly controlled environment in which the CA key material is managed. Example scenarios include, in increasing order of severity, compromise of the Issuing CA, Root CA, Apex Trust Anchor CA, or Contingency Key. Role of the SMKI A primary role of the SMKI is to manage and secure all Certificate Authority key material. BT and Symantec have a long and unbroken history of securing highly sensitive private key material for government and e-commerce, including various National ID systems around the world, and the VeriSign Root Certificate Authorities which underpin global e-commerce. V1.1 18

19 In the case of organizational key compromise, certificates are revoked and reissued according to the CP/CPS, supported by the RA Agent and Authorised Subscriber portals within the SMKI. In the case of device key compromise, the key regeneration and certificate replacement is a function of the subscriber or the device management systems. The SMKI supports this process through re-enrolment of the device certificates, which may trigger the 2nd duplicate device check and subsequent RA agent review, as per the SMKI workflows in the solution overview section. In the case of CA key compromise, any compromised issuing CAs will be revoked if applicable, and any certificates issued under those CAs will be revoked (if organizational certificates) and reissued under a new issuing CA. Device certificates will be provisioned using the existing device management systems. Organisational certificates may be re-enrolled via the authorized subscriber portal. In the case of Root CA key compromise, a new Root CA certificate is generated within the SMKI via a Root CA key ceremony. The distribution of the new Root CA key is a function of the DCC Trust Anchor Management System (TAMS), using the signing certificate issued by the SMKI. In the case of compromise of the Apex Trusted Root (assumed to be the OCA root), the TAMS will need to load the apex contingency private key together with the decryption key to allow TAMP end points to unwrap the public key embedded within the OCA root certificate. Protection of the contingency key may form part of the SMKI key management function, with the key stored on an offline HSM for which multiple PIN Entry Device (PED) tokens are required for key export. Once the key is exported, a new key and OCA root is generated. Key protection for the contingency recovery key It is recommended that the contingency recovery key is generated and stored on a dedicated portable hardware security module, such as Safenet Luna CA4 or G5 module, as a non-exportable private key. This will give the same (or greater) level of key protection as the issuing and root CA keys. During a recovery situation, the Trust Anchor Management System would communicate with the HSM using a standard PKCS11 interface to access the private key in order to perform the required TAMP operations. The end to end process for generating and deploying the recovery key would be as follows. Key Ceremony: The Key Manager initialises the HSM, and defines the share policy: for example, 5 hardware keys to be registered, of which 3 are required to start up the HSM. The key manager then connects the PIN entry device (PED) to the HSM, and starts the initialisation and key generation process. During this process, the PED will prompt for each shareholder in turn to insert their hardware key into the PED USB V1.1 19

20 slot. Once all hardware keys have been registered, the contingency recovery key pair is generated within the HSM. The public key is exported, and the private key remains within the HSM. There is no way to export the private key from the HSM. The HSM is then shut down, and placed in the safe in the key ceremony room. The shareholders retain possession of their hardware share keys. Recovery: If the worst case scenario happens, and the contingency recovery key is required, the HSM is retrieved from the safe, and transported to the trust anchor management system, where it is connected to the host ready for use. The requisite number of shareholders are assembled, along with their hardware keys. The PED is connected to the HSM, and the TAMP system started. The PED will prompt each shareholder to insert their hardware key in turn, until the requisite number of keys has been entered (for example 3 of the 5 registered keys). Once the required number of keys have been inserted, the HSM will start up, and the contingency key will be available to the TAMP system software. Options: One option is to clone the HSM during the initial key ceremony, using the secure cloning mechanism provided by the HSM firmware. In this case, one HSM could be transported to the TAMP system facility (but not activated), and the clone HSM kept in the key ceremony room safe as backup. In this case, the HSM would not need to be transported to the TAMP facility for recovery - although the shareholders would still need to be present to start the HSM. Part H RA Management and RA Agents 1 We have included within our Solution Overview (part C) a number of process workflows that show how individual certificate requests will be handled and the role that the DCC RA plays in these processes. 2 BT/Symantec will work with DCC during the design phase of the SMKI implementation to develop the specific tools and define and document the processes and procedures that authorised subscribers and DCC RA personnel will need to follow to submit and approve CSRs prior to their transmission to either the Device or Organisation Certificate Authorities to support these workflows. 3 BT/Symantec will, once the processes are documented and the tools developed, produce a set of training materials and carry out a number of train the trainer sessions for DCC at BT or DCC offices so that these trainers can train authorised subscribers and RA agents before the start of User Integration Testing. These training materials will be maintained throughout the lifetime of the contract and updated to reflect any changes to the tools, processes and procedures that are V1.1 20

21 required once the service is operational, so that they can be used to train new personnel or provide any refresher training that is needed over the lifetime of the project. 4 In addition, BT/Symantec will work with DCC to define and document a robust process for identifying and validating individual subscribers and RA agents that is commensurate with Device and Organisation Certificate Policies (CPs), associate Certificate Practice Statements (CPSs) and HMG Level 3 as defined in GPG43, during the design phase. These processes will draw upon our unparalleled experience of delivering PKI projects for financial, government and other institutions globally as well as other projects for UK government. Part I Certificate Issuance Performance Metrics 1 BT will produce weekly and monthly management reports for DCC as stated in the requirements, which detail performance of the SMKI against the metrics for both the issuance of certificates for Device and Organisation Certificate Authorities as well as all the other service level metrics. The content, structure and frequency of these reports will be agreed with DCC during the design phase, but will include as a minimum information on the number of certificates requested, issued and where appropriate revoked by each organisation together with details of the time taken to respond to each certificate issuance or revocation request following approval. The report would also contain information, again split by organisation, of the number of batches submitted, the size of these batches and when these were submitted, approved and the certificates returned. 2 In addition, the RA portals for both the Device and Organisation Certificate Authorities will enable the RA Manager and individual RA Agents to view the certificate requests by organisation and view the number of certificates that have been issued, those certificate requests that have been rejected and any certificate requests that are pending waiting approval by the RA. It will also allow the RA Manager and RA Agents to view when individual certificates and batch requests were submitted, approved and actioned. 3 Every event in the certificate lifecycle is fully audited within the PKI backend system, including certificate request, approval, issuance and revocation. The time stamped audit trail includes full certificate details along with information of the actors involved. The audit trail is stored within the Symantec PKI Platform database indefinitely, and available for reporting via the administration interface or directly from the database for custom reports. Part J tscheme Compliance 1 BT has been an active member of tscheme since its inception in BT has the practical experience of taking three major services through the tscheme approval process namely: V1.1 21

22 the BT Assure PKI service, the BT Managed Secure Messaging service, and; xxxx, which BT manages on behalf of the xxxx, through the tscheme approval process. 3 BT s PKI service operations are already ISO/IEC27001:2005 accredited and we propose to extend the scope of this ISMS to include the OCA and DCA service operations and extend this accreditation, which will be transitioned to ISO/IEC27001:2013 in the coming 12 months, to include those elements SMKI service that we would deliver to DCC to enable tscheme approval to be achieved. 4 tscheme will not approve services before they are operational. We would therefore plan to obtain Scheme Registered Applicant status for 1 September Registered Applicant status sets out the scope of the service approval and an agreed timeline for completing the tscheme assessment, and would ensure that full tscheme approval can be obtained within the first quarter of live operation. 5 To support DCC in delivering tscheme accreditation, BT will produce the Specification of Service Subject to Assessment (S3A), engage the tschemerecognised assessor and manage the accreditation process. However, as the tscheme accreditation will cover the full scope of the SMKI and not just those elements provided by BT/Symantec accreditation, DCC input will be required to complete the S3A and to confirm how the requirements of the tscheme Base Approval Profile, which primarily relates to the overall governance of the service, are best evidenced. DCC will also need to ensure that the PMA and its Registration Authority service operation are in scope of its own BTISO/IEC27001:2005(2013) accreditation and provide support for the annual audits of these elements of the SMKI service by the tscheme-recognised assessor appointed by BT. Our knowledge and experience in this area will reduce the overall cost, effort, risk and time associated with the delivery of tscheme accreditation for DCC. Part K 1 General Testing Within the auspices of the overall Project Plan, the BT Project Manager and Test Manager will be responsible for the Testing work packages. The Testing Manager will generate initial draft Test Strategy & Test Data Strategy for consultation with the DCC and other stakeholders during the Design Phase. This initial draft will be based on the real experiences of developing similar plans V1.1 22

23 across a range of other Government and Commercial clients implementations. There is a standard system test plan for the base PKI platform, which is supplemented with test cases for any additional components and workflows specific to a particular implementation. This test plan is drafted during the preimplementation phase, and would be presented to, and agreed with DCC prior to this stage. 2 The Test Manager with the BT PKI service experts will work with DCC and stakeholders to define, document and agree the final testing strategy, associated risks, dependencies and timing within the overall Project Plan. The deliverables at the end of this activity will be the Test Strategy, the Test Data Strategy and detailed Test Plan with its interdependencies. These deliverables will enable the DCC to more accurately understand the various scope, objectives, deliverables, risks and efforts involved in the PIT, SIT and UIT stages. 3 Key activities will include: Agreeing communication protocols Defining SMKI platform s non-functional tests & acceptance criteria - System documentation, system performance and security model validation Defining the functional & interface tests along with acceptance criteria - Systems tests, data level tests, user interface tests 4 The SMKI platform will undergo a process of software implementation and configuration, followed by activation with CA keys for integration testing. This system activation is referred to as bootstrapping, from which point all CA activity is controlled and audited as per CP/CPS requirements. System testing of the platform consists of two major phases: pre-bootstrap component testing, and post-bootstrap end to end testing. Once pre and post bootstrap tests are completed, witnessed and signed off by DCC stakeholders, the SMKI moves into the user integration testing phase. Symantec and BT act in a supporting role during this phase, providing input into test activities where necessary and addressing any issues that arise. 5 Testing Assurance BT/Symantec will design a test plan which covers all requirements documented within the DCC SOR, together with any requirements arising from subsequent clarifications and discussions between BT and DCC. Each test case will reference one or more specific requirements. The test plan is presented to DCC for approval and adjusted as necessary before signoff. The test plan includes the process for signing off each test case, including the DCC authorised witnesses, witness schedule and activities to be witnessed. Test results are entered for each test case, together with any relevant output data. V1.1 23

24 In order to streamline the test witnessing process, the test plan will be executed twice. The plan will first be executed by BT internally during the pre-bootstrap build phase. Once all tests are complete, the system is reinitialised and all test data removed, and the test plan is then executed a second time, with full witnessing by DCC stakeholders. Only when all tests are complete and witnessed will the system be signed over for user integration testing. 6 Pre-Integration testing The SMKI platform will undergo a process of software implementation and configuration, followed by activation with live issuing CA keys. The activation of live CA keys is referred to as bootstrapping, from which point all CA activity is controlled and audited as per CP/CPS requirements. System testing of the platform consists of two major phases: pre-bootstrap component testing, and post-bootstrap end to end testing. There is a standard CLP system test plan for the base platform, which is supplemented with test cases for any additional components and workflows specific to a particular implementation. This test plan is drafted during the pre-implementation phase, and agreed to by DCC prior to the professional services engagement. The System test plan is executed twice. The first execution (pre bootstrap testing) occurs during initial setup to ensure that all components are operating correctly as they are installed and configured with test CA keys. Any issues arising during this phase which cannot be fixed immediately are raised with support and allocated a case number. Once the software is operating correctly and all tests completed successfully, the system is reinitialized and cleaned of any test data before being activated with user integration live CA keys. The test plan is then executed a second time (post bootstrap testing), with each test case being witnessed by DCC. Once all post bootstrap tests have been completed successfully, and to the satisfaction of DCC, the system as a whole is signed off as fully operational, and may be opened for Integration Testing. 7 Integration testing BT and Symantec will work with DCC to build a service user facing test plan. This plan may be based on the workflow test cases included in the system test plan, and will include end to end testing of subscriber services, including registration, portal access, individual certificate request, batch certificate request and certificate pickup. 8 Testing Environments BT/Symantec will provide three physically separate PKI platforms to support the SMKI implementation. V1.1 24

25 The first is the development/reference PKI platform that BT/Symantec will use for its own internal system/pre-integration testing. This platform will be retained for the duration of the contract and will be used to test new release and enhancements to the service, should these be required, before these are deployed onto the either the DCC test or production environments. The second is the DCC test environment, which will be provisioned for start of Pre-Integration Testing and which will be used to support DCC System Integration and User Integration testing. This platform will again by retained for the duration of the contract and will, following the completion of system and user integration testing, provide the enduring test environment that is required for business as usual (BAU) testing and to facilitate new entrant service user testing. The third is the DCC production environment, which will be provisioned for the start User Integration testing on 1 April 2015 and will be replicated in a second secure site to ensure business continuity. The DCC test environment will be located in the same secure site as one of the two production platforms and will be supported by the same operational team, but will be exist on physically separate hardware and share no common components. The test and production systems will make use of a shared data centre back-up solution 9 Testing Defect Management All incidents and defects reported to the BT Service Desk will be ticketed and the priority level agreed with DCC and regular updates provided in line with the agreed service levels until the incident is resolved or the defect corrected. Where this requires a new release of any software component or a configuration change, BT will first deploy this onto its development/reference environment and execute a test plan that is commensurate with the complexity and scale of change, and its likely impact in event of failure. BT/Symantec will share the results of this testing and, if appropriate, the rollback plans for backing out the change in the event of problem, and obtain DCC agreement before rolling out the change onto the DCC test environment. This will enable DCC to perform any additional testing that might be required to ensure that the change has no adverse impact on the wider DCC eco-system. BT/Symantec will advise DCC on the scope of testing that is needed for any change or new release and will recommend which subset of tests from the originally agreed user facing test plan should be performed before the change is rolled out onto the production environment. V1.1 25

26 Once DCC has completed and signed-off on these tests, BT will implement the change on the DCC production environment in a manner that minimises the impact on the overall SMKI service and at a time agreed with DCC. Any changes to software components will be merged back in to the version managed product code repository. The details of the ticket will be recorded against the software component changed in the repository. All changes will be supported by an appropriate documentation pack, which will include release notes detailing fixed tickets, completed test plans and, where appropriate, updates to any process and support documentation, User Guides and training materials. Part L Service Management 1 BT operates an existing large scale operational service and believes that the complexity of the SMKI programme demands absolute adherence, by all service components providers, to a common Service Management protocol. 2 The ITIL framework is an ideal basis upon which to design and implement an integrated service model. BT underpins all new service provision with the ITIL best practice. Success in terms of SMKI delivery schedule and in-life operations will be determined by a coherent and binding strategy by all DCC providers across the entire service life-cycle. 3 The BT Service Manager would be responsible for working with the DCC Service Manager s during live operations to deliver the service metrics outlined in B8/SoR Appendix C for the DCC and its stakeholders. 4 Service Management - risks and mitigation The key risks to effective Service Management for the SMKI programme need to be addressed at Service Strategy stage. It would arise from a fragmented approach to service provision by SMIP service providers with the big picture out of focus or misaligned to the desired SMIP business outcomes. The consequences of such an approach include; Service providers adopting a silo mentality towards service delivery. Functional IT delivery askew with Service delivery Communication channels are evoked in reaction to problems only. Service analytics are incoherent, incomplete and as a result incredulous. V1.1 26

27 To mitigate this risk the DSP, the CSP and SMKI suppliers must collaborate with Smart DCC in design and development of the service. It is imperative that this commence at the start of the PIT Phase. BT would recommend that DCC appoint Service Champions from each of the providers who would consult and cooperate as a forum. At the Service Strategy stage of the service life-cycle the forum would liaise with service user representatives to agree and define the service. This definition would be the basis of the Service Level Agreement (SLA) between Smart DCC and the suppliers. The forum would also determine and obtain business/financial approval for service provision. Following Service definition, the Service Champion forum would develop and publish clear and unambiguous Service stratagem to their respective Service Design teams. These teams will develop the Operational Level Agreements (OLA) that underpin and cost in with the SLA. Ineffectual or non-existent management during Service Transition phase is the primary cause of system and consequential business failure. The Service Champion forum would provide the core of the Change Approval Board (CAB) and ensure scope, risk and business benefits for all changes were aligned. The Service Champion forum would retain its role in maintaining service awareness throughout the Service Operations. Quality information shared between service suppliers is the critical life-blood of the SMIP service. A common service data portal is important but the establishment of business relationships should be given strategic priority as well. Regular operations forums are one means to this end. As key drivers for Service Improvement initiatives, the Service Champion forum should determine the data that provides the best measure of service success and weakness. BT/Symantec recognises that this project is a complex large scale programme with high profile. V1.1 27

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

SMKI Recovery Procedure

SMKI Recovery Procedure SMKI Recovery Procedure Consultation open: 1 July 2015 Consultation closes: 29 July 2015 DCC Public Page 1 of 55 Contents 1 Introduction... 3 1.1 Purpose & Interpretation...3 1.2 Scope...3 2 Overview of

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)

Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version) Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History

More information

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)

Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version) Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature

More information

We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions

We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions We released this document in response to a Freedom of Information request. Over time it may become out of date. Department for Work and Pensions SCHEDULE 2 SERVICES 1 Purpose of this Schedule 1.1 This

More information

Security and Security Certificates for OpenADR systems. Background. Content:

Security and Security Certificates for OpenADR systems. Background. Content: Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting

More information

SMKI Recovery Procedure

SMKI Recovery Procedure - file formats Consultation opens: 23 September 2015 Consultation closes: 7 October 2015 Version: v1.0 Date: 23 September 2015 Author: Classification: Jonathan Jennings, Andy Barraclough DCC Public Document

More information

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc. Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF

Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF Data Communications Company 2 nd Floor, Ludgate House 245 Blackfriars Road London, SE1 9UF 6th Floor Dean Bradley House 52 Horseferry Road London SW1P 2AF T +44 (0)20 7706 5100 F +44 (0)20 7706 5101 info@energynetworks.org

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business.

White Paper: AlfaPeople ITSM 2013. This whitepaper discusses how ITIL 3.0 can benefit your business. White Paper: AlfaPeople ITSM 2013 This whitepaper discusses how ITIL 3.0 can benefit your business. Executive Summary Imagine trying to run a manufacturing business without a comprehensive and detailed

More information

REPORT 2014/001 INTERNAL AUDIT DIVISION. Audit of information and communications technology help desk operations at United Nations Headquarters

REPORT 2014/001 INTERNAL AUDIT DIVISION. Audit of information and communications technology help desk operations at United Nations Headquarters INTERNAL AUDIT DIVISION REPORT 2014/001 Audit of information and communications technology help desk operations at United Nations Headquarters Overall results relating to the adequacy and effectiveness

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Guidance document for EMIS Web EPS Release 2 deployment

Guidance document for EMIS Web EPS Release 2 deployment Guidance document for EMIS Web EPS Release 2 deployment Crown Copyright 2011 Contents Guidance document for EMIS Web EPS Release 2 deployment... 1 1 Introduction... 4 1.1 Background... 4 1.2 Purpose...

More information

Auxilion Service Desk as a Service. Service Desk as a Service. Date January 2015. www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1

Auxilion Service Desk as a Service. Service Desk as a Service. Date January 2015. www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 Title Service Desk as a Service Date January 2015 www.auxilion.com Commercial in Confidence Auxilion 2015 Page 1 1. Disclaimer All information contained in this document is provided in confidence to the

More information

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4

More information

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4 3.2 Service description...

More information

ITIL Roles Descriptions

ITIL Roles Descriptions ITIL Roles s Role Process Liaison Incident Analyst Operations Assurance Analyst Infrastructure Solution Architect Problem Manager Problem Owner Change Manager Change Owner CAB Member Release Analyst Test

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Customer Relationship Management Software Package G-Cloud Service Definition

Customer Relationship Management Software Package G-Cloud Service Definition Customer Relationship Management Software Package G-Cloud Service Definition 2014 General Dynamics Information Technology. All rights reserved 1 Delivering consistent multi-channel (telephony, e-mail,

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management

More information

Service Description. 3SKey. Connectivity

Service Description. 3SKey. Connectivity Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey

More information

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination

ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT. Guidelines for candidates who are taking the ICT Infrastructure Examination ISEB MANAGER S CERTIFICATE IN ITIL INFRASTRUCTURE MANAGEMENT Guidelines for candidates who are taking the ICT Infrastructure Examination This qualification is based on ITIL Infrastructure Management as

More information

White Paper. Simplify SSL Certificate Management Across the Enterprise

White Paper. Simplify SSL Certificate Management Across the Enterprise WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

IT Organisation in Change

IT Organisation in Change IT Organisation in Change ENTERPRISE SOFTWARE ENGINEERING & SOFTWARE ENGINEERING IN THE ENTERPRISE IT change Quality of IT s Costs of IT s change Future Now Perfect IT s Business Demands Can we deliver?

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Business Continuity Management Framework 2014 2017

Business Continuity Management Framework 2014 2017 Business Continuity Management Framework 2014 2017 Blackpool Council Business Continuity Framework V3.0 Page 1 of 13 CONTENTS 1.0 Forward 03 2.0 Administration 04 3.0 Policy 05 4.0 Business Continuity

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Incident Management Policy

Incident Management Policy Incident Management Policy Draft SEC Subsidiary Document DCC Public 01 July 2015 BASELINED VERSION 1 DEFINITIONS Term Black Start CPNI Code of Connection Crisis Management Disaster HMG Incident Party Interested

More information

Response to NAF Consulting Paper

Response to NAF Consulting Paper Response to NAF Consulting Paper Author: Tan Chuan Jin Email: chuanjin.tan@atosorigin.com Yeo Chien Jen Email: chienjen.yeo@atosorigin.com Version: 1.3 Document date: 21 September 2008 All rights reserved.

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Simplify SSL Certificate Management Across the Enterprise

Simplify SSL Certificate Management Across the Enterprise WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and

More information

SCHEDULE 2. Core It Services SOR

SCHEDULE 2. Core It Services SOR SCHEDULE 2 Core It Services SOR The Agreement V5.0 - In Confidence - Page 1 of 46 Table of Contents 1 Appendices... 4 2 Introduction to the Statement of Requirements... 5 2.1 Introduction... 5 2.2 TfL

More information

Certificate Management

Certificate Management Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

Securing Microsoft Exchange 2010 with Symantec SSL Certificates

Securing Microsoft Exchange 2010 with Symantec SSL Certificates BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH SYMANTEC SSL CERTIFICATES Symantec Business Guide Securing Microsoft Exchange 2010 with Symantec SSL Certificates Best Practices for Securing Your

More information

Securing Your Software for the Mobile Application Market

Securing Your Software for the Mobile Application Market WHITE PAPER: SECURING YOUR SOFTWARE FOR THE MOBILE APPLICATION MARKET White Paper Securing Your Software for the Mobile Application Market The Latest Code Signing Technology Securing Your Software for

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

How To Issue A Certificate On A Cablelabs Device (Cablelabs) To A Certificate Request Agent (Cra)

How To Issue A Certificate On A Cablelabs Device (Cablelabs) To A Certificate Request Agent (Cra) CableLabs Certificate Issuance Process Notice This document is furnished by Cable Television Laboratories, Inc. (CableLabs) in an AS IS basis. CableLabs does not provide any representation or warranty,

More information

Outsourcing BI Maintenance Services Version 3.0 January 2006. With SourceCode Inc.

Outsourcing BI Maintenance Services Version 3.0 January 2006. With SourceCode Inc. Outsourcing BI Maintenance Services With Inc. An Overview Outsourcing BI Maintenance Services Version 3.0 January 2006 With Inc. Version 3.0 May 2006 2006 by, Inc. 1 Table of Contents 1 INTRODUCTION...

More information

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy Version: 1.0 Issued: August 2014 Status: Final PEXA Certification Authority Certificate Profile 1. Introduction Property

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

SaaS Adoption Lifecycle in Life-Sciences Companies

SaaS Adoption Lifecycle in Life-Sciences Companies www.arisglobal.com A White Paper Presented By ArisGlobal SaaS Adoption Lifecycle in Life-Sciences Companies by Achal Verma, Associate Director - Program Delivery, Cloud Services Abstract With increasing

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0 ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key

More information

<workers> Online Claims and Injury Management

<workers> Online Claims and Injury Management Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.

Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface. iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Securing Microsoft Exchange 2010 With VeriSign Authentication Services

Securing Microsoft Exchange 2010 With VeriSign Authentication Services BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for

More information

ICT Strategy 2 0 1 4-2 0 1 6

ICT Strategy 2 0 1 4-2 0 1 6 2 0 1 4-2 0 1 6 Document revision history Date Version Revision Comment Author / Editor 0 1 Initial draft Gregory Peacock 04/07/2014 0 2 General revision Alan Hough 10/7/2014 0 3 Minor additions Gregory

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

SOLUTION WHITE PAPER. Remedyforce Powerful Platform

SOLUTION WHITE PAPER. Remedyforce Powerful Platform SOLUTION WHITE PAPER Remedyforce Powerful Platform INTRODUCTION Any type of service desk needs a powerful technology platform to support their customers. However, several challenges arise when attempting

More information

ITIL: What is it? How does ITIL link to COBIT and ISO 17799?

ITIL: What is it? How does ITIL link to COBIT and ISO 17799? ITIL: What is it? How does ITIL link to COBIT and ISO 17799? 1 What is ITIL? The IT Infrastructure Library A set of books comprising an IT service management Best Practices framework An industry of products,

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Risk & Hazard Management

Risk & Hazard Management Rivo Software Solution Layer provides a rapidly deployable complete set of hazard and risk management functionality from any device, accessible from anywhere through our highly secure cloud platform. Identify,

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4 GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3)

PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) PORTFOLIO, PROGRAMME & PROJECT MANAGEMENT MATURITY MODEL (P3M3) 1st February 2006 Version 1.0 1 P3M3 Version 1.0 The OGC logo is a Registered Trade Mark of the Office of Government Commerce This is a Value

More information

Certificate Policy. SWIFT Qualified Certificates SWIFT

Certificate Policy. SWIFT Qualified Certificates SWIFT SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

Annex 9: Technical proposal template. Table of contents

Annex 9: Technical proposal template. Table of contents UNFCCC/CCNUCC Page 1 Annex 9: Technical proposal template Table of contents Annex 9... 3 9.1 Technical proposal... 3 9.1.1 Vendor s name... 3 9.2 Engagement model... 3 9.2.1 Type of engagement... 3 9.2.2

More information

Incident Reporting & Management

Incident Reporting & Management Rivo Software Solution Layer allows you to report and manage incidents such as injuries, accidents and theft. With powerful capabilities including analytical trending you can make better decisions to reduce

More information

Document Version. January 2013

Document Version. January 2013 Service and Technical Description Vendor Access Network Providers (VAN) January 2013 Contents Vendor Access Network Providers (VAN)... 1 Contents... 2 Document Version... 3 1. Introduction... 4 1.1. Purpose

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Action/Task Management

Action/Task Management Rivo can be used independently of any other Solution Layer, or indeed fully integrated into other solution layers such as Audit & Inspection Management, Risk & Hazard Management, Environmental Monitoring

More information

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services

Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Specialist Cloud Services Lot 4 Cloud Printing and Imaging Consultancy Services Page 1 1 Contents 1 Contents... 2 2 Transcend360 Introduction... 3 3 Service overview... 4 3.1 Service introduction... 4

More information

Does your Organization Need a Managed SSL Service?

Does your Organization Need a Managed SSL Service? MSSL Order Guide 1 Ordering Guide for Managed SSL -Product Overview -Ordering Process -Managing your Account Overview of Managed SSL (MSSL) MSSL allows you to manage the complete lifecycle of multiple

More information

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com

An example ITIL -based model for effective Service Integration and Management. Kevin Holland. AXELOS.com An example ITIL -based model for effective Service Integration and Management Kevin Holland AXELOS.com White Paper April 2015 Contents Introduction to Service Integration and Management 4 An example SIAM

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

Managing SSL Security in Multi-Server Environments

Managing SSL Security in Multi-Server Environments Managing SSL Security in Multi-Server Environments VeriSign s Easy-to-Use Web-Based Services Speed SSL Certificate Management and Cuts Total Cost of Security CONTENTS + A Smart Strategy for Managing SSL

More information

Certificate technology on Pulse Secure Access

Certificate technology on Pulse Secure Access Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA

More information