DNSSEC Practice Statement for the IE cctld
|
|
|
- Winifred Johnson
- 10 years ago
- Views:
Transcription
1 IE Domain Registry Ltd DNSSEC Practice Statement for the IE cctld Version: 1.0 Date: 29 th November
2 Document Control Document Information and Security CONDUCTED BY RESPONSIBLE FOR FACTS RESPONSIBLE FOR DOCUMENT Security Officer Security Officer Security Officer SECURITY CLASSIFICATION Open FILE NAME IEDR-DPS-v1.0 AUTHOR Billy Glynn POSITION Security Officer Approved By DATE NAME FUNCTION 29 th October 2014 David Curtin CEO 29 th October 2014 Michael Begley Technical Services Manager Audits DATE VERSION NAME DESCRIPTION 29 th Oct 2014 v1.0 Billy Glynn Policy and Practice Statement (DPS) 2
3 Contents 1. INTRODUCTION Overview Document name and identification Community and applicability IE cctld Registry IE Registrars IE Registrants Relying Party Specification administration Specification administration organization Contact information Specification change procedures PUBLICATION AND REPOSITORIES Repositories Publication of public keys OPERATIONAL REQUIREMENTS Meaning of domain names Identification and authentication of child zone manager Registration of delegation signer (DS) resource records Method to prove possession of private key Removal of DS resource records Who can request removal Procedure for removal request Emergency removal request FACILITY, MANAGEMENT AND OPERATIONAL CONTROLS Physical controls Site location and construction Physical access Power and air conditioning Water exposures Fire prevention and protection Media storage Waste disposal
4 Off-site backup Procedural controls Trusted roles Number of persons required per task Identification and authentication for each role Tasks requiring separation of duties Personnel controls Qualifications, experience, and clearance requirements Background check procedures Training requirements Job rotation frequency and sequence Sanctions for unauthorized actions Contracting personnel requirements Documentation supplied to personnel Audit logging procedures Types of events recorded Frequency of processing log Retention period for audit log information Protection of audit log Audit log backup procedures Audit collection system Vulnerability assessments Compromise and disaster recovery Incident and compromise handling procedures Corrupted computing resources, software, and/or data Entity private key compromise procedures Business continuity and IT disaster recovery capabilities Entity termination TECHNICAL SECURITY CONTROLS Key pair generation and installation Key pair generation Public key delivery Public key parameters generation and quality checking Key usage purposes
5 5.2. Private key protection and cryptographic module engineering controls Cryptographic module standards and controls Private key (m-of-n) multi-person control Private key escrow Private key backup Private key storage on cryptographic module Private key archival Private key transfer into or from a cryptographic module Method of activating private key Method of deactivating private key Method of destroying private key Other aspects of key pair management Public key archival Key usage periods Activation data Activation data generation and installation Activation data protection Other aspects of activation data Computer security controls Network security controls Timestamping Life cycle technical controls System development controls Security management controls Life cycle security controls ZONE SIGNING Key lengths, key types and algorithms Authenticated denial of existence Signature format Key roll-over Signature life-time and re-signing frequency Verification of resource records Resource records time-to-live
6 7. COMPLIANCE AUDIT Frequency of entity compliance audit Identity/qualifications of auditor Auditor's relationship to audited party Topics covered by audit Actions taken as a result of deficiency Communication of results LEGAL MATTERS Fees Privacy of Personal Information Limitation of Liability
7 1. INTRODUCTION This document is the DNSSEC Practice Statement (DPS) for the IE zone. It states the practices and provisions that are in use in by IEDR in providing DNSSEC signing for the IE cctld zone Overview The Domain Name System (DNS) Internet Protocol was originally designed with virtually no security in its specifications. DNS has several distinct classes of vulnerabilities which may be exploited. These DNS vulnerabilities provide a real and present danger to Internet security and have the potential to erode consumer confidence in transacting online or lead to serious financial losses. Domain Name System Security Extensions (DNSSEC) is a set of Internet Engineering Task Force (IETF) standards that provides data origin authentication and data integrity verification to the DNS, through the use of public key cryptographic signatures. Public key cryptography uses asymmetric key algorithms of mathematically related key pairs in the form of a private key and a published public key. The combination of the key pair enables the verification of the authenticity of a DNS message through the creation of a digital signature of the DNS data, using the secure private key. This signature can in turn be verified by a recipient security aware resolver, using the already published public key from the pair. This DPS is specifically applicable to all DNSSEC related operations performed by IEDR for the IE zone Document name and identification Document Title: DNSSEC Practice Statement for the IE cctld Document Filename: IEDR-DPS_v1.0.pdf Document Version: 1.0 Document Last Updated: Document URL: 7
8 1.3. Community and applicability IE cctld Registry The IEDR is the registry for IE Internet Domain Names and maintains the database of IE registered Internet names. The IEDR is an independent not-for-profit organisation that manages the IE country code Top Level Domain (cctld) namespace in the public interest of the Irish and global Internet communities. The IE Domain Registry Limited is not a governing or regulatory body, but provides a public service for the IE namespace on behalf of the Internet community, and is defined as a public company under the Irish Companies Acts. The IEDR is responsible for generating cryptographic key material, for protecting the confidentiality of the private component of key material and for publishing the public component of relevant key pairs for use as DNSSEC trust anchors. IEDR is responsible for signing the IE DNS zone file using DNSSEC IE Registrars Accredited IE Registrars are companies, organisations or individuals who have demonstrated the knowledge, experience and the expertise in managing IE domains as agents of registrants. IE Registrars are responsible for requesting changes in the IE registry on behalf of IE Registrants. IE Registrars are responsible for the secure identification and transmission of IE Registrant DNS and DNSSEC information to the IE Registry such that the IE Registry can apply the requisite changes to its database. In the context of DNSSEC, such information would be of the form of Delegation Signer (DS) resource records for a given domain IE Registrants IE Registrants are any party that has an Internet domain name ending in IE registered. IE Registrants are responsible for generating, protecting and maintaining their own DNSSEC key material. However, they may entrust an IE Registrar to provide such services on their behalf. IE Registrants are responsible for ensuring that their DNSSEC keys are managed in an appropriate manner and to perform key rollover when the keys are suspected to be compromised or have been lost Relying Party A relying party is the entity that makes use of DNSSEC signatures such as DNSSEC validator s and other DNSSEC enabled applications. The relying party is responsible for maintaining appropriate trust anchors. Relying parties must not use IE DNSKEYs as their secure entry point in to the IE zone. Moreover, relying trust parties must ensure that they use the root zone anchor as their secure entry point in to the DNSSEC chain of trust for IE. 8
9 1.4. Specification administration Specification administration organization IE Domain Registry Ltd 4 th Floor Harbour Square Crofton Road Dun Laoghaire Co. Dublin Ireland Registered No: VAT No: IE V Contact information Telephone: (lines open 9am 5:30pm) [email protected] Specification change procedures IEDR reserves the right to change, amend or revoke this DPS without prior notice. Material changes will be announced on the IEDR website. IEDR will provide reasonable notice of significant changes. Only the most recent version of this DPS is applicable. 2. PUBLICATION AND REPOSITORIES Information relating to DNSSEC in the IE cctld will be published at: Repositories Information relating to DNSSEC in the IE cctld is published at: Publication of public keys 9
10 A cryptographic hash of the public component of the IE KSK will be published in the root zone. 3. OPERATIONAL REQUIREMENTS 3.1. Meaning of domain names A domain name is a unique identifier in the DNS as described in RFC1024 and RFC1035. An IE domain name is a unique name that is registered in the IE cctld and delegated in the IE cctld zone Identification and authentication of child zone manager IEDR as the operator of the IE cctld manage the registry database and zone for all IE second level domain (SLDs) names. All SLDs holders contact details and credentials (or their agents) are maintained by IEDR to enable secure electronic communication and processing of change requests Registration of delegation signer (DS) resource records IEDR accepts DS records for SLDs through secure communication channels. Those DS records are submitted by Registrants or Registrars on behalf of Registrants. DS records are validated against the SLD zone DNSKEY KSK resource record. This validation forms part of IEDR pre-registration premodification checks. The acceptance of a DS record for a SLD activates DNSSEC for that domain as of the next IE zone reload Method to prove possession of private key Registrants are not required to prove possession of private keys Removal of DS resource records Who can request removal The removal of a DS resource record can be requested by a registrant or their registrar Procedure for removal request The removal request of a DS resource record is received, validated and processed as per any other name server or glue removal request Emergency removal request 10
11 There is no provision for a registrant to be able to make an emergency removal request of a DS resource record from the IE zone. All DS record removals must be processed through standard IE Registrar/Registrant channels using standard procedures. 4. FACILITY, MANAGEMENT AND OPERATIONAL CONTROLS 4.1. Physical controls Site location and construction IEDR has two operational and geographically dispersed data centres. The two sites serve as a backup to each other. The state-of-the-art operational centre facility provides IEDR with a dedicated, fully redundant environment for its mission critical equipment, providing the highest degree of protection and power. IEDR data centre operator s business processes are ISO 9001:2008 certified and it holds the ISO Information Security certification Physical access The IEDR's Primary Data Centre facility is a Tier IV class facility which employs industry standard mechanisms to restrict access to the various levels of the facility. Biometric access control system Motion sensitive CCTV cameras using the latest IP technology Business Park 24 x 7 external security Full control on private premises Data centre 24 x 7 manned security Security footage available for customer viewing upon request Multiple state-of-the-art security technologies to complement the above Power and air conditioning Every element of the electrical infrastructure is in place to a minimum of N+1 with N+2 being standard in many core areas. Power density is 1kw per sq.m and 1.2kw per sq.m respectively. There are multiple redundant generators that can deliver unlimited power to satisfy each sites requirements. In addition, fully redundant power feeds (A & B) to each client's cabinet(s) with a delivery of 32 individual power outlets per cabinet are totally metered. Each of these feeds is fed direct from totally independent Power Distribution Units (PDU s), Uninterruptible Power Supplies (USP s), Generators and Transformers Water exposures IEDR has taken reasonable precautions to minimize the impact of water exposure to our systems. 11
12 Fire prevention and protection Optical and ionisation sensors are fitted to the ceiling void and to the floor. Very Early Smoke Detection Appliance (VESDA) detects smoke levels over 1ppm, broken down by zone. Fire suppression systems use low-pressure inert gases, which do not harm people or equipment. In addition, exhaust hoses are built into ceilings and floors and have sufficient capacity to fill the room twice Media storage Media containing production software, as well as media containing data, audit, archive and backup information is stored within the main IEDR facility and in a secure off-site storage facility with appropriate physical and logical access controls designed to limit access to authorised personnel Waste disposal All information-carrying media which may contain sensitive information are destroyed in a secure manner, either by IEDR or by a contracted party Off-site backup IEDR regularly and routinely replicate backups of critical data, audit data and other sensitive information to a backup facility. That facility has multiple-tiers of physical access control and is geographically and administratively separate from IEDR s other facilities Procedural controls Trusted roles IEDR have four trusted roles in the context of DNSSEC, namely: 1. System Administrator (SA). 2. Security Officer (SO). 3. Auditor (AU). 4. Safe Keeper (SK). All roles are tightly bound to the IEDR hierarchy. The Security Officer (SO) role is performed by a member of the IEDR management team. The Auditor (AU) role is performed by an employee that is appointed by the IEDR management team. The Safe Keeper (SK) role is the CEO, or someone delegated by the CEO. No one person can occupy more than one role Number of persons required per task 12
13 DNSSEC related tasks include HSM activation, HSM operations and key operations. IEDR apply the m of n rule which mandates that a minimum of m people from each role are required from the set of n persons defined in each role Identification and authentication for each role Only IEDR staff members may be assigned to a role. Role assignees are identified to another trusted person prior to logical access Tasks requiring separation of duties Physical access to the safe and HSM operations requires one person from each trusted role Personnel controls Qualifications, experience, and clearance requirements All IEDR personnel participating in the operation of IE DNSSEC systems have a demonstrable proficiency in their assigned role and where necessary have undergone training Background check procedures IEDR routinely validate job references and interview past employers upon recruitment of new employees Training requirements IEDR routinely provides employees with on-the-job training upon recruitment and on an on-going basis. Such training ensures that employees can carry out DNSSEC procedures, processes and administration competently and appropriately Job rotation frequency and sequence All personnel assigned trusted roles will be exercised in their roles by rotation to ensure that all personnel have practical experience of that role Sanctions for unauthorized actions IEDR would immediately suspend the credentials of any person suspected of unauthorised actions beyond their role. That suspension of credentials would be promptly followed by an investigation. 13
14 Contracting personnel requirements All contracted personnel would be subject to the same requirements as IEDR employees Documentation supplied to personnel IEDR DNSSEC operations and practices are documented in Standard Operating Procedures (SOPs). Those procedures are supplied to personnel assigned to a DNSSEC role Audit logging procedures Types of events recorded IEDR manually or automatically record events in logs which may include, but are not limited to: Safe access. HSM events. Key management events. Physical access to facilities. Successful and unsuccessful remote access Frequency of processing log Logging events are continuously monitored and recorded Retention period for audit log information IEDR retain audit log information for as long as necessary to fulfil the audit requirements as set out in section 7 of this document Protection of audit log All audit log data are stored securely to protect against unauthorised access or manipulation Audit log backup procedures All electronic log information is backed up daily. All IEDR log information is stored securely for seven years. All manual logging information is scanned and stored electronically after completion of each auditable DNSSEC task. Physical logs are stored permanently in a fire-proof safe. 14
15 Audit collection system Electronic log information is transferred in real-time to the dedicated log collection system. Manual log information is scanned and stored electronically after completion of each auditable DNSSEC task. The physical logs are stored permanently in a fire-proof safe Vulnerability assessments Every anomaly detected during a DNSSEC task is recorded and requires further analysis and investigation. IEDR continuously monitors and evaluates information sources relating to DNSSEC and DNS vulnerability reports from vendors and community groups, and collaborates with other TLD operators in evaluating the domain name system environment. In addition, all systems are monitored on a 24/7 basis for disruptions and unexpected events Compromise and disaster recovery Incident and compromise handling procedures All actual and suspected events that impact on any IEDR services are investigated to ascertain a root cause. IEDR has standard operating procedures for; investigation of incidents, remedying actions, communication and reporting to stakeholders and actions to prevent the reoccurrence of such incidents Corrupted computing resources, software, and/or data IEDR s zone generation and signing system implements automatic controls which is designed to ensure that invalid, incomplete or otherwise corrupted data will never be published to the authoritative slave servers. The system is designed to halt operations and to alert the administrators to investigate the anomaly and optionally switch to the fail-over facility. In any case where corrupted computing resources, software, and/or data causes, or could have caused a disruption of operations which could/would not be recovered from using the normal failover procedures, that event will be viewed upon as an incident, and the incident handling procedures will be activated Entity private key compromise procedures If there is suspicion that a key has been compromised IEDR would enact standard operating procedures that include emergency key rollover where a new ZSK or KSK will be generated and the old key will be removed from the key set as soon as its signatures have expired or timed out Business continuity and IT disaster recovery capabilities 15
16 IEDR maintain an extremely high level of availability, security and resilience, which incorporates several levels of firewall, high-availability network architecture and systems, as well as an alwaysready disaster recovery and business continuity plan (tested biannually). Further to this is the strong philosophy of external audit and review by third parties on a regular basis Entity termination If the Registry must discontinue DNSSEC for the IE zone for any reason and return to an unsigned position, this will take place in an orderly manner in which the general public will be informed. If operations are to be transferred to another party, the Registry will participate in the transition so as to make it as smooth as possible. 5. TECHNICAL SECURITY CONTROLS 5.1. Key pair generation and installation Key pair generation Key generation takes place in a hardware security module (HSM) that meets the FIPS Level 3 certification. Key generation is planned and carried out by trained and specifically assigned personnel in trusted roles. Key generation takes place when necessary and must be performed by the SO, SA, AU and SK. These people are present during the entire operation. Key generation follows a standard operating procedure which includes logging, part of which is done electronically and part of which is done manually on paper by the AU Public key delivery The public component of the appropriate KSK is exported from the signing system and verified by the SO and SA. The SA is responsible for ensuring that the keys that are published are the same as those that were generated. The hash of the public key is delivered to IANA using the method mandated from time to time. No other publication of public keys will be made Public key parameters generation and quality checking Public key parameters are defined and controlled by IEDR s DNSSEC KASP (Key and Signing Policy). The public key parameters are validated during the automated zone signing and distribution process Key usage purposes The keys used for signing the IE zone will not be used for any other purpose, or outside of the signing system Private key protection and cryptographic module engineering controls 16
17 All cryptographic operations are performed in the hardware security module and no private keys are ever found unprotected outside HSM. Private Key material is not exportable from the HSMs Cryptographic module standards and controls IEDR uses hardware security modules (HSM's) validated to the requirements of FIPS level Private key (m-of-n) multi-person control IEDR has implemented standard operating procedures for the operations performed on private keys. M of n control is mandatory for private key operations Private key escrow Private keys are not escrowed Private key backup The IEDR key archive is encrypted and backed up on a clustered HSM. Backups of those HSMs are encrypted and stored in a fire-proof safe Private key storage on cryptographic module Private Key material is stored on a FIPS Level 3 HSM. The private component of the key pairs is not exportable from the HSM in an unencrypted manner. A HSM backup may be made to an encrypted token such that a HSM may be restored in the event of a disaster or when a cluster of HSMs is being setup Private key archival Private keys which have reached the expired state will be deleted and are not archived Private key transfer into or from a cryptographic module The private component of the key pairs is not exportable from the HSM in an unencrypted manner. A HSM backup may be made to an encrypted token such that a HSM may be restored in the event of a disaster or when a cluster of HSMs is being setup. IEDR has standard operating procedures for the restoration of a HSM Method of activating private key 17
18 An IEDR assigned SO may activate a private key. Activation is enabled by providing a valid SO PIN. Once the key is activated, the key is active for a defined time period as specified in the IEDR Key and Signing Policy (KASP) Method of deactivating private key HSMs are locked if the IE signing system is either turned off or rebooted Method of destroying private key Keys that have entered the expired state will be automatically removed from the key store at each site Other aspects of key pair management Public key archival Public keys are not archived after their operational period has expired Key usage periods When a key has been rolled over and superseded with a new key, it enters its expired state. A key moved into the expired state will never be re-used to sign resource records or for any other purpose Activation data Activation data generation and installation The HSM's are activated by the Security Officer, using individual passwords, selected by the SO Activation data protection Security Officers are required to memorise their respective activation data and to not expose or share it with others Other aspects of activation data The security module implements mechanisms to counter password guessing attacks Computer security controls All critical components of IEDR s systems are placed in the organizations secure facilities in accordance with 4.1. Access to the server s operating systems is limited to individuals that require 18
19 this for their work, meaning system administrators. All access is logged and is traceable at the individual level Network security controls IEDR s production servers are logically separated into security zones using filtering devices. Filters are configured according to the least-privilege principle allowing only the necessary communication paths to flow over the filtering device. During master key management operations, systems are always disconnected from any communications network Timestamping All systems synchronises time from a trusted internal source using NTP Life cycle technical controls System development controls All source code is stored in a version control system. The source code archive is regularly backed up and copies are stored separately in a fireproof safe Security management controls Configurations of all systems are centrally managed and revision controlled. The authenticity and integrity of software components are verified using digital signatures before being installed onto the server platform Life cycle security controls Critical software components are either sourced from suppliers using a procurement process, or based on open-source products. For each of these categories of products there is a Quality Assurance (QA) process which includes rigorous testing and continuous follow-up of any stability or security issues uncovered during the products life-cycle. 19
20 6. ZONE SIGNING 6.1. Key lengths, key types and algorithms Currently the IE KSK uses the RSA algorithm and has 2048 bit modulus (key length) while the ZSK also uses the RSA algorithm and has a 1024 bit modulus Authenticated denial of existence The IE zone is not publicly available. As such, zone enumeration is ensured using the NSEC3 standard. Accordingly, authenticated denial of existence is attested using the SHA-1 algorithm Signature format The KSK signatures will be generated by encrypting SHA-256 hashes using RSA [RFC5702] Key roll-over The ZSK will be rolled over to a new key every 6 months. No standby keys are used. The KSK will be rolled over to a new key every 3 years or when required. No standby keys are used, and the roll-over process will not take into account the timings specified in [RFC5011] Signature life-time and re-signing frequency Signatures will have 14 days validity, with 1 hour inception and 1 hour of jitter applied to the signature life-time. Resigning takes place during every rebuild which occur daily at every other odd UTC hour Verification of resource records IEDR verifies that all resource records are valid in accordance with the current standards prior to delegation Resource records time-to-live These values are determined by the IEDR DNSSEC key and signing policy (KASP). The DNSKEY TTL is 3,600, the SOA is 172,800. The DS TTL is 3,600 and the NSEC3 TTL is 86,400. The RRSIG inherits the TTL from the resource record that it signs. 20
21 7. COMPLIANCE AUDIT Before the end of 2012, IEDR intend to select and procure an appropriate DNSSEC consultancy expert to conduct a compliancy audit review of the IE DNSSEC infrastructure and the statements made in this DPS document. The subsections of section 7 cannot be filled out until that process has been completed. This document will be revised in due course when IEDR have selected such an auditor. Any update to this document will be made via the channels outlined earlier in this document Frequency of entity compliance audit [To Be Determined] 7.2. Identity/qualifications of auditor [To Be Determined] 7.3. Auditor's relationship to audited party [To Be Determined] 7.4. Topics covered by audit [To Be Determined] 7.5. Actions taken as a result of deficiency [To Be Determined] 7.6. Communication of results [To Be Determined] 21
22 8. LEGAL MATTERS 8.1. Fees IEDR do not charge any fees for the provision of DNSSEC services Privacy of Personal Information The IEDR Privacy Statement is available here Limitation of Liability DNSSEC registrations are subject to the IEDR s normal terms and conditions and DNSSEC registrants that use DNSSEC services are obliged to enter into an Agreement with the IEDR. The agreement contains clauses in relation to limitation of liability as follows:- a) Nothing in the Agreement shall be taken to exclude or limit IEDR s liability for death or personal injury caused by its negligence under applicable law. b) IEDR limits its liability for physical damage to tangible property caused by its negligence to the sum of 25,000 for any event or series of connected events. Damage to or loss of data shall not constitute physical damage to tangible property. c) Subject to a) above, all representations, terms, conditions and all warranties whether express or implied by statute, law or otherwise including under s 39 of the Sale of Goods and Supply of Services Act 1980, relating to the provision of the Services and the operation of the IEDR systems and the data in them are excluded to the maximum extent permissible by law; d) IEDR will not be liable to the DNSSEC Registrant whether under contract law, tort or under statute arising from any breach by IEDR of the provisions of this Agreement including without limitation breach in relation to the provision of the DNSSEC Services, for: di) indirect or consequential loss; dii) any loss of profit, revenue, loss of business or contracts; or loss of expected savings or goodwill; diii) any mistake or missing information in the register; div) any loss of registration or use of a domain name, or both dv) or default by IEDR in registration or renewal (for whatever reason and whether temporary or otherwise), of the domain name; or dvi) any; error concerning identity of a registrant; or dvii) technical problems or faults with the Site or inability to access the Site; or dviii) third party claims in respect of a domain name; or dix) acts or omissions of the Registrar regarding the application, registration or renewal of domain names which may result in the non-registration or deletion of a domain name. 22
23 e) IEDR exclude any liability whatsoever to the Registrar and any DNSSEC Registrant to whom the Registrar provides services to, as a result of any failure or inaccuracy, delay or error in the operation of the IEDR Site, systems or the information in them. f) IEDR s liability to the Registrar under this Agreement for any direct loss or damage in any 365 day period or part thereof for any breach or series of breaches whether or not connected to this Statement, shall be limited to an amount corresponding to the fees IEDR received from the Registrar in that period or 5,000 Euro whichever is lower. g) The DNSSEC Registrant shall indemnify and keep IEDR indemnified in full on demand against any claim (and the resulting costs, including legal fees, loss or expense) originating from the use or registration of a domain name that infringes the rights of a third party. This Agreement shall be governed by the laws of the Republic of Ireland. 23
DNSSEC Policy Statement Version 1.1.0. 1. Introduction. 1.1. Overview. 1.2. Document Name and Identification. 1.3. Community and Applicability
DNSSEC Policy Statement Version 1.1.0 This DNSSEC Practice Statement (DPS) conforms to the template included in RFC 6841. 1. Introduction The approach described here is modelled closely on the corresponding
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
KSRegistry DNSSEC Policy Statement
KSRegistry DNSSEC Policy Statement 1. INTRODUCTION...5 1.1 Overview...5 1.2 Document name and identification...5 1.3. Community and Applicability...5 1.3.1 Registry...5 1.3.2 Registrars...5 1.3.3 Registrants...6
DNSSEC Practice Statement (DPS)
DNSSEC Practice Statement (DPS) 1. Introduction This document, "DNSSEC Practice Statement ( the DPS ) for the zones under management of Zodiac Registry Limited, states ideas of policies and practices with
Verisign DNSSEC Practice Statement for EDU Zone
Verisign DNSSEC Practice Statement for EDU Zone Version 1.4 Effective Date: November 11, 2013 Abstract This document is the DNSSEC Practice Statement for the EDU Zone. It states the practices and provisions
Verisign DNSSEC Practice Statement for TLD/GTLD Zone
Verisign DNSSEC Practice Statement for TLD/GTLD Zone Version 1.0 Effective Date: July 28, 2011 Abstract This document is the DNSSEC Practice Statement for the TLD/GTLD Zone. It states the practices and
DNSSEC Practice Statement.OVH
DPS.OVH 11/06/2013 1 DNSSEC Practice Statement.OVH Registry domain signature policy and conditions of implementation (Version 02 11/06/2013) DPS.OVH 11/06/2013 2 Document management Document identification
This framework is documented under NLnet Labs copyright and is licensed under a Creative Commons Attribution 4.0 International License.
DNSSEC Infrastructure Audit Framework NLnet Labs Document 2013-002 Version 1.0 by Matthijs Mekking ([email protected]) and Olaf Kolkman ([email protected]) This framework is documented under NLnet
DNSSEC Root Zone. High Level Technical Architecture
DNSSEC Root Zone Prepared by the Root DNSSEC Design Team Joe Abley David Blacka David Conrad Richard Lamb Matt Larson Fredrik Ljunggren David Knight Tomofumi Okubo Jakob Schlyter Version 1.2.1 October
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers
DNSSec Operation Manual for the.cz and 0.2.4.e164.arpa Registers version 1.9., valid since 1 January 2010 Introduction This material lays out operational rules that govern the work of the CZ.NIC association
Domain Name System Security Extensions (DNSSEC) Implementation Project. Request for Proposal
Domain Name System Security Extensions (DNSSEC) Implementation Project Request for Proposal Version 1.1 Date: 1 April 2015 Hong Kong Internet Registration Corporation Limited Unit 2002-2005, 20/F FWD Financial
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Certificate Policy. SWIFT Qualified Certificates SWIFT
SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT
CA Certificate Policy SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT This page is intentionally left blank. 2 ODETTE CA Certificate Policy Version Number Issue Date Changed By 1.0 1 st April 2009 Original
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Certification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
ARTL PKI. Certificate Policy PKI Disclosure Statement
ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed
Land Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation
TERMS & CONDITIONS of SERVICE for MSKnote Definitions: "Us or Our or We or Company" You or Your or Client Refers to MSKnote Limited Refers to you or your organisation Information about us: We are MSKnote
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
CLOUD SERVICE SCHEDULE
CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless
System Security. Your data security is always our top priority
Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
CMS Illinois Department of Central Management Services
CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF
Post.Trust Certificate Authority
Post.Trust Certificate Authority Certification Practice Statement CA Policy and Procedures Document Issue date: 03 April 2014 Version: 2.7.2.1 Release Contents DEFINITIONS... 6 LIST OF ABBREVIATIONS...
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Terms and Conditions.
Terms and Conditions. We ask that you read them through and keep a copy for your own records, just in case you need to refer back to them at any time. By ordering or using a Systems Integration (UK) Ltd.service
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
Vodafone Group CA Web Server Certificate Policy
Vodafone Group CA Web Server Certificate Policy Publication Date: 06/09/10 Copyright 2010 Vodafone Group Table of Contents Acknowledgments... 1 1. INTRODUCTION... 2 1.1 Overview... 3 1.2 Document Name
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.
CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.
CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012
TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE
TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information
DODO WEB HOSTING TERMS OF SERVICE
DODO WEB HOSTING TERMS OF SERVICE INDEX Dodo WEB HOSTING TERMS OF SERVICE 1. Definitions 1 2. General Terms of Service 1 3. The Service 1 4. Payment 2 5. Amending These Terms 2 6. Termination 2 7. Acceptable
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Ford Motor Company CA Certification Practice Statement
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Conditions of Supply of Internet Services
Conditions of Supply of Internet Services Terms and Conditions for domain name registrations Print this page. The Kirby Group Registration Agreement In this registration agreement ('Agreement'), the terms
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority Version 3.4 April 2015 Table of Contents 1.0 INTRODUCTION... 8 1.1 OVERVIEW... 8 1.2
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
3SECTION B SUPPLIES OR SERVICES AND PRICES/COSTS. This is a no cost, $0.00 time and material contract. B.2 COST/PRICE
3SECTION B SUPPLIES OR SERVICES AND PRICES/COSTS This is a no cost, $0.00 time and material contract. B.2 COST/PRICE The Contractor may not charge the United States Government to perform the requirements
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS 357-7 8. Risk Assessment 357-7
Information Technology Management Page 357-1 INFORMATION TECHNOLOGY MANAGEMENT CONTENTS CHAPTER A GENERAL 357-3 1. Introduction 357-3 2. Applicability 357-3 CHAPTER B SUPERVISION AND MANAGEMENT 357-4 3.
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
Gandi CA Certification Practice Statement
Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015
ING Public Key Infrastructure Certificate Practice Statement Version 5.3 - June 2015 Colophon Commissioned by Additional copies ING Corporate PKI Policy Approval Authority Additional copies of this document
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
TACC ROOT CA CERTIFICATE POLICY
TACC ROOT CA CERTIFICATE POLICY AND CERTIFICATE PRACTICES STATEMENT (In RFC 3647 format) January 20, 2009 OID: 1.3.6.1.4.1.17940.5.1.1.1 Version 1.2 1 INTRODUCTION... 3 1.1 Overview...3 1.2 Document Name
Government CA Government AA. Certification Practice Statement
PKI Belgium Government CA Government AA Certification Practice Statement 2.16.56.1.1.1.3 2.16.56.1.1.1.3.2 2.16.56.1.1.1.3.3 2.16.56.1.1.1.3.4 2.16.56.1.1.1.6 2.16.56.1.1.1.6.2 2.16.56.9.1.1.3 2.16.56.9.1.1.3.2
REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.
REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...
Fraunhofer Corporate PKI. Certification Practice Statement
Fraunhofer Corporate PKI Certification Practice Statement Version 1.1 Published in June 2012 Object Identifier of this Document: 1.3.6.1.4.1.778.80.3.2.1 Contact: Fraunhofer Competence Center PKI Fraunhofer
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
