Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5
|
|
|
- Mitchell Milo Wells
- 10 years ago
- Views:
Transcription
1 Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5
2 - 2 - Contents Rights...4 Preface...5 Introduction Overview and scope References Definitions and abbreviations Definitions Abbreviations Notation Concept CA CA services CP and CPS Purpose Degree of specification Differences Other CA conditions Subscribers and subjects Certificate policy and auditing General Identification Scope of application The CA's right to issue OCES certificates CA report System audit Obligations and liability CA obligations Subscriber obligations Information for verifiers (relying parties) Liability Requirements on CA practice Certification practice statement (CPS) Key management CA key generation CA key storage, backup and recovery CA public key distribution Key escrow CA key usage End of CA key lifecycle Management of cryptographic modules CA provided key management Certificate management Subscriber and subject registration Certificate and key renewal Certificate generation Dissemination of terms and conditions Certificate dissemination...32
3 Certificate revocation CA management and operation Security management Asset identification and classification Personnel security Physical security Management of the operation of IT systems and networks Management of access to systems, data and networks Development, procurement and maintenance of IT systems Emergency preparedness planning CA termination Compliance with legislation Recording of certificate information Organisational aspects Data centre location...40
4 - 4 - Rights The Danish National IT and Telecom Agency holds all rights to this certificate policy (CP), the OCES name and OCES-OID. Use of the OCES-OID term in certificates and the issue of OCES certificates are only permitted following written agreement with the National IT and Telecom Agency.
5 - 5 - Preface This certificate policy is a translation of the Danish version of the certificate policy issued and administered by the National IT and Telecom Agency in Denmark. In case of doubt as to the understanding and interpretation of the certificate policy, the original Danish version shall take precedence. The National IT and Telecom Agency is the public authority which authorises the issue of OCES employee certificates for the selected certification authorities (CAs), and which is in charge of the approval of the CAs in accordance with this CP. The National IT and Telecom Agency is also responsible for the content of this CP. The most recent version of this CP as well as earlier versions under which valid certificates are still in existence can be found at Please direct inquiries regarding digital signatures to the National IT and Telecom Agency. For further information, see
6 - 6 - Introduction A digital signature is an electronic signature that may be used in various situations, for instance when it is essential to know who you are communicating with electronically. The use of digital signatures presupposes that a public key infrastructure (PKI) has been established. OCES is such a public key infrastructure. OCES is short for "Offentlige Certifikater til Elektronisk Service" (Public Certificates for Electronic Services). The National IT and Telecom Agency has prepared four OCES certificate policies (CPs), applicable to personal, employee, company and functional certificates, respectively. The CPs constitute a common public standard regulating the issue and use of the digital OCES signature. Thus the CPs specify requirements for the public key infrastructure, and hence the level of security applicable to the digital signature. The digital signature can be used when a person has been identified and registered under a certification authority (CA). The CA grants the individual a personal electronic certificate containing this individual's public key. The CP specifies requirements as to how and under what conditions the CA will perform these tasks. This CP does not address qualified certificates issued pursuant to Act No. 417 of 31 May 2000 on Electronic Signatures.
7 - 7-1 Overview and scope This certificate policy (CP) describes the guidelines that apply to the issue of an OCES employee certificate, OCES being an abbreviation of "Offentlige Certifikater til Elektronisk Service" (Public Certificates for Electronic Services). This CP has been prepared on the basis of the guidelines given in ETSI TS v ( ). "Electronic signatures and infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates". The rules of the certificate policy regulating the CA's activities provide a high level of security that the subject has the identity indicated in the certificate. A certificate is only an OCES certificate if it has been issued according to an OCES CP, and has been issued by a certification authority (CA) approved by the National IT and Telecom Agency as an issuer of OCES employee certificates. As an element in the approval, a formal agreement is made between the CA and the National IT and Telecom Agency in which the CA undertakes to fulfil the requirements of this CP, including the requirement that the CA's handling of tasks should be audited, see also section 7.1. Thus the subscribers and verifiers (relying parties) may base their trust on the certificate policy, the National IT and Telecom Agency's approval of the CA, and the Agency's ongoing supervision of this. Certification authorities (CAs) entitled to issue certificates under this CP (OCES employee certificates) are published on the National IT and Telecom Agency's website:
8 - 8-2 References Act No. 417 of 31 May 2000: Lov om elektroniske signaturer (Act on Electronic Signatures) Act No. 429 of 31 May 2000: Lov om behandling af personoplysninger (Act on Processing of Personal Data) CEN Workshop Agreement :2002: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - part 2: Cryptographic Module for CSP Signing Operations - Protection Profile (MCSO-PP)" CWA :2003: "Security Requirements for Trustworthy Systems Managing Certificates for Electronic Signatures - Part 1: System Security Requirements" CWA :2004: "Cryptographic module for CSP signing operations with backup - Protection profile - CMCSOB PP" DS (Danish Standard) 2391:1995 "Registrering af identifikatorer i datanetværk" (Registration of identifiers in data networks), parts 1 and 3 DS (Danish Standard) 844: "Specifikation for kvalificerede certifikater" (Specification for qualified certificates) DS (Danish Standard) 471:1993: "Teknisk forebyggelse af indbrudskriminalitet" (Technical Prevention against Burglar Attack) DS (Danish Standard) 484:2005: "Dansk standard for Informationssikkerhed DS 484" (Code of practice for information security management) ETSI TS v ( ): "Electronic signatures and infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates" ETSI TS V2.0.0 ( ): "Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms" ETSI TS V1.2.1 ( ): "Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms for signature creation devices" ETSI TS v1.3.3 ( ): "Qualified Certificate profile" FIPS PUB (2001): "Security Requirements for Cryptographic Modules" ISO/IEC (parts 1 to 3) 2005: "Information technology - Security techniques - Evaluation criteria for IT security"
9 - 9 - ISO/IEC /ITU-T Recommendation X.509: "Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks" Requests for Comments: RFC 3039: Internet X.509 Public Key Infrastructure - Qualified Certificates Profile RFC 3280: Internet X.509 Public Key Infrastructure - Certificate and Certificate Revocation List (CRL) Profile RFC 5019: The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments In case of discrepancy between the references above and this CP, the provisions of this CP shall be applicable to the CA unless otherwise provided by law.
10 Definitions and abbreviations 3.1 Definitions This section contains definitions of specific terms used in this CP. Danish terms are given in parentheses. Activation Password: Code used for activating the signature when generating and installing keys. Password/personal password: A personal code kept secret by the subject and used by the subject when applying a digital signature. Authorised person: A person who, by a member of the company management authorised to sign for the company, has been appointed and accepted as the CA's contact person in the company, and who has been authorised to accept and submit certificate applications on behalf of the company and/or administer the company's certificates. Public key certificate/certificate (certifikat): An electronic certificate, which specifies the subscriber's public key together with additional information, and which unambiguously links the public key to the identification of the subscriber. A public key certificate must be signed by a certification authority (CA), which thus confirms the validity of the certificate. Subscriber (certifikatindehaver): A natural or legal person entering into an agreement with the issuing certification authority (CA) about issuing certificates to one or more subjects. Subject (certifikatholder): A natural person identified in the certificate as the right user of the private key associated with the public key given in the certificate, and to whom an OCES certificate is being or has been issued. Certification authority (CA) (certificeringscenter): A natural or legal person authorised to generate, issue and manage certificates 1. Certification practice statement (CPS) (certificeringspraksis): A specification of the principles and procedures which a CA employs in issuing certificates. Certificate policy (certifikatpolitik): A set of rules that indicates requirements for issuing and using a certificate in one or more specific contexts where common security requirements exist. 1 The term "key centre" is used for this entity in the Act on Electronic Signatures. However, the terminology has been changed for practical reasons. A certification authority corresponds to a key centre in the Act on Electronic Signatures apart from the fact that the certification authority does not issue qualified certificates, but OCES certificates.
11 Digital signature: Data in electronic form used for authenticating other electronic data attached to the digital signature or with which it is logically associated. One-time password: Code used for activating the signature when generating and installing keys. OTP device (OTP-enhed): Physical unit which is able to deliver one-time passwords to the user. OTP response code (OTP-engangskode): Response code delivered by the OTP. Private key (privat nøgle): The subject's key for applying a digital signature or for decrypting. The private key is personal and is kept secret by the subject. Key escrow (nøgledeponering): Storing of keys for the purpose of giving third parties access to these in order to decrypt information. Cryptographic module: Hardware module which can generate and store keys and apply the digital signature independently of the operating system. The module must be certified according to FIPS level 3, CWA or SSCD-PP Type 3. Employee: A person associated with the company that appears from the certificate. Public-key certificate (offentligt certifikat): See certificate. Registration authority (RA) (registreringsenhed): The natural or legal person responsible for the identification and authentication of a (future) subject. Root certificate (rodcertifikat): A public certificate issued by a CA for the purpose of validating other certificates. A root certificate is signed with its own signing key (self signing (egensignering)). Root key: The CA's private and public keys used for signing the subscriber's certificates. RID: Resource identification number. Verifier (relying party) (signaturmodtager): A natural or legal person receiving an electronic signature created by signing data from a subject. Sub-certification of CA: A higher-level CA issuing a certificate with the public root key of the lower-level CA. Sub-certification may occur at several levels, thus forming a continuous chain of certificates. Certificate revocation list (spærreliste): A list of certificates no longer considered valid because they have been permanently revoked. 3.2 Abbreviations CA Certification Authority (Certificeringscenter)
12 CRL CPS CP CVR LDAP NIST OCES OCSP OID OTP PKI RA RID UTC Certificate Revocation List (Spærreliste) Certification Practice Statement (Certificeringspraksis) Certificate Policy (Certifikatpolitik) The Danish Central Business Register Lightweight Directory Access Protocol National Institute of Standards and Technology Public Certificates for Electronic Services (Offentlige Certifikater til Elektronisk Service) Online Certificate Status Protocol Object Identifier, see ITU-T's ASN.1 standard One Time Password Public Key Infrastructure Registration Authority Resource identification number Universal Time, Coordinated 3.3 Notation The requirements contained in this CP comprise: 1 Mandatory requirements, which must be met. Such requirements are indicated using the term "must". 2 Requirements that should be met. If the requirements are not met, this must be reasoned. Such requirements are indicated using the term "should". 3 Requirements that may be met if the CA so wishes. Such requirements are indicated using the term "may".
13 Concept 4.1 CA A natural or legal person entrusted by both subscribers and verifiers with the task of generating, issuing and managing electronic certificates is known as a certification authority (CA). The CA has overall responsibility for providing the services necessary for issuing and maintaining certificates. The CA's own private keys are used to sign issued certificates, and the CA is identified in the certificate as the issuer. The CA may cooperate with other parties in offering parts of the overall CA services, but the CA will always have overall responsibility for all activities regarding the handling of certificates, and the CA is also responsible for the requirements of this CP for CA services being met at all times. A CA may sub-certify its public OCES root key under other CAs. A CA's OCES root key may also sub-certify another CA's public root key provided that this is approved for OCES. An OCES CA must always offer a self-signed OCES root certificate to the verifiers (relying parties). 4.2 CA services The services necessary for issuing and maintaining certificates may be classified as follows: Registration: Verification of the subject's identity and any associated ID and registration information. The result of the registration will be passed on to certificate generation. Generating certificates: Generation and electronic signing of certificates based on the verified identity and any associated ID and registration information from the registration. Certificate distribution: Distribution of certificates to subjects. Catalogue service: Publication of certificates, giving verifiers (relying parties) access to the certificates. Publication of business conditions etc.: Publication of terms and rules, including CP and CPS. Revocation of certificates: Receiving and handling requests for revocation of certificates. Publication of revocation information: Publication of status information for all certificates, in particular certificates which have been revoked. 4.3 CP and CPS Purpose The purpose of a CP like the present is to specify what requirements must be met, while the purpose of a CPS is to specify how the requirements are met by the relevant
14 CA. The certificate refers to the CP, thus allowing a verifier to determine what minimum requirements have been met by the CA, including the requirements that a CA must require a subscriber to meet Degree of specification The CPS gives a detailed description of conditions and terms, including business and operating procedures, for the issue and maintenance of certificates. Thus the CPS is more detailed than the CP, which describes general requirements only. The CPS must indicate how a specific CA meets the technical, organisational and procedural requirements identified in this CP Differences As a result, the CP and CPS take a different approach. A CP like the present has for instance been defined independently of specific details in the operating environments of the CA, whereas the CPS is tailored to the organisational structure, operating procedures and IT facilities of the CA. This CP has been prepared by the National IT and Telecom Agency, while the CPS is always prepared by a CA. An independent third party (system auditor) must make an audit of the CPS and declare that the CPS meets all requirements made in the CP, and that these requirements are observed by the CA Other CA conditions The CP and the CPS describe the basic framework for CA's activities. In addition, the CA will typically employ customer-oriented commercial conditions and terms addressing the issue and use of certificates and the provision of status information. 4.4 Subscribers and subjects Prior to the issue of employee certificates, the CA will make an agreement with the subscriber in the capacity of the company requesting employee certificates for its employees. The employee to whom a certificate is subsequently issued is referred to as the subject. In this CP, both terms are used in order to distinguish between the party that has made an agreement with a CA and the party identified as the subject in the certificate. The subscriber has overall responsibility for the use of the certificate and the associated private keys, although it is the subject that controls the private key. The term subject is used where explicit reference is made to the person identified in the certificate, while the term subscriber is used in all other instances, also where the difference does not appear clearly from the context.
15 Certificate policy and auditing 5.1 General This document describes the certificate policy for OCES employee certificates. 5.2 Identification This CP is identified by the following object identifier (OID): Employee certificate: { stat(169) pki(1) cp(1) nq(1) medarbejder(2) ver(5) }. The OID is registered under Danish Standards in accordance with DS 2391:1995, parts 1 and 3. All OCES employee certificates issued according to this CP must refer to it by indicating the relevant OID in the "certificate policy" field of the OCES certificate. In a certificate, reference must only be made to the OIDs in question following written agreement with the National IT and Telecom Agency, cf. section Scope of application An OCES employee certificate may be used to secure the authenticity of the sender and message, including the electronic signature and integrity of the message. It may also be used to ensure secrecy (encryption). OCES employee certificates are not qualified certificates, i.e. they must not be used in situations where qualified certificates are required. OCES employee certificates must not be used to sign other certificates. OCES employee certificates may be valid for a maximum period of four years. 5.4 The CA's right to issue OCES certificates The CA may issue OCES employee certificates according to this CP if the CA: has entered into a written agreement with the National IT and Telecom Agency in this respect; has submitted a CA report, cf. 5.5, to the National IT and Telecom Agency; and has received a declaration of conformity from the National IT and Telecom Agency confirming that the Agency has approved the submitted report and finds that the requirements of the present CP have been met. An updated CA report must be submitted annually to the National IT and Telecom and Agency. This must be made no later than three months after the end of the CA's financial year. The timeframe of the report must follow the CA's financial year.
16 CA report The report must include: the CA's CPS; the auditor's records; a declaration from the CA's management as to whether the CA's data, system and operating security as a whole is considered to be adequate, and that the CA complies with its own CPS; a declaration from the system auditor as to whether the CA's data, system and operating security as a whole is considered to be secure, and whether the CA complies with its own CPS; and documentation of indemnity insurance covering the CA's liability. 5.6 System audit System audits must be performed at the CA. System audits include auditing of: general IT controls in the company; IT-based user systems etc. for generating keys and key components and for registration, issue, verification, storage and revocation of certificates; and IT systems for exchanging data with other parties. Appointing the system auditor - auditor's powers and obligations The CA must appoint an external state-authorised auditor to perform the system audit of the CA. In special cases, the National IT and Telecom Agency may exempt from the requirement that the system auditor must be a state-authorised auditor. Within one month after the appointment of the system auditor, the CA must notify this to the National IT and Telecom Agency. The CA must disclose the information necessary to perform the system audit of the CA. The CA must give the appointed system auditor access to the management protocol. The CA must give the appointed system auditor access to management meetings discussing matters relevant to the system audit. A management meeting means a meeting of the CA's top management, in practice often a board meeting. In this connection, "CA's management" means the top management of the CA, i.e. the board or a similar management body, depending on how the CA is organised. If any one board member so requires, the CA must ensure that the appointed systems auditor takes part in the management's discussion of matters relevant to the systems audit. In CAs where general meetings are held, the provisions of the Danish Financial Statements Act on the auditor's obligation to reply to questions posed at a company's general meeting shall also apply to the appointed system auditor. The CA must inform the appointed system auditor that, in accordance with generally accepted auditing standards, the auditor must perform the system audit mentioned below, including checks to ensure the following: that the CA's systems comply with the requirements of this CP;
17 that the CA's security, control and auditing requirements are allowed for to a sufficient extent in the development, maintenance and operation of the CA's systems; that the CA's procedures, both computerised and manual, are adequate in terms of security and control, and that they comply with the CA certification practice statement (CPS). The CA must ensure that a vulnerability assessment of the logging procedure is performed as part of the system audit. The appointed system auditor may cooperate with the CA's internal auditing team if one exists. To the extent that the appointed system auditor finds significant weaknesses or irregularities, the CA management must deal with the matter at the next management meeting. The CA must inform the appointed system auditor that the auditor is under obligation to report the matter(s) to the National IT and Telecom Agency provided that the system auditor continues to find significant weaknesses or irregularities. In addition, the CA must inform the system auditor that, upon inquiry from the National IT and Telecom Agency, the auditor is obliged, without prior acceptance by the CA, to disclose matters relating to the CA that have or may have an impact on the CA's administration of the task of issuing OCES certificates. However, the system auditor is obliged to inform the CA about the inquiry. The CA and the system auditor must inform the National IT and Telecom Agency without delay about matters of significant importance to the continued operation of the CA. Auditor's records The CA must inform the appointed system auditor that the auditor must keep separate auditor's records on a current basis, to be presented at every management meeting, and that any entry into the records must be signed by the CA management and the appointed system auditor. In addition, the CA must inform the system auditor that the contents of the records must be specified as indicated below. The appointed system auditor's records must include a report of the system audit performed as well as its conclusions. Furthermore, any matter that has given rise to significant comment must be described. The records prepared by the appointed system auditor must also state whether the auditor has received all the information requested while performing the task. At the end of the CA's fiscal year, the appointed system auditor must prepare a report to the CA management. The report must include statements as to whether: the system audit has been performed in accordance with generally accepted auditing standards; the appointed system auditor meets the qualifications required by legislation;
18 the appointed system auditor has received all information requested by the auditor; the specified system audit tasks have been performed in accordance with the requirements of this CP; the data, system and operating security as a whole is found to be adequate. The National IT and Telecom Agency may direct the CA to appoint a new system auditor within a stipulated time limit in case the acting system auditor is found to be clearly unqualified to perform the auditor s duties. In case of a change of auditors, the CA and the resigned systems auditor(s) must each provide the National IT and Telecom Agency with a statement. Expenses related to system audits The CA must bear all expenses incurred in connection with system audits, including system audits ordered by the National IT and Telecom Agency.
19 Obligations and liability 6.1 CA obligations The CA must fulfil all requirements specified in section 7. The CA is responsible for its subcontractors meeting the procedures and requirements of this certificate policy. The CA must ensure that all aspects are attended to in connection with the following: distribution of root certificates; instructions on how to generate and store keys; issuance of OCES employee certificates to subscribers; revocation of OCES employee certificates on request; publication of revocation lists; informing subscribers about impending expiry of the validity period of certificates, including the option of renewing key pairs; and renewal of OCES employee certificates. The CA must maintain a technical operating environment that meets the security requirements of this CP. The CA must use a reliable time source in connection with CA-related activities. The CA must prepare a CPS addressing all requirements in this CP. The CPS must comply with this CP. The CA must submit to audit requirements, cf. section 5.6. The registration authority (RA) may either be closely associated with the CA, or it may be an independent function. In all circumstances the CA is responsible for the RA meeting the specified requirements and obligations as if they applied to the CA itself. The CA must ensure that the provisions of this CP are followed by the associated RA/RAs. In addition, the CA must ensure that the RA: establishes web access for registration procedures (may be part of the CA's web service); verifies the applicant's identity and details; and maintains a technical operating environment conforming to the requirements of this CP.
20 Subscriber obligations The CA must enter into an agreement with the subscriber under which the subscriber undertakes to ensure that the subject fulfils the following conditions and that the subscriber's organisation and procedures support the fulfilment thereof: to give adequate and correct answers to all requests from the CA (or RA) for information during the application process; only to use the OCES certificate and the associated private keys in accordance with the provisions of this CP; to take reasonable measures to ensure that the mechanisms securing the private key are protected against compromise, alteration, loss or unauthorised use; to keep the password secret so as to prevent its disclosure to others; to ensure, when receiving the OCES certificate, that the contents of it are in agreement with the real situation; to immediately request revocation and possible renewal of the OCES certificate if the contents of it are no longer in agreement with the real situation; to immediately change its password or revoke the certificate if it is suspected that the password has been compromised; to immediately request the issuing CA to revoke the OCES certificate in case of the subscriber's bankruptcy or liquidation; to immediately stop using the certificate if it comes to the subscriber's knowledge that the CA has been compromised; and the use of a different password - e.g. biometrics - must implement a security standard at least at the same level as the security of traditional passwords in this certificate policy. In case the subscriber's key pair is generated and stored centrally at the CA, the CA must also enter into an agreement with the subscriber under which the subscriber undertakes to meet the following conditions: to choose/decide a password in conformity with the provisions of section 7.2.8; to use and keep OTP devices, user IDs and passwords as directed by the CA; to take reasonable measures to protect the OTP device so as to prevent access by others; and to immediately block the OTP device if it is suspected that the device has been compromised. In case the subscriber's key pair is generated and stored at the subscriber, the CA must also enter into an agreement with the subscriber under which the subscriber undertakes to meet the following conditions: to generate, store and use key pairs in a manner that ensures compliance with the requirements of this CP, in particular 6.2;
21 to protect the private key with a password in conformity with the provisions of section 7.3.1; to ensure that a backup copy of the private key, where applicable, is kept in an encrypted form in a secure manner; to immediately revoke the certificate if it is suspected that the password has been compromised; and to immediately request the issuing CA to revoke the OCES certificate if the private key has been compromised or if it is suspected that it has been compromised. In case the subscriber's key pair is generated at the CA, but is sent to the subscriber in a cryptographic module and stored under the subscriber's control, the CA must also enter into an agreement with the subscriber under which the subscriber undertakes to meet the following conditions: to keep and use the cryptographic module and password as directed by the CA; to protect the private key with a password in conformity with the provisions of section 7.2.8; to immediately revoke the certificate if it is suspected that the password and the cryptographic module have been compromised; and to immediately revoke the certificate if it is suspected that the cryptographic module has been compromised. Additional obligations As regards private keys that are used to ensure secrecy (encryption keys), the subscriber may direct the subject to use alternative procedures for ensuring common control and use of keys. In that case the subscriber must inform the subject of the consequences in relation to secrecy. If the subject's association with the subscriber ends, the subscriber must inform the CA immediately and request revocation of the subject's certificate. In case the subscriber changes its business address, this must be notified immediately to the CA. 6.3 Information for verifiers (relying parties) Via its website and other means, the CA must inform verifiers about terms and conditions for using digital signatures, including that in order to rely on a certificate, the verifier must ensure: that a certificate received is valid and has not been revoked, i.e. it is not included in the CA's revocation list; that the purpose for which the certificate is to be used is appropriate in relation to any usage limitation in the OCES certificate; and that the use of the certificate is appropriate in other respects in relation to the level of security described in this CP.
22 Liability In relation to any person who reasonably relies on the certificate, the CA must assume liability for damages under the general rules of Danish law. In addition, the CA must assume liability for damages for loss incurred by subscribers and verifiers who have reasonably relied on the certificate, provided that the loss is due to the following: that the information specified in the certificate was not correct at the time of issuing the certificate; that the certificate does not contain all information required under section 7.3.3; failure to revoke the certificate, cf. section 7.3.6; lacking or erroneous information about the revocation of the certificate, the expiry date of the certificate, or whether the certificate contains any limitations on scope or amounts, cf. sections and 7.3.6; or failure to comply with section 7.3.1; unless the CA can prove that the CA has not acted negligently or intentionally. The CA shall prepare its own agreements etc. with joint contracting parties. The CA is entitled to seek limitation of its liability in the relationship between the CA and its joint contracting parties to the extent that such parties are business operators or public authorities. Thus the CA is not entitled to seek limitation of its liability in relation to private citizens who are joint contracting parties. In addition, the CA is entitled to disclaim liability in relation to joint contracting parties who are business operators and public authorities for loss of the nature described in section 11(3) of Act No. 417 of 31 May Insurance The CA must take out and maintain an insurance to cover any claims for damages against the CA and RA by all joint contracting parties (subscribers and verifiers, relying parties) as well as the National IT and Telecom Agency. The minimum annual coverage must be DKK 10 million.
23 Requirements on CA practice 7.1 Certification practice statement (CPS) The CA must prepare a certification practice statement (CPS) containing a detailed description of how the requirements of this CP are met, including: the CA's administrative and management procedures; qualifications, experience etc. of CA staff; the systems, products and algorithms used by the CA; the CA's security measures and related work process, including information about measures applicable with regard to maintaining and protecting the certificates as long as they exist; CA procedures regarding registration (identity control), issue of certificates, catalogue and revocation services, and registration and storage of information regarding certificates, including identity information; the CA's financial resources; CA procedures for entering into agreements about the issue of certificates and its notification duty; and to the extent that the CA has outsourced CA tasks to other companies or authorities, the CPS must also include the performance of such tasks; and what reliable time source the CA is using. CA practices must always comply with the conditions specified in the CPS. The CA must publish the CPS on its website. Sensitive information, e.g. trade secrets, can be exempted from publication. 7.2 Key management The CA's key management must be in accordance with ETSI SR v ( ): "Algorithms and Parameters for Secure Electronic Signatures", defining a list of recognised cryptographic algorithms and their parameter requirements. For critical parts of the CA infrastructure, the CA must follow relevant and official recommendations from NIST regarding the use of up-to-date algorithms and key lengths CA key generation The CA must ensure that generation of keys is performed under controlled conditions. The conditions below must be observed in particular: CA root keys and other private keys must be generated under the surveillance of two persons each holding a trusted position at the CA. CA private keys must be generated in a cryptographic module that meets the requirements of FIPS level 3, CWA , or higher. The cryptographic module must be stored in accordance with the requirements in
24 If CA root keys or other private keys are to be transferred from the cryptographic module, this must be made in an encrypted form and in cooperation by at least two persons holding different trusted positions at the CA. The certificate issuer's root keys must be RSA keys with a length of at least 2048 bit or similar. The certificate issuer's root keys must be valid for at least five years. The "OCES" designation must form part of the root certificate's commonname CA key storage, backup and recovery The CA must ensure that CA root keys are not compromised and maintain their integrity at all times. CA root keys and other private keys must be stored and used in cryptographic modules that comply with the requirements of FIPS level 3, CWA , or higher. Storage, backup and transport of CA root keys and other private keys must be made under the surveillance of two persons each holding a trusted position at the CA. Backup copies of the CA private keys must be stored in a cryptographic module that meets the requirements of FIPS level 3, CWA , or higher. The cryptographic module must be stored in accordance with the requirements in section CA public key distribution The CA root certificate must be made available to verifiers (relying parties) via the CA's website in a way that ensures the integrity of the public key and authenticates its origin. The CA must enable verification of the root certificate via a different channel. Verification can be made for instance by using a fingerprint of the certificate Key escrow The CA must not hold the subscriber's keys in escrow CA key usage The CA must ensure that the CA private keys are not being used for purposes other than signing certificates and providing status information about certificates. The CA must ensure that certificate signing keys are only used within physically secure premises in accordance with End of CA key lifecycle The CA's private key must have a specified period of validity. After expiry, the private key must either be destroyed or kept in such a manner that it cannot be restored and be put to use again.
25 Before the private key expires, the CA must ensure generation of a new CA key pair that can be used for issuing certificates Management of cryptographic modules The CA must manage and store cryptographic modules in accordance with the requirements in section 7.4 throughout the lifecycle of the cryptographic modules. The CA must ensure that cryptographic modules for certificate and status information signing have not been compromised prior to installation. The CA must ensure that cryptographic modules for certificate and status information signing are not compromised during use. The CA must ensure that all management of cryptographic modules for certificate and status information signing is performed in cooperation by at least two persons each holding a trusted position at the CA. The CA must ensure that cryptographic modules for certificate and status information signing are always functioning correctly. The CA must ensure that keys stored in a cryptographic module for certificate and status information signing are destroyed upon module retirement CA provided key management The CA must ensure that CA generated subject keys are generated securely, and that the secrecy of the subject's private keys is assured. CA generated subject keys must be RSA keys with a minimum length of 2048 bit or similar. In case the subject's key pair, after having been generated, is stored centrally at the CA, the following conditions must be met: It must not be possible to use the subject's private key without the subject having authorised such use in each individual case, thus ensuring that the subject will maintain sole control over its private key. The CA must protect access to the subject's private key using authentication of the subject by means of two independent factors in the form of an OTP device and a password. The password must be selected from an outcome space of at least 36 6 possible codes, for instance as 6 characters selected from 36 letters, figures and special characters. OTP response code must be selected from an outcome space of at least 10 4 codes, for instance as 4 numeric digits. Validation of the passwords must be implemented in a way that protects effectively against exhaustive searches. The use of a different password - e.g. biometrics - must implement a security standard at least at the same level as these requirements. The private key must be available to the subject after revocation to enable the subscriber to decrypt data using the private key.
26 In case the subject's key pair, after being generated by the CA, is sent to the subject on a cryptographic module and stored under the subject's control, the following conditions must be met: CA generated keys must be generated and stored securely prior to delivery to the subject. The subject's keys and the associated activation password passwords must be delivered separately and in such a way that the confidentiality of these is not compromised. Generation and distribution of the subject's keys must be arranged in such a manner that only the subject itself will have access to the private key. The password must be selected from an outcome space of at least 10 4 possible codes, for instance as 4 digits selected from figures between 0 and 9. The use of a different password - e.g. biometrics - must implement a security standard at least at the same level as these requirements. 7.3 Certificate management Subscriber and subject registration Subscriber registration The CA must ensure that the subscriber, before starting to use an OCES employee certificate, is made aware of and accepts the terms and conditions for using the certificate. In this connection, the subscriber is required to appoint an authorised person, to be approved by the management, who is empowered to handle the administration of employee certificates on behalf of the company. The CA must establish a procedure for verification of the applicant's identity ensuring that: the OCES subscriber states the company's CVR number and the name and e- mail of the authorised person; the OCES subscriber's CVR postal address is obtained via online lookup in the Central Business Register; the authorised person's activation password is sent in a PIN code letter to the company management at the company's CVR postal address. It is sufficient that the CVR postal address is verified in connection with the registration of the subscriber. If the company's address changes, the CVR postal address must be verified again. In the event that the CA is already familiar with the subscriber's identity or applies other secure procedures for carrying out identity checks, the above-mentioned procedure for certificate application may be departed from in full or in part. Procedures must be submitted to the National IT and Telecom Agency for approval before implementation.
27 Subject registration The CA must establish and maintain a function by which the authorised person can make applications for and issue employee certificates. The CA must ensure that the registration process is conducted via the person authorised by the company. The CA must establish a procedure for verification of the applicant's identity ensuring that: the authorised person states the company's CVR number; the authorised person states the subject's name or pseudonym, and CPR number where applicable; the OCES subject is provided with an activation password sent in a PIN code letter for installation of the private key and the associated certificate; or the OCES subject is provided with an activation password delivered via the authorised person for installation of the private key and the associated certificate. If the activation password is delivered to the subject by the authorised person, the CA must also enter into an agreement with the subscriber under which the subscriber undertakes to establish a procedure ensuring that: transfer of the activation password from the authorised person to subjects is made in a secure manner; the subject acknowledges receipt of the activation password; transfer of the activation password from the authorised person and the subject's acknowledgement of receipt are logged; and the procedure and log are reviewed periodically by the company's management or a person appointed by the management (not the authorised person). Generating and installing subject keys at the subject When issuing a certificate with associated keys generated at the subject, the CA must establish an installation procedure ensuring that: the activation password for installation of the private key and the associated certificate is communicated to the authorised person via a secure electronic connection or is sent via a PIN code letter; the subject must enter its activation password to begin the installation of the private key and the associated certificate; subject keys are RSA keys with a minimum length of 2048 bit or similar; the public key is transferred to the CA together with information about the subscriber's identity in a message signed with the private key; the private key is encrypted and protected by the password; the personal password for activating the private key is generated and entered during the key generation process; the private key is activated once the subject has entered a personal password consisting of at least eight characters and containing at least one lower-case
28 letter, one upper-case letter and one digit; if a password is used in environments which can block effectively against exhaustive searches, it may, however, be selected from an outcome space of at least 10 4 possible codes, for instance as 4 digits selected from figures between 0 and 9; the use of a different password - e.g. biometrics - must implement a security standard at least at the same level as these requirements; the root certificate has been installed at the OCES subject; and the time and date of issuing the certificate can subsequently be determined. In case private keys not protected by a cryptographic module are issued, the CA must, on its website, indicate a method for the subscriber to make a backup copy of the private key in encrypted form. The CA must approve a certificate application if the procedure is completed as indicated. The CA must ensure that from the time when the CA or an RA appointed by the CA has received a certificate application and until the information required for issuing a certificate has been sent to the certificate applicant, no more than one working day will pass on average within a running month. The time is never allowed to exceed three working days Certificate and key renewal Renewal of an OCES certificate means using a valid certificate for issuing a new certificate according to this certificate policy to the same subject, with a new key pair, new validity period, a new certificate serial number, and the current OID. An OCES certificate may be renewed for up to four years at a time. The CA must ensure that a request for and issue of a renewed OCES certificate can be made online. An OCES certificate can be renewed by the subject. The CA must ensure that the request for renewal (certificate application) is signed with the subject's private key. The verifying RA must validate the signature using the public key given in the certificate application. The certificate application and issue must also meet the requirements in section for generating and installing the subject's keys. After revocation or expiry, or if the private key has been compromised, a certificate cannot be renewed. In such cases, the CA must ensure that a new certificate can be issued with a new key, and that the request for a new OCES certificate is then handled like a new issue following the same guidelines as given in No later than 4 weeks before expiry, the CA must notify the subject of this via sent to the address registered by the CA. At the same time, the CA must also notify the authorised person of the expiry via or other electronic channels made
29 available to the authorised person. Alternatively, notification of the authorised person can be made by ordinary letter to the company's CVR postal address Certificate generation OCES employee certificates must follow DS 844: Specification for qualified certificates ("Specifikation for kvalificerede certifikater"), except that QcStatements must not state that the certificate is a qualified certificate. OCES employee certificates must include: Indication of the issuing CA identification and the country in which the certification authority is established Subject name or a pseudonym; in the latter case it must appear that a pseudonym is used Specific information about the subject may be added, if relevant, depending on the purpose of the certificate Signature verifying data corresponding to the signature generating data under the signer's control Certificate commencement and expiry dates Certificate identification code The issuing CA's advanced electronic signature Limitations on the scope of use of the certificate, if applicable Solution Issuer information contains the required information, i.e. as a minimum an unambiguous name and country code. CommonName contains name and/or pseudonym. If a pseudonym is used, the pseudonym is also placed in the Pseudonym field. Subject serialnumber and other attributes contain information with suitable qualifiers. See further details in ETSI TS and RFC The Subject SerialNumber format must follow the specifications for employee certificates in DS 844, section 4.3. X.509.v3. X.509.v3 and RFC The CA assigns the certificate a unique CA serial number. Together with the CA's identification, the number is completely unique. X.509.v3 and RFC X.509.v3 and RFC KeyUsage, CertificatePolicies and Extended Key Usage. The Subject certificate field In the "Requirements" column, M stands for Mandatory and O for Optional. Attribute Requirements Comment countryname M Country code
30 Attribute Requirements Comment organizationname M The company's full name, including the CVR number where applicable organizationalunitname O Department serialnumber M CVR:CVR number-rid:employeeid postaladdress O The company's CVR address givenname O The employee's first names surname O The employee's surname commonname M The employee's full name or registered pseudonym, including title where applicable title O The employee's job title address O The employee's address pseudonym O The employee's pseudonym Example: countryname=dk, organizationname= ABC // CVR: , [email protected], serialnumber=cvr: rid:employeeid, commonname= Project Manager John Smith, title=project Manager Rules: CountryName=DK, organizationname, organizationalunitname, serialnumber, givenname, surname, commonname and pseudonym must collectively and unambiguously point to the person who is the subject of the certificate. The CVR number must be contained in serialnumber. Fields not mentioned are optional. Other fields (extensions) The version number must be "v3". In case of a certificate which can be used for signing, authentication and encryption, the keyusage extension must be set with the following specifications: digitalsignature (0) keyenchipherment (2) dataencipherment (3) keyagreement (4) The following specifications must be set for certificates used for authentication and signature: digitalsignature (0) contentcommitment (1)
31 The contentcommitment specification is set to inform recipients of certificates that the signature is binding on the subscriber in relation to the signed content. The following specifications must be set for certificates used for encryption only: keyenchipherment (2) dataencipherment (3) keyagreement (4) In all cases, this extension must be defined as critical. In the tables below, the following codes are used: O: Optional C: The extension must be marked as "Critical". X: The extension must not be marked as "Critical". (C): Optional for the CA to mark the extension as "Critical". R: The extension is "Required". M: The extension must be addressed ("Mandatory"). - : The extension has no meaning. Generation Signature Extension 1. Application 2. CA 3. End-user 4. Key Man. AuthorityKeyIdentifier O O O O SubjectKeyIdentifier O O O O KeyUsage CM CMR CMR CMR ExtendedKeyUsage O O O O PrivateKeyUsagePeriod O O O O CertificatePolicies M (C)M (C)MR (C)MR R PolicyMappings O O - - SubjectAltName O O O O IssuerAltName O O O O SubjectDirectoryAttributes O O O O BasicConstraints M CMR O O NameConstraints O O - - PolicyConstraints O O - - CRLDistributionPoints M R R R QcStatements O O O O Comments to the table: Extension management is divided into four columns: 1. Software using certificates issued. 2. Generation of certificates for CA software. 3. Generation of certificates to the end-user to be used for electronic signatures.
32 Generation of certificates to the end-user to be used for management/exchange of keys, e.g. in connection with the authentication/control of access rights. CertificatePolicies must at least specify the relevant object identifiers for this CP Dissemination of terms and conditions The CA must publish terms and conditions on its website for using certificates issued under this CP. The CA must inform the subscriber that OCES employee certificates cannot be used to sign other certificates. The CA must inform the subscriber that the private key must not be used until the OCES certificate has been received by the subject, apart from the use made during the certificate application process. The CA must inform the subscriber that the private key must not be used for signing after a request for revocation, notification of revocation, or after expiry. In addition, the CA must inform the subscriber that if the subscriber suspects that the private key has been compromised, the key must only be used for making a request for revocation. In case the private key is available to the subscriber, the private key may still be used for decrypting data which was encrypted using the associated public key. When issuing new keys and renewing existing keys, the CA must inform the subscriber that data encrypted with a public key can only be decrypted using the associated private key. The CA must inform the subscriber about the validity period of an OCES employee certificate and that an OCES employee certificate may be renewed if this is done before the certificate expires Certificate dissemination The CA must make the following types of information available to all: The root certificate used for issuing certificates under this CP. The CA must enable verification of the fingerprint of the root certificate via a different channel. Other certificates used for signing information between the CA, subscribers and verifiers (relying parties). This CP, as long as valid certificates issued under this CP exist, and as long as there are certificates on the revocation list of this CP. The CPS approved by the system auditor, except for specific trade secrets. List of all OCES employee certificates until at least two months after expiry of the validity period of the individual certificate. Excepted from this are the certificates to be kept secret. A revocation list for OCES employee certificates issued under this CP.
33 Revocation list information must be available without any kind of access control. The CA must ensure that CA requirements imposed on the subscriber and verifier on the basis of this CP are summarised and documented, cf. sections 6.2 and Certificate revocation Revocation of certificates, general The CA must revoke an OCES certificate immediately if the CA becomes aware of one or more of the following conditions: The subscriber or subject wants to revoke the OCES certificate or terminate the use of this. The subject has lost access to the private key, e.g. as a result of losing the password. There is certainty or suspicion that the subject's private key has been compromised. The private key has been destroyed or lost in a different manner. The subject is no longer associated with the subscriber. Inaccuracy has been found in the content of the certificate or other information associated with the subscriber/subject, see also below regarding the subject's change of name. The subscriber's bankruptcy. The subscriber's business closes down. If the subscriber changes its name, the CA must immediately notify the subscriber that the certificate is to be renewed within 30 days. If this is not made, the CA must revoke the certificate. The CA's own violation of this CP shall not give the CA the right to revoke a certificate. In case of a request for revocation, the CA must ensure that identification is made in a way that establishes the identity in the best possible manner, e.g. by a combination of subscriber/subject name, CVR number, CVR postal address and address. A request for revocation can be made by the following: the subject; the authorised person; the CA, if the rules in this CP have not been met, or where warranted by the circumstances; persons authorised to sign for the company, upon showing proper documentation; a supervisor or liquidator, in case the subscriber has applied for a suspension of payments or has gone into liquidation; an administrator appointed by the probate court or heirs of the subscriber, in case the subscriber has passed away.
34 To the extent possible, the CA must ensure that the procedure for requesting revocation will not allow unauthorised revocation, while at the same time accepting authorised revocation by telephone, or online via the CA's website. Requests for revocation In case revocation is requested by telephone, the CA must ensure that the necessary information is submitted to ensure proper identification and that the reason for the requested revocation is stated. Requests for revocation via online web forms or must contain the necessary information to ensure identification or be signed with the certificate desired to be revoked. Further aspects regarding revocation The CA must provide information about any revocation undertaken, via to the address stated in the certificate and to the authorised person's address or other electronic channels made available to the authorised person. If the CA revokes the certificate without having been requested to do so, the CA must send a notification stating the reason for revocation via to the subject and to the authorised person's address. In case of the subscriber's bankruptcy, the probate court or liquidator may request revocation. The above-mentioned methods may also be used. However, the CA must also send an acknowledgement of the revocation to the postal address stated by the probate court or liquidator. Where a condition giving rise to revocation has been ascertained, the CA must ensure that revocation is made without undue delay. An OCES employee certificate cannot be suspended. Management of revocation lists The CA must ensure that revocation is made immediately after reception of a request and, where relevant, confirmation of the requesting party's identity. After a completed revocation, the CA must publish an updated revocation list. This must take place no later than 1 minute after revocation. The CA must ensure that there is a separate revocation list for OCES certificates. The CA must set the lifetime of the revocation list at 12 hours. The CA must publish a new revocation list each time a revocation is made, but no later than 6 hours before expiry of the current revocation list.
35 The CA must make revocation lists available for downloading via the following channels: LDAP HTTP In addition, the CA must make revocation list information available via manual online lookup. For revocation lists the CA must use a profile as stated in IETF RFC thisupdate and nextupdate must be stated in UTCTime format YYMMDDHHMMSSz. The version number of the revocation list must be stated and set at "v2". There is no requirement to use CRL extensions. A CA may also offer online status checks (e.g. via Online Certificate Status Protocol, OCSP). For OCSP the CA must use a profile in accordance with IETF RFC The OCSP response may be pregenerated, but it is required that if a certificate is revoked, then the associated OCSP response must be regenerated, and no later than 1 minute after the revocation has been registered the OCSP response must indicate that the certificate has been revoked. OCSP responders must be provided with dedicated company certificates used exclusively for OCSP. Besides the formalities required for a company signature, the following requirements must be met by the contents: Key Usage: Digital Signature Extended Key Usage: OCSP Signing CRL Distribution Point: Not included AIA: Not included OCSP No Check: Included but empty The lifetime of OCSP responder certificates must be 72 hours as a maximum, and the associated keys must be protected by cryptographic modules in line with other CA keys, as indicated in section The CA must make sure that revocation lists are not compromised, and that the revocation lists and OCSP services are available via the Internet 24 hours a day, 7 days a week. The services must have an average response time not exceeding 1 second measured at the server entry, i.e. from the time when the server has registered the request until it returns a response. 7.4 CA management and operation The requirements in section 7.4 solely address the RA where this is explicitly mentioned.
36 Security management The CA must ensure that its administrative and management procedures are adequate and conform to the basic requirements of Danish Standards' "Code of practice for information security management DS 484". To the extent that the CA estimates that the special conditions regarding CA operation justify requirements for stricter security measures, i.e. compliance with stricter requirements as described in DS 484, these must be applied. In the annual CA report the CA must describe what requirements on stricter security measures have been implemented. The CA must assume full responsibility for all services made available, directly or indirectly, for managing certificate issue and status information. The CA must ensure that persons with auditing functions at the CA do not report to the same managers as operations officers and administrators Asset identification and classification The CA must meet the basic and stricter requirements of DS 484 in accordance with the provisions of section Personnel security Security classification procedures The CA must check that managers and employees performing trusted assignments at or for the CA have not been convicted of a crime that makes them unsuitable for performing their job. This also applies to RA employees. Check of subcontractors The CA must make sure that subcontractors' personnel meet the same requirements for education, experience and security classification as the CA's own employees in the functions performed by the subcontractors' personnel for the CA. By means of access procedures, the CA must ensure that subcontractors' personnel cannot work without surveillance at the CA. RA personnel must receive training that will enable them to perform their work correctly and securely Physical security General The CA must clearly identify the localities at which employees and data centres related to CA activities are located. Facilities housing key generation systems are designated CA operation facilities. All facilities used for employees at the CA must be defined as special security areas in accordance with DS 484.
37 CA operation facilities CA operation facilities must be physically separate from other CA facilities. In case of evacuation, the CA operation facilities must be capable of functioning via remote control without changes in operation. By remote control is understood the possibility of operating CA functions via a PC etc. from a facility physically separate from CA operations, e.g. where the CA has established a backup system. Physical access General The CA must ensure that all facilities have perimeter protection conforming to DS 471 or better. The CA must ensure that watch is kept 24 hours a day. CA operation facilities The CA must ensure that access to and stays in the central operation facilities are monitored on video. Storage and processing of data in other localities If data is stored or processed at a different locality, the CA must ensure that this is subject to compliance with the same security requirements as those applying to the CA's main systems Management of the operation of IT systems and networks The CA must meet the basic and stricter requirements of DS 484 in accordance with the provisions of section Management of access to systems, data and networks The CA must meet the basic and stricter requirements of DS 484 in accordance with the provisions of section The CA must make RA systems available ensuring that only authorised RA personnel have access to operate such systems Development, procurement and maintenance of IT systems The CA must use recognised systems and products that are protected against alteration. The products must comply with an adequate protection profile in accordance with ISO/IEC or similar. Prior to any system development (i.e. internal development or development by a third party), the CA must ensure that there is a management approved plan for integration of security in the systems Emergency preparedness planning The following incidents must be considered serious:
38 Compromise of the CA private key. Suspicion of compromise of the CA private key. Breakdown and critical errors on CA operating components (revocation lists etc.). Stoppage of the CA operating environment due to fire, power failure etc. If the CA private key has been compromised, or if this is suspected, the CA must immediately inform all subscribers via the registered address. The CA must also inform the National IT and Telecom Agency immediately, with a detailed description of the situation that has arisen. The CA must also inform verifiers (relying parties) immediately on its website, and to the extent found relevant in view of the situation arisen, via public media or by direct contact. In case of serious incidents on data processing equipment, software and/or data, the CA must inform subscribers thereof to the extent that it is relevant to their use of the CA services. In view of the situation arisen, the verifiers (relying parties) must be informed via public media and announcements in the daily press. The CA must ensure that all procedures relating to revocation lists, including requests for revocation, are given the highest priority in connection with re-establishing business procedures after a breakdown CA termination The CA must ensure that all issuing and renewal of certificates are stopped immediately when a CA function ceases to operate. Prior to termination, the CA must inform subscribers and all other parties that have contractual relations to the CA. The CA must ensure the continued maintenance of revocation lists and requests for revocation until all certificates issued by this CA have expired or have been transferred to another CA that meets the requirements of this CP. The CA must ensure that all files are accessible for a minimum of six years after expiry of the last certificate issued by this CA Compliance with legislation The CA and RA must ensure compliance with legal requirements, in particular the Act on Processing of Personal Data. Special obligations regarding the protection of confidential information Information included in certificates is considered non-confidential. Person-related information not included in the certificate is considered private information.
39 Information included in certificates is considered non-private. The CA and RA must ensure that confidential information is protected from being compromised and must not use confidential information for any purpose other than what is required for operating the CA. The CA and RA must ensure that private information is protected from being compromised and must not use private information for any purpose other than what is required for operating the CA. The CA and RA must ensure that statistical information about the use of OCES employee certificates cannot be related to the individual OCES certificate (cf. the Act on Processing of Personal Data). If a dispute cannot be settled by conciliation, either of the parties may choose to bring the dispute before the ordinary courts. The venue is Copenhagen. The applicable law is Danish law Recording of certificate information The CA is responsible for establishing a data storage system which must contain all data necessary for the secure operation of the CA in accordance with this CP. In addition, the CA must ensure that: all information is protected against unauthorised access; all security critical activities and activities requiring participation of more than one person are logged; all information about registration, including certificate renewals, is logged; all accesses and access attempts to areas that must be protected by access control are logged; all video monitoring is logged; there are written rules for regular review of all logs; all audit logs are signed electronically and are time stamped; audit logs are treated as confidential material; audit logs are backed up at regular intervals. The CA must ensure that backup data is stored in accordance with the requirements of DS 484. The CA must ensure that the National IT and Telecom Agency is informed of significant irregularities in the logging procedure and notified once annually in all other cases. The CA must ensure that the following information is archived: all logs; certificate applications and associated communication; signed orders and written agreements; certificate renewals; and
40 CPS and CP. The CA must ensure that archived information can be made available in case of disputes, and that all archived material is kept for at least the current calendar year + five years. This also applies to any data from the RA's IT systems relevant to documenting the CA's activities. The CA and RA must ensure that all material in archives is stored in accordance with the requirements of DS 484. The CA and RA must ensure that backup copies are made of all electronic archive material at regular intervals. The CA and RA must ensure that all electronic archive material is provided with an electronic time stamp at the time of archiving. Other archive material must be entered in a log. 7.5 Organisational aspects The CA organisation must be reliable. The CA must be a registered natural or legal person. The CA must ensure equal access to all services within the scope of the OCES employee certificates. This means that terms and conditions for access to services must be non-discriminatory. All CA administrative and business procedures must be adapted to the security level necessary for operating a CA. The CA must have sufficient financial strength to cover the liability assumed as a CA, including the obligations in section 7.4.9, partly through insurance, and partly through equity capital. The CA must at all times have at its disposal a sufficient number of trained personnel for operating, in an adequate manner, all services provided. The staff must at all times possess the skills prescribed for the trusted positions. The CA must ensure that policies and procedures are in place for handling customer inquiries or inquiries from verifiers. The CA must ensure that written agreements are in place with all CA service subcontractors. 7.6 Data centre location The requirements of this CP are applicable no matter whether the CA places all or parts of the operating environment abroad. Thus it must be possible to perform the ongoing check prescribed in the CP irrespective of the CA's geographic location.
41 If a state-authorised public accountant does not perform the systems audit, an exemption from the National IT and Telecom Agency is required, cf. section 7.1.
Certificate Policy for OCES personal certificates (Public Certificates for Electronic Services)
Certificate Policy for OCES personal certificates (Public Certificates for Electronic Services) - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8 3 Definitions
Certificate Policy for OCES company certificates (Public Certificates for Electronic Services)
Certificate Policy for OCES company certificates (Public Certificates for Electronic Services) - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8 3 Definitions
Certificate Policy for OCES Personal Certificates ("Offentlige Certifikater til Elektronisk Service") Version 4
Certificate Policy for OCES Personal Certificates ("Offentlige Certifikater til Elektronisk Service") Version 4 - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Land Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
How To Understand And Understand The Certificate Authority (Ca)
TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012
Certipost Trust Services Version 1.2 Effective date 03 May 2012 Certipost NV ALL RIGHTS RESERVED. 2 13 Definitions : Activation Data Certificate Certificate Holder Certificate Public Registry Certificate
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
ETSI TS 101 456 V1.4.3 (2007-05)
TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Terms and conditions of business for a NemID administrator of commercial NemID
Terms and conditions of business for a NemID administrator of commercial NemID 1 Background...2 2 Scope and object...3 3 Administrator and Certificates...3 3.1 General obligations of the Customer...3 3.2
CMS Illinois Department of Central Management Services
CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF
INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN
Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
Certificate Policy for. SSL Client & S/MIME Certificates
Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it
TeliaSonera Root CA v1 Certificate Practice Statement. Published by: TeliaSonera AB
2007-10-18 1 (46) TeliaSonera Root CA v1 Certificate Practice Statement Published by: TeliaSonera AB Company Information Created Modified Approved Valid from 2007-10-12 Reg. office: Printed Coverage Business
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT
CA Certificate Policy SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT This page is intentionally left blank. 2 ODETTE CA Certificate Policy Version Number Issue Date Changed By 1.0 1 st April 2009 Original
TeliaSonera Server Certificate Policy and Certification Practice Statement
TeliaSonera Server Certificate Policy and Certification Practice Statement v.1.4 TeliaSonera Server Certificate Policy and Certification Practice Statement CA name Validation OID TeliaSonera Server CA
ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015
ING Public Key Infrastructure Certificate Practice Statement Version 5.3 - June 2015 Colophon Commissioned by Additional copies ING Corporate PKI Policy Approval Authority Additional copies of this document
Certificate Policy. SWIFT Qualified Certificates SWIFT
SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities
PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5
PKI NBP Certification Policy for ESCB Signature Certificates OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
ETSI TS 102 280 V1.1.1 (2004-03)
TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2
PKI NBP Certification Policy for ESCB Encryption Certificates OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document
Equens Certificate Policy
Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
Certification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER
Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5
Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION
PostSignum CA Certification Policy applicable to qualified personal certificates
PostSignum CA Certification Policy applicable to qualified personal certificates Version 3.0 7565 Page 1/60 TABLE OF CONTENTS 1 Introduction... 5 1.1 Review... 5 1.2 Name and clear specification of a document...
SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement
SWITCHaai Metadata CA Certificate Policy and Certification Practice Statement Version 1.0, OID 2.16.756.1.2.6.7.1.0 July 15, 2008 Table of Contents 1. INTRODUCTION...6 1.1 Overview...6 1.2 Document name
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Certification Practice Statement
Certification Practice Statement Version 2.0 Effective Date: October 1, 2006 Continovation Services Inc. (CSI) Certification Practice Statement 2006 Continovation Services Inc. All rights reserved. Trademark
Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)
[Draft] Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) Version: 1.00 August, 2015 Bangladesh Bank Page 2 of 42 Document Reference Title Document Type Bangladesh Bank
- X.509 PKI EMAIL SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1
- X.509 PKI EMAIL SECURITY GATEWAY Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1 Commerzbank AG - Page 1 Document control: Title: Description : RFC Schema: Authors: Commerzbank
The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.
Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED
StartCom Certification Authority
StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction
CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.
CERTIFICATE HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office
Programme of Requirements part 3h: Certificate Policy Server certificates Private Services Domain (G3)
Programme of Requirements part 3h: Certificate Policy Server certificates Private Services Domain (G3) Appendix to CP Government/Companies (G1) and Organization (G2) domains Datum 27 July 2015 Private
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
GlobalSign CA Certificate Policy
GlobalSign CA Certificate Policy Date: December 17 th 2007 Version: v.3.0 Table of Contents Document History...1 Acknowledgments...2 1. Introduction...3 1.1 Overview...4 1.1.1 GlobalSign Rootsign...5 1.1.2
Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems
Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems October 12, 2004 It is a frequently asked question if
SECOM Trust.net Root1 CA
CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT May 22, 2006 Version 2.00 SECOM Trust Systems Co.,Ltd. Revision History Version Date Description V1.00 2003.08.01 Initial Draft (Translated from Japanese
BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013
CERTIFICATE POLICY BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013 PUBLIC Version: 2.0 Document date: 11.05.2013 Buypass AS Nydalsveien 30A, PO Box 4364 Nydalen Tel.: +47 23 14 59 00 E-mail:
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized
Certification Practice Statement (ANZ PKI)
Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority
Certificate Path Validation
Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.3 May 15, 2014 Table of Contents TABLE OF CONTENTS:... 2 1. INTRODUCTION... 7 1.1 OVERVIEW... 7 1.2 DOCUMENT
TC TrustCenter GmbH. Certification Practice Statement
TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance
Comodo Certification Practice Statement
Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the
phicert Direct Certificate Policy and Certification Practices Statement
phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a
e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013
e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013 Ceyhun Atıf Kansu Cad. 130/58 Balgat / ANKARA TURKEY
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.
CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8
Qualified Electronic Signatures Act (SFS 2000:832)
Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions
Vodafone Group CA Web Server Certificate Policy
Vodafone Group CA Web Server Certificate Policy Publication Date: 06/09/10 Copyright 2010 Vodafone Group Table of Contents Acknowledgments... 1 1. INTRODUCTION... 2 1.1 Overview... 3 1.2 Document Name
SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates
SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates Version March 2004 Version 2004-03 SwissSign Gold CP/CPS Page 1 of 66 Table of Contents 1. INTRODUCTION...9 1.1 Overview...
ETSI TS 102 042 V2.4.1 (2013-02)
TS 102 042 V2.4.1 (2013-02) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V2.4.1
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates)
(CP) (For SSL, EV SSL, OSC and similar electronic certificates) VERSION : 09 DATE : 01.12.2014 1. INTRODUCTION... 10 1.1. Overview... 10 1.2. Document Name and Identification... 11 1.3. Participants...
E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA)
E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA) QUALIFIED CERTIFICATE POLICY AND PRACTICE STATEMENT (CP-CPS) VERSION 1.0 DATE OF ENTRY INTO FORCE : JUNE, 2008 OID 2.16.792.3.0.4.1.1.2 E-TUGRA
Certificate Policies and Certification Practice Statements
Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved. Certificate Policies and
Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013
Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority Version 3.4 April 2015 Table of Contents 1.0 INTRODUCTION... 8 1.1 OVERVIEW... 8 1.2
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
CA/Browser Forum. Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates
Version 1.3 CA/Browser Forum Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying
TC TrustCenter GmbH Certification Practice Statement and Certificate Policy for Qualified Certificates
GmbH Certification Practice Statement and Certificate Policy Version 1.0 of June 11 th, 2007 NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification
CPS - Certification Practice Statement
Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup nets-danid.dk CVR 30808460 Nets DanID CPS - Certification Practice Statement Public edition OID, Public: 1.3.6.1.4.1.31313.1.0.1.2.2 Version 2.2 Public CA
TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: 2006-11-17. Version: Rev A. Published by: TeliaSonera Sverige AB
Document no 1/011 01-AZDA 102 213 TeliaSonera Sverige AB Certification Practice Statement Rev A TeliaSonera Public Root CA Certification Practice Statement Revision Date: 2006-11-17 Version: Rev A Published
Statoil Policy Disclosure Statement
Title: Statoil Policy Disclosure Statement Document no. : Contract no.: Project: Classification: Distribution: Open Anyone Expiry date: Status 2019-06-11 Final Distribution date: : Copy no.: Author(s)/Source(s):
Citizen CA Certification Practice statement
Citizen CA Certification Practice statement OID: 2.16.56.1.1.1.2.2 OID: 2.16.56.1.1.1.2.1 VERSION: 1.1 1/56 Table of Contents 1 INTRODUCTION 5 1.1 PRELIMINARY WARNING 5 1.1.1 Trusted Entities ruled by
SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY
SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY Document Classification: Public Version Number: 2.5 Issue Date: June 25, 2015 National Center for Digital Certification Policies and Regulations Department Digitally
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
CERTIFICATE POLICY KEYNECTIS SSL CA
CERTIFICATE POLICY KEYNECTIS SSL CA Date: 05/02/2009 KEYNECTIS SSL CA CERTIFICATE POLICY Subject: KEYNECTIS SSL CA Certificate Policy Version number: 1.1 Number of pages: 49 Status of the Project Final
X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities
X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance
Version 2.4 of April 25, 2008
TC TrustCenter GmbH Certificate Policy for SAFE NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certificate Policy is published in conformance with international
Post.Trust Certificate Authority
Post.Trust Certificate Authority Certification Practice Statement CA Policy and Procedures Document Issue date: 03 April 2014 Version: 2.7.2.1 Release Contents DEFINITIONS... 6 LIST OF ABBREVIATIONS...
Estonian National CA Policy
Estonian National CA Policy for the Digital Tachograph System Eesti Riiklik Autoregistrikeskus (ARK) Estonian Motor Vehicle Registration Centre Digital Tachograph System EST NCA Policy Version Draft Version
TC TrustCenter GmbH Time-Stamp Practice and Disclosure Statement
GmbH NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or by any means, whether
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
Transnet Registration Authority Charter
Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/
Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2
Certificate Policy KEYNECTIS SSL CA CP Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 KEYNECTIS SSL CA CP Version 1.2 Pages 51 Status Draft Final Author Emmanuel Montacutelli OpenTrust
CERTIFICATION PRACTICE STATEMENT. EV SSL CA Certification Practice Statement
CERTIFICATION PRACTICE STATEMENT EV SSL CA Certification Practice Statement Emmanuel Montacutelli September 1, 2015 OpenTrust_DMS_EV Statement SSL CA Certification Practice Manage d Services Signature
