CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments. Ben Wilson, Chair, CA / Browser Forum



Similar documents
ETSI SR V1.1.2 ( )

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

ETSI TR V1.1.1 ( )

Independent Accountants Report

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

CA-DAY Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

Frost & Sullivan. Publisher Sample

ETSI TC ESI PRESENTATION TO CAB FORUM. ETSI All rights reserved

Egypt s E-Signature & PKInfrastructure

CERTIFICATION PRACTICE STATEMENT UPDATE

Independent Accountants Report

NIST-Workshop 10 & 11 April 2013

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Operating a CSP in Switzerland or Playing in the champions league of IT Security

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Auditor view about ETSI and WebTrust criteria. Christoph SUTTER

QuoVadis Group. EUGridPMA Update September 2014

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages.

Microsoft Trusted Root Certificate: Program Requirements

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Prioritizing Trust: Certificate Authority Best Practices

UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme

WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing

State of PKI for SSL/TLS

Bugzilla ID: Bugzilla Summary:

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Informa4on Security Management at Cer4ficate Authori4es

CA/Browser Forum. Guidelines For The Issuance And Management Of Extended Validation Certificates

Analysis of the Global SSL Certificate Market. The Growing Need for Value-added Solutions

Security + Certification (ITSY 1076) Syllabus

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Trust Service Principles and Criteria for Certification Authorities

(Instructor-led; 3 Days)

epki Root Certification Authority Certification Practice Statement Version 1.2

Public Key Infrastructure

California Counties Information Security Programs A look into the progress and future plans across counties

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Danske Bank Group Certificate Policy

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Chapter 1 The Principles of Auditing 1

SSL and Browsers: The Pillars of Broken Security

CA/Browser Forum. Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

BMC s Security Strategy for ITSM in the SaaS Environment

Gain a New Level of Trust with Extended Validation SSL Certificates

Signature policy for TUPAS Witnessed Signed Document

BUYPASS CLASS 3 SSL CERTIFICATES Effective date:

Introduction to Network Security Key Management and Distribution

Service Definition Document

Information Security Program CHARTER

Based on: CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.

TC TrustCenter GmbH. Certification Practice Statement

WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM

ROLE PROFILE. Business Function: Software Operations Managed Cloud Services eg s Head Office, Dunston Business Village, Staffordshire

GlobalSign CA Certificate Policy

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs:

The IP3 accreditation process. Bob Hart Chief Assessor September 2008

SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES

Possible conflict between Microsoft Root Certification Technical Requirement V 2.0 and CABF Baseline Requirement about extendedkeyusage

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Comodo Certificate Manager. Comodo Enterprise

Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

Certified Information Security Manager (CISM)

ETSI TS V2.4.1 ( )

ETSI TS V2.1.1 ( )

Domain 1 The Process of Auditing Information Systems

TeleTrusT European Bridge CA Status and Outlook

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

Cybersecurity and the AICPA Cybersecurity Attestation Project

Overview. Comodo Certificate Manager

Certum QCA PKI Disclosure Statement

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Best prac*ces in Cer*fying and Signing PDFs

Implementation of eidas through Member States Supervisory Bodies

Transcription:

CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments Ben Wilson, Chair, CA / Browser Forum

Chronology of Frameworks 1995-1996 PKIX chartered, BS 7799 published, EU Recommendation - Information Technology Security Evaluation Criteria (ITSEC), X.509v.3, ABA s Digital Signature Guidelines 1997-1999 ETSI Guide on Requirements for Trusted Third Parties, Certificate Policy and Certification Practices framework (ISO/TC68/SC 2 and RFC 2527), Gatekeeper Criteria for Accreditation of CAs, NIST Common Criteria, CS2/CSPP for COTS Protection Profile 2000-2003 ANSI X9.79, WebTrust for CAs, ETSI TS 101 456, ISO 17799, ABA s PKI Assessment Guidelines, RFC 3647, ETSI TS 102 042, Certificate Issuing and Management Components (CIMCs) Protection Profile 2005-2007 Meetings of the CA / Browser Forum to work on guidelines for EV SSL certificates, ISO 27001 adopted and ISO 17799 revised into ISO 27002 2011-2013 ISO 27007/27008; ETSI TS 119 403 (EN 319 411-3), Baseline Requirements, Security Requirements, WebTrust 2.0 and ETSI updates, WPKOPS, CA Security Council, OTA s CA Best Practices, NIST Workshop on Improving Trust in the Online Marketplace

WebTrust Program for CAs Audit of Management s Assertion that it has: assessed the controls over its CA operations maintained effective controls providing reasonable assurance that CA systems development, maintenance and operations were properly authorized and performed to maintain CA systems integrity. http://www.webtrust.org/homepagedocuments/item27839.aspx

Audit Coordination for Baselines Catch-22 for Browser Audit Report Requirements Final draft of 1.0 ready in Q2-2011 for public comment Effective date of July 1, 2012, but 2011 CA hacker SSL Baseline Requirements Audit Criteria v1.1 Effective January 1, 2013 Added nearly 60 new checklist items to WebTrust 2.0 ETSI TS 102 042 v.2.2.3 and ETSI TR 103 123 v.1.1.1 (2012-11) - Guidance for Auditors and CSPs on ETSI TS 102 042 for Issuing Publicly- Trusted TLS/SSL Certificates

CA / B Forum Baseline Requirements Rationale: Common security concerns exist for SSL/TLS and PKI for the Web. Various stakeholders should not create (and then have to maintain) multiple, conflicting criteria that Certification Authorities have to meet. If common baselines and reference points exist, then the number of variations will be reduced in root trust programs and audit schemes.

More about Baseline Requirements CAs must assert that they comply with the Baseline Requirements and identify which certificates they issue and manage comply. Profiles are specified, as well as time periods for validity of certificates and certificate information, and there are sunsetting / grandfathering provisions to effectuate change. A foundation is in place among key participants that will facilitate ecosystem improvements over time. Working with Mozilla and others on CA Practices

OTA s CA Best Practices CA checks reliable third party records, operates a quality control program, and screens and trains its employees. CA audited for compliance with Baseline Requirements and other CA / Browser Forum guidelines, and auditors are competent in computer security auditing. CA logs computer activity, reviews those logs, and conducts vulnerability scans and penetration tests. Roots are offline / air-gapped and protected by multiple layers of controls. CA maintains and regularly reviews practice statements, including business continuity, disaster recovery, and security incident response plans. CA stays current with developments by participating in industry-related organizations and events. https://otalliance.org/resources/ssl/cabestpractices.html

CA Security Council Group of commercial CAs formed in February 2013- to advance internet security by promoting deployments and enhancements to publicly trusted certificates [and to address SSL security awareness] through public education, collaboration, and advocacy. The CASC strives for the adoption of digital certificate best practices and the proper issuance and use of digital certificates by CAs, browsers, and other interested parties [and their potential impact on the internet infrastructure]. https://casecurity.org/mission/

CA / Browser Forum Transparency April May 2011 draft Baseline Requirements published and public comments solicited on Mozilla list (and over 100 comments were received and addressed or logged for resolution) May 2012 public discussion email list created June 2012 draft Network and Certificate System Security Requirements published for public comment on Mozilla list (no comments received) February 2013 member votes are fully public

Path Ahead for CAs / Browsers Address SSL/TLS vulnerabilities by gathering information and following up after workshop Improve coordination with WebTrust, ETSI, and other key stakeholders Code Signing Working Group to identify and address weaknesses in code signing PKI Increased public outreach and education on secure implementation of SSL/TLS