Certificate Policies and Certification Practice Statements



Similar documents
CMS Illinois Department of Central Management Services

TELSTRA RSS CA Subscriber Agreement (SA)

Ericsson Group Certificate Value Statement

Certification Practice Statement

VeriSign Trust Network Certificate Policies

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Symantec Trust Network (STN) Certificate Policy

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

Ford Motor Company CA Certification Practice Statement

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0

epki Root Certification Authority Certification Practice Statement Version 1.2

KIBS Certification Practice Statement for non-qualified Certificates

Gandi CA Certification Practice Statement

Certification Practice Statement

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

EBIZID CPS Certification Practice Statement

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

TeliaSonera Server Certificate Policy and Certification Practice Statement

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

EuropeanSSL Secure Certification Practice Statement

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24

phicert Direct Certificate Policy and Certification Practices Statement

SSL.com Certification Practice Statement

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

TR-GRID CERTIFICATION AUTHORITY

Fraunhofer Corporate PKI. Certification Practice Statement

thawte Certification Practice Statement

Advantage Security Certification Practice Statement

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

ETSI TR V1.1.1 ( )

Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1

TC TrustCenter GmbH. Certification Practice Statement

Statoil Policy Disclosure Statement

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

thawte Certification Practice Statement Version 2.3

ARTL PKI. Certificate Policy PKI Disclosure Statement

Visa Public Key Infrastructure Certificate Policy (CP)

- X.509 PKI SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

TR-GRID CERTIFICATION AUTHORITY

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Trusted Certificate Service (TCS)

Version 2.4 of April 25, 2008

CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates)

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS Aristotle University of Thessaloniki PKI ( WHOM IT MAY CONCERN

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Certificate Authority Product Overview Technology White Paper

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013

Government CA Government AA. Certification Practice Statement

Neutralus Certification Practices Statement

ENTRUST CERTIFICATE SERVICES

Getronics Certification Certificate of Authentic Trustworthy

HKUST CA. Certification Practice Statement

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Certification Practice Statement for TC TrustCenter Adobe Certified Document Services Certificates

DigiCert Certification Practice Statement

Trustwave Holdings, Inc

Land Registry. Version /09/2009. Certificate Policy

Danske Bank Group Certificate Policy

Certification Practice Statement. Internet Security Research Group (ISRG)

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION

How To Understand And Understand The Certificate Authority (Ca)

Trustis FPS PKI Glossary of Terms

Internet Security Research Group (ISRG)

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Trusted Certificate Service

Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement

Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5

SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement

ETSI TS V1.4.3 ( )

The Boeing Company. Boeing Commercial Airline PKI. Basic Assurance CERTIFICATE POLICY

e-mudhra CPS e-mudhra CERTIFICATION PRACTICE STATEMENT VERSION 2.1 (emcsl/e-mudhra/doc/cps/2.1) Date of Publication: 11 February 2013

WEBTRUST SM/TM FOR CERTIFICATION AUTHORITIES EXTENDED VALIDATION AUDIT CRITERIA Version 1.1 CA/BROWSER FORUM

ACXIOM. PUBLIC KEY INFRASTRUCTURE Certificate Policy Version 5.5

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

Lecture VII : Public Key Infrastructure (PKI)

Equens Certificate Policy

New York State Electronic Signatures and Records Act

Swiss Government Root CA II. Document OID:

Concept of Electronic Approvals

Based on: CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.

Independent Accountants Report

Certification Practice Statement

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)

SECOM Trust.net Root1 CA

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.03 May 3, 2011

Certificate Policy and Certification Practice Statement

Certification Practice Statement of CERTUM s Certification Services

RAPIDPIV-I Credential Service Certification Practice Statement Redacted

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Transcription:

Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved.

Certificate Policies and Certification Practice Statements Page 2 1. Background The automation of business processes introduces requirements for security services, such as confidentiality, integrity, authenticity and non-repudiation that can be satisfied by the Entrust TM range of products. Use of a Public Key Infrastructure (PKI) to support business processes within a single organization requires no more policy and procedures preparation than that required for any Information Technology (IT) infrastructure. Prudent businesses routinely prepare a system security policy, and the special provisions required for a PKI can be easily accommodated within such a policy. When security services involve independent organizations or security domains, they should be qualified by an explicit quality of service. This ensures that a user of the service does not anticipate a high quality of service or degree of assurance from a provider whose operating procedures are consistent with a lower degree of assurance. This situation could lead to what appears to the user to be a breach of security, even though the service provider has operated entirely within its own operating rules. Aspects of the system s operation that affect the degree of assurance are commonly documented in a system security policy. Where the system includes a PKI, users need to be able to determine the degree of assurance or trust which can be placed in the authenticity and integrity of the public keys contained in certificates issued by the Certification Authority (CA). Information upon which such determinations can be made is documented in the relevant Certificate Policy and Certification Practice Statement. 2. Overview A Certificate Policy, as defined in X.509, is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. In any organization that operates a PKI, a Policy Authority is required to select or develop and maintain the Certificate Policy. The Policy Authority is generally the same group as that which is responsible for the organization s IT security policy. It should include representatives from the human resources, finance, legal, audit and IT organizational units, to ensure the Certificate Policy is defined and maintained in conjunction with related policies in the organization. At some time in the future, industry forums are expected to establish standard Certificate Policies for their respective business sectors. At such time, a Policy Authority may simply adopt or adapt a model Certificate Policy from such an association. In the meantime, the Policy Authority must develop a Certificate Policy on its own. A Certification Practice Statement (CPS) is a statement of the practices that a CA employs in managing the certificates that it issues. The Operating Authority (usually an individual within the IT unit) is responsible for preparing and maintaining the CPS. The CPS should describe how the Certificate Policy is interpreted in the context of the system architecture and operating procedures of the organization. Copyright 2003 Entrust. All rights reserved. v1.0, February, 1997

Certificate Policies and Certification Practice Statements Page 3 While a Certificate Policy is defined independently of the specific details of the operating environment of the PKI, the corresponding CPS should be tailored to the organizational structure, operating procedures, facilities and computing environment of the Operating Authority. Use of a standard structure for Certificate Policy and CPS documents will help ensure completeness and simplify the assessment of the corresponding degree of assurance by users and other CAs. The following example illustrates the relationship between components of a Certificate Policy with the corresponding components of a CPS. The Certificate Policy generally states what is to be adhered to, while the CPS states how it is adhered to. The following Certificate Policy component Users will inform the Operating Authority immediately upon discovery that their private key has suffered unauthorized disclosure may be transformed by an Operating Authority into the following CPS component: All users (including end-users and operators of CAs) will be informed of the requirement to report unauthorized disclosure of their private key in an agreement, which they will sign prior to their being issued a certificate. Upon discovery of the unauthorized disclosure of the private key, users will be required to contact their CA, within one working day. The method of contacting the CA will be one of those listed in the CPS. When not in use, users will be required to keep all copies of their private key either on their person, or in a locked place. 3. Structure and Components Although a standard format for a Certificate Policy or CPS has not yet been finalized, a framework which includes a checklist of policy components has emerged. The items included in this checklist should be considered when establishing an organization s Certificate Policy and CPS. These components are outlined below. 3.1 Community and Applicability The CPS should identify the: Certificate Policies with which it claims to conform; order of magnitude of the user community that it is intended to serve, including the number of CAs and Registration Authorities (RAs); standards to which its external interfaces conform; name form used in its certificates; and the name-space (e.g. X.500 subtree) in which the CA intends to issue certificates.

Certificate Policies and Certification Practice Statements Page 4 3.2 Identification and Authentication The CPS should describe the mechanisms used to authenticate the identity of all principals, including Security Officer, Security Administrator, Directory Administrator and User. A brief statement of the privileges allocated to each role should be provided. 3.3 Key Management The key management component should describe how the key life-cycles of each of the system components (including the CAs, RAs and end-users) are managed. Additional components in the area of key management include choice of: certificate signing algorithm; certificate validity periods; and data signing algorithm. 3.4 Local Security Practices Local security practices are those that relate to the environment in which the major components of the PKI operate including: physical controls; personnel controls; and procedural controls. 3.5 Technical Security Practices Technical security practices deal with the required technical standards for the components of the system, including: computer security controls; network security controls; and cryptographic module engineering controls. 3.6 Operational Practices The operational practices describe the operating procedures for the CAs, RAs and endentities, including the topics of: registration of unique names; de-registration/revocation; key compromise; dismissal for cause; certificate update; disaster recovery; private key recovery; audit practices; and non-disclosure of personal information.

Certificate Policies and Certification Practice Statements Page 5 3.7 Legal Provisions The Certificate Policy may explicitly identify the statutes to which the PKI must conform, including data protection, privacy, access to information and legal wiretap legislation. The Certificate Policy should also state the purposes for which private keys are constrained to be used. Any limitation of warranty, requirements for acknowledgment of limitations by the certificate user and acceptance of obligations by the principal should be stated. Legal provisions need to be included for each of the following: CA liability; CA obligations; certificate user obligations; principal obligations; acceptance of limitation; and informed consent. 3.8 Cross-certification Agreements Independent organizations that wish to use one another s certificates should establish a cross-certification agreement between them. This agreement should formally commit both organizations to adhere to the CPS and clarify how disputes should be arbitrated in the event that loss is incurred as a result of a failure to comply. 3.9 Certificate and CRL Profile The CPS should include a profile of the certificates and CRLs and the directory schema. The profile should indicate which certificate and CRL extensions are present, whether they are marked critical or non-critical, which optional fields are included, what value ranges are allowed, and what action is expected of verifiers in response to any nonstandard extensions. The location of these attributes in the directory should be described. 3.10 CPS Administration The CPS should describe the procedures for development and maintenance of the CPS document. These should include the procedures for approving the CPS and the nature of those changes that should lead to the issuance of a new policy identifier. 4. Deployment and Use X.509 version 3 format certificates include a number of extension fields, some of which are useful in conveying information about Certificate Policy and the corresponding CPS. Given that both the specification of a Certificate Policy as well as the CPS may be lengthy, it is not generally feasible to include the full description of either directly in the certificate. The description of Certificate Policy and CPS can be made available in the same repository as that used for certificates and CRLs or through other means.

Certificate Policies and Certification Practice Statements Page 6 A Certificate Policy is represented in the certificate by a policy identifier in the certificatepolicies extension. This identifier is in the form of a registered Object Identifier (OID) assigned by the Policy Authority responsible for its development. In future, some OIDs for Certificate Policies agreed by business sector industry forums, are expected to be registered and become widely understood, eliminating the need for users to evaluate the full policy statement. The certificatepolicies extension is used to ensure that certificate users have an authentic and non-repudiable indication of the policy under which the certificate was issued, and hence the applications for which it is suitable. This extension helps to prevent a verifier from using a certificate for a purpose other than that intended by the issuing CA. This also prevents a signer from repudiating a signature on the grounds that he/she did not intend the associated signature to be used for that purpose. If the PKI is to be used solely for internal corporate confidentiality and integrity/authenticity services, then this extension may be omitted from certificates issued to corporate users. Furthermore, if the Certification Authority operates a single policy, then the extension can be omitted, as the policy implied by the certificate is the declared policy of the issuer. However, even if only one policy is required today, it may be prudent to include this extension, as it will ease the transition to a multi-policy environment in the future. The certificatepolicies extension also makes provision for policy qualifiers to further clarify the details of the policy identified by the policy identifier. Although standard syntax for these qualifiers is not yet set, the intention is that they will either contain a terse text description of the policy, or a pointer to the location of the full text of the Certificate Policy and/or CPS. If pointers use the GeneralizedName syntax defined in X.509, retrieval of these documents from a Web page or X.500 Directory system would be quite straightforward. The CPS can be presented as a single document, or it can be presented as a set of documents with one being a brief, user-friendly summary for endusers. When trust relationships are established between CAs, the Certificate Policies supported by each may not be identical. In support of cross-certification, the X.509 version 3 certificate format includes an extension field policymappings for CA certificates. This field is used to indicate that a particular policy supported by one of the CAs is considered equivalent by the other CA to a policy that it supports. The OIDs of the two policies are included in the extension field. 5. Summary Certificate Policies and Certification Practice Statements are key components in establishing the degree of assurance or trust that can be placed in certificates issued by CAs. In a restricted, single security domain environment, formalizing these policies and practices may not be required. However, if future plans are to expand beyond this restricted scope, more formal policy and procedure definition is required, through the use of Certificate Policy and CPS documents. This will help ensure that policies and practices can be easily interpreted and assessed by the users and administrators who need to determine the degree of assurance in certificates issued by a Certification Authority. The

Certificate Policies and Certification Practice Statements Page 7 planning, development and maintenance of a Certificate Policy as well as a CPS should be conducted in close cooperation with, and with input from, many organizational units to ensure consistency throughout the organization. Establishing this framework within an organization at the early stages of setting up a PKI will help simplify the task and ease its integration with the related business processes of the organization. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners. Copyright 2003 Entrust. All rights reserved.