Home

OpenTrust root CA Certification Policy

image

Contents

1. sesesssssssssssssseeess seen en tnnn enne nnns nnns entres nnns ss nr nennen n rene 49 4 11 ENG Ber Ee le LTE 49 412 Key Escrow and Recovery citet reri eet cine pas ee Du xa KE anna ca deed eng rase aea dete EE 49 412 1 SUBSCTIDE PEE EE D T 49 4 12 2 Session Key Encapsulation and Recovery Policy and Practices sssessssss 49 5 FACILITY MANAGEMENT AND OPERATIONAL CONTROLS 50 5 1 Physical Gomtrol p C 50 5 1 1 Site Location and Construction eene ne enne 50 b 1 2 Physical AGCOSS dienen dd ud gedreet Eegen 51 5 1 3 Power and Air Conditioning sessssesssssseeeee eene nnne nnne n nennen sinn enne nnns 53 5 14 Water EXpOSUFIOS iste em Pe n cd ung sane Deech Eed geed dese 53 OpenTrust All rights reserved 5 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 1 5 Fire Prevention and Protection cccccccccccececeeceeeeeeeeeeeeaaeeeeaeeeeaeeesaaesesaaeseeaeeesaeeseaaeseeaeesseeeaas 53 516 Media Storage HE Pc Ath alien he re aedi se Le da eX Pee Lade e t ru dL a Seed 53 bi Waste Disposal ene eerte cie fa eed tec di Prae ape e Fa PEE eese lianas 53 51 8 Off site Backup dii eren gc e ed cec Le LR Ar aet d En FR EUER SEE E Lg tne ag ect ed 53 5 2 Procedural Controls rri roble NE DEI RR ERE Ge ta heer rex ar eden 54 5 21 T sted e 54 5 2 2 Number of Per
2. rsaEncryption 1 2 840 113549 1 1 1 sha256WithRSAEncryption 1 2 840 113549 1 1 11 Sha512WithRSAEncryption 2 16 840 1 101 3 4 2 3 Key pair size is secp384r1 1 3 132 0 34 for the ecdsa algorithm id ecPublicKey 1 2 840 10045 2 1 ecdsa with SHA384 1 2 840 10045 4 3 3 7 1 4 Name Forms The Subject and Issuer fields of the Certificate shall be populated with a unique Distinguished Name in accordance with one or more of the X 500 series standards with the attribute type as further constrained by RFC5280 and section 3 1 7 1 5 Name Constraints The CA may assert non critical name constraints beyond those specified in the Certificate profiles in section 10 below for the CA certificate 7 1 6 Certificate Policy Object Identifier The CA shall contain The Certificate policy OIDs defined in this CP listed in section 1 2 of this CP in the certificate policy extension if it issues a Subscriber certificate which contains an OID listed in section 1 2 The CA shall contain either its list of Certificate policy OIDs defined in its CP approved by PMA in the certificate policy extension if it issues a Subscriber certificate which contains an OID listed in section 1 2 of its CP or OID for anyPolicy 7 1 7 Usage of Policy Constraints Extension Not applicable OpenrTrust All rights reserved 78 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2
3. 4 9 12 Specific Requirements in the Event of Private Key Compromise Entities that are authorized to submit revocation requests are required to do so as quickly as possible after being informed of the compromise of the private key For RCA ICA and CA certificates clear notification of revocation due to compromise of private key shall be published at a minimum on the PS website and possibly by other means other institutional websites newspapers The general terms and conditions of use applicable to the Subscribers certificates clearly state than in the event of the compromise of the private key or knowledge of the compromise of the private key of the CA that issued its certificate the subscriber must immediately and permanently stop using his her private key and the associated certificate 4 9 13 Suspension of token Not applicable 4 9 13 1 Circumstances for Suspension Not applicable 4 9 13 2 Who can Request Suspension Not applicable 4 9 13 3 Procedure for Suspension Request Not applicable 4 9 13 4 Limits on Suspension Period Not applicable 4 9 13 5 Resume certificate request Not applicable OpenrTrust All rights reserved 48 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 10 Certificate Status Services 4 10 1 Operational Features The OCSP service uses the Sub CA information 4 10 2 Service Availability
4. For vulnerability the following rules apply OpenrTrust All rights reserved 58 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Implement detection and prevention organizational and or technical controls under the control of the OA to protect PKI systems against viruses and malicious software Document and follow a vulnerability correction process that addresses the identification review response and remediation of vulnerabilities Undergo or perform a vulnerability scan i after any system or network changes that the PMA determines are significant for CA PS and OCSP and Customer for its PKI component and ii at least once per week on public and private IP addresses identified by the OA as the PKI s systems for CA RA PS and OCSP Undergo a penetration test on the PKI s systems on at least an annual basis and after infrastructure or application upgrades or modifications that the PMA for CA and Customer for RA determines are significant Foronline system record evidence that each vulnerability scan and penetration test was performed by a person or entity or collective group thereof with the skills tools proficiency code of ethics and independence necessary to provide a reliable vulnerability or penetration test and Track and remediate vulnerabilities according to enterprise cybersecurity policies a
5. Alert PMA or Customer if it s the Customer s OA when there is a security incident with the PKI services that the OA performed Respect and operate the section s of the CPS that deals with their duties this part of CPS has to be transmitted to the corresponding component Protect identity token and associated activation data Respect the agreement establish between Customer and OpenTrust Respect the agreement establish between Customer and OA Document their internal procedures to complete the global CPS and its security policy Representations and Warranties of Other Participants Relying Party Representations and Warranties Any relying party has the responsibility to validate a digital certificate using Only accept the use of the Certificate for the purposes indicated in the Certificate keyUsage extensions Verify the validity of the Certificate using the procedures described in RFC5280 prior to any reliance on said Certificate Check the OID contained in each certificate of the trusted certification path in order to be sure to accept the right kind of certificate Establish trust in the RCA ICA and CA who issued the Certificate by the methods outlined elsewhere in this CP and using the path validation algorithm outlined in RFC5280 Preserve the original signed data the applications necessary to read and process that data and the cryptographic applications needed to verify the digital signatures on that data for as long a
6. OpenrTrust All rights reserved 66 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 1 2 Private Key Delivery Not applicable 6 1 3 Public Key Delivery to Certificate Issuer 6 1 3 1 RCA The delivery of RCA public key is done during the key ceremony 6 1 3 2 ICA The delivery of ICA public key is done during the key ceremony 6 1 3 3 CA CA public keys are delivered securely to the relevant ICA or Root CA for certificate issuance during key ceremonies for set up of the PKI or during the registration process refer to section 4 1 and 4 2 above The delivery mechanism binds CA checked identities to the public keys to be certified using Pkcs 10 format 6 1 4 RCA Public Key Delivery to Relying Parties Refer to section 2 above for downloading the RCA certificate RCA certificate is also delivered by PMA to browser and some software vendors 6 1 5 Key Sizes 6 1 5 1 RCA The key pair is 4096 bits long for the RSA algorithm RSA algorithm is used with SHA 2 as hash function The key pair size is secp384r1 1 3 132 0 34 for the ecdsa algorithm ecdsa algorithm is used with SHA 2 as hash function 6 1 5 2 ICA The key pair is 4096 bits long for the RSA algorithm RSA algorithm is used with SHA 2 as hash function The key pair size is secp384r1 1 3 132 0 34 for the ecdsa algorithm ecdsa algorithm is used with SHA 2 as hash function 6 1 5 3
7. cit peace are ce dte e ctia gan a A stan een Mp ad dud eb ee aane ud Ra pad deed 90 9 16 4 Waiver of Rights and obligation ssssssssssssssesesenenenneen enne nnne nenne 90 9 16 5 Forc Malerei perte aaa eek pure cR pad beu Ek x ERR ERR HO Eu SEE REX gd ege 90 9 17 Other Wee EE 90 Cake EE 90 m re GOnNflICt Of de EE 90 9 17 93 Limitation Period on ere 90 9 17 4 Notice of Limited IHability uiuunt rrt dtr ea terae nete neo sene Eed 91 10 CERTIFICATE CRL AND OCSP PROFILE 92 gcc 92 DAMM aac 92 10 3 GA 93 OpenTrust All rights reserved 10 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST Securing Your Business Is Our Signature 10 4 OGSP or BGA and ICA tieses teen ertt re eripe oiv raus aieo leet d ed enge ede hi 105 CRETO RGA and IGA m OpenrTrust All rights reserved 11 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 1 INTRODUCTION 1 1 Overview OpenTrust owns Root Certificate Authorities RCAs that are used to create trust certification path for Subscriber Certificates according to web browser editors Microsoft Mozilla Foundation Google Apple Adobe CA certificate programs and CAB Forum requirements The present OpenTrust Root Certificate Authority Certificate Policy
8. 4 1 Certificate Application oiii RA I eden fedi RA aba ede se Edo ced dal 35 4 1 4 Who Can Submit a Certificate Appllcaton enne 35 4 1 2 Enrollment Process and Responsibilities sese 35 4 2 Certificate Application Processing essere nennen nnne nennen 38 4 2 1 Performing Identification and Authentication Functions esssseesseessesesiessresriesrissrrssrinsrrnsrreerrn 38 4 2 2 Approval or Rejection of Certificate Applications seeeeeeeeneeieeereesinesrresrnssrinsrnnsnnnsnnnnnsnn e 38 4 2 3 Time to Process Certificate Applications sss ener 39 4 3 Certificate TE TEE 39 4 3 1 CA Actions during Certificate Issuance sess nennen nennen 39 4 3 2 Notification to Subscriber by the CA of Issuance of Certificate sess 40 4 4 Certificate Accepta NCE senigis o 41 4 4 4 Conducting Certificate Acceptance eee nnne nnne nene 41 4 4 2 Publication of the Certificate by the P 41 4 4 8 Notification of Certificate Issuance by the CA to Other Enttes 41 4 5 Key Pair and Certificate Usage 41 4 5 1 Private Key and Certificate LUsane eene enne tenete 41 OpenTrust All rights reserved 4 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 5 2 Relying Party Public Key and Certificate Ueage sess 42 4 6 Certificate SCELERE 42 4 6 Root CAran
9. OPENTRUST i aah ill Securing Your Business Is Our Signature 7 1 8 Policy Qualifiers Syntax and Semantics Certificates issued under this CP may contain policy qualifiers such as user notice policy name and CP and CPS pointers as described in section 10 below 7 1 9 Processing Semantics for the Critical Certificate Policy Extension Processing semantics for the critical Certificate policy extension shall conform to X 509 certification path processing rules as described in section 10 below 7 2 CRL Profile Refer to section 10 below 7 3 OCSP Profile Refer to section 10 below OpenrTrust All rights reserved 79 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS In this section subsections are added to specify particular rule according choice made for CA between Technical constraint and Audit 8 1 Frequency or Circumstances of Assessment The PKI components that support PKI service for RCA ICA and CA all PKI component used by CA and RA to manage Subscriber Certificate are subject to periodic compliance audits at least once a year to allow the PMA to authorize or not based on the audit result PKI components hosted by the OA to operate under this CP according to the PKI audit guide provided by the PMA The PMA has the right to require non periodic compliance audit o
10. The certificate status service is available 24 out of 24 hours and 7 out of 7 days 4 11 End of Subscription The contract between Customer and OpenTrust deals with end of relationship 4 12 Key Escrow and Recovery 4 12 1 Subscriber 4 12 1 1 Which key pair can be escrowed Not applicable 4 12 1 2 Who Can Submit a Recovery Application Not applicable 4 12 1 3 Recovery Process and Responsibilities Not applicable 4 12 1 4 Performing Identification and Authentication Not applicable 4 12 1 5 Approval or Rejection of Recovery Applications Not applicable 4 12 1 6 KEA and KRA Actions during key pair recovery Not applicable 4 12 1 7 KEA and KRA Availability Not applicable 4 12 2 Session Key Encapsulation and Recovery Policy and Practices Not applicable OpenrTrust All rights reserved 49 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 FACILITY MANAGEMENT AND OPERATIONAL CONTROLS 5 1 Physical Controls 5 1 4 Site Location and Construction OA are located in France OA used for PKI service as described in the present CP is certified by external certified auditor against ETSI 101 456 and 102 042 and CAB Forum for EV SSL standards OA is yearly audited under ANSSI audit schema used for RGS and ETSI certification refer to http Avww lsti certification fr images liste entreprise ETSl 5 1 1 1 RCA and ICA The loc
11. certificate generation is audited by external qualified auditor according CAB Forum requirements According level of trust chosen for each type of Subscriber Certificate audit of the CA means all PKI component used by CA and RA and sample of Local Registration authority according the need of audit shall be conducted with the following rules CA issue Subscriber Certificate for External Subscriber o For DV SSL certificate level of Trust shall be ETSI 102 042 for DVCP plus relevant CA Information checklist as described in Mozilla Customer shall be successfully audited against this standard by external qualified auditor according schema 1 2 or 3 o For OV SSL certificate level of Trust shall be ETSI 102 042 for OVCP plus relevant CA Information checklist as described in Mozilla Customer shall be successfully audited against this standard by external qualified auditor according schema 1 2 or 3 o For EV SSL certificate level of Trust shall be at minimum ETSI 102 042 for EVCP plus relevant CA Information checklist as described in Mozilla Customer may choose also ETSI 102 042 for EVCP Customer shall be successfully audited against this standard by external qualified auditor according schema 1 2 or 3 o For other type of Subscriber certificate any level of trust among ETSI 102 042 and ETSI 101 456 plus relevant CA Information checklist as described in Mozilla One level of trust for each type of Subscriber Certif
12. document is called Certificate Policy CP hereunder The CP presents the requirements principles and procedures that OpenTrust implements to create and manage its own Root Certification Authority RCAs Intermediate Certification Authorities ICAs and internal or external Certification Authorities CAs Internal CAs are signing CAs Internal and External CAs only issue certificates to subscribers CA signed by RCA or ICA cannot issue CA certificates An internal CA is only represented by OpenTrust An External CA is always represented by a Customer of OpenTrust which has a valid contract with OpenTrust to cover service s defined in the CP and who wishes to have its CA certified by OpenTrust A CA or an ICA that is certified by an OpenTrust RCA or an ICA has to enforce the present CP Prior to certify a CA or an ICA OpentTrust verifies that the CA or the ICA that requests certification enforces a CP and a CPS approved by OpenrTrust In case a CA is not supported by a CP based on an identified standard as mentioned below it cannot be signed by a RCA or an ICA The present CP defines goals and requirements for Practices business legal and technical enforced by RCAs and ICAs to provide certification services that covers X 509 certificate life cycle management including enrolment issuance renewal and revocation of CA Certificates Practices legal organizational and technical enforced by RCAs ICAs and CAs to create and
13. 6 2 9 2 below RCA key is destroyed inside the HSM refer to section 6 2 9 1 below and only exist on backup format refer to section 6 2 4 1 below and ICA key is destroyed inside the HSM refer to section 6 2 9 2 below and only exist on backup format 4 3 2 Notification to Subscriber by the CA of Issuance of Certificate Not applicable OpenrTrust All rights reserved 40 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 4 Certificate Acceptance 4 4 1 Conducting Certificate Acceptance 4 4 1 1 RCA The PMA accepts the RCA certificate when the PMA s representative that witnesses the RCA key ceremony signs the RCA certificate issuance attestation Once the RCA certificate has been accepted the RCA may start signing certificate and CRL 4 4 1 2 ICA The PMA accepts the ICA certificate when the PMA s representative that witnesses the ICA key ceremony signs the ICA certificate issuance attestation Once the ICA certificate has been accepted the ICA may start signing certificate and CRL 4 4 1 3 CA The PMA accepts the CA certificate when the PMA representative that witnesses the CA certificate generation signs the CA certificate issuance attestation When the Customer doesn t attendee to the key ceremony then the Customer CA certificate shall control the CA certificate content before to use it and alert PMA if there is a mistake in the CA c
14. After the Customer agrees to the generation of the CA a key pair and CSR are generated for the CA with following requirements Prepare and follow a Key Generation Script Have an Auditor witness the CA Key Pair generation process or record a video of the entire CA Key Pair generation process refer to section 8 1 below Have an Auditor issue a report opining that the CA followed its key ceremony during its Key and Certificate generation process and the controls used to ensure the integrity and confidentiality of the Key Pair refer to section 8 1 below Generate the keys in a physically secured environment as described in the CA s Certificate Policy and Certification Practice Statement refer to section 5 1 above Generate the CA keys using personnel in trusted roles under the principles of multiple person control and split knowledge refer to section 5 2 and 5 3 above Generate the CA keys within cryptographic modules meeting the applicable technical and business requirements as disclosed in the CA s Certificate Policy and Certification Practice Statement refer to section 6 2 below Log its CA key generation activities Maintain effective controls to provide reasonable assurance that the Private Key was generated and protected in conformance with the procedures described in its Certificate Policy and Certification Practice Statement and its Key Generation Script refer to section 6 2 2 below
15. Applicable Law The CP is subject to applicable French and European laws rules regulations ordinances decrees and orders including but not limited to restrictions on exporting or importing software hardware or technical information and topics related to privacy and signature Customer and OpenTrust agree to conform to applicable laws and regulations in their contract 9 16 Miscellaneous Provisions 9 16 1 Entire Agreement This CP constitutes the entire understanding between the parties and supersedes all other terms whether expressed or implied by law No modification of this CP shall be of any force or effect unless in writing and signed by an authorized signatory Failure to enforce any or all of these sections in a particular instance or instances shall not constitute a waiver thereof or preclude subsequent enforcement thereof All provisions in this CP which by their nature extend beyond the term of the performance of the services such as without OpenrTrust All rights reserved 89 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature limitation those concerning confidential information and intellectual property rights shall survive such term until fulfilled and shall apply to any party s successors and assigns 9 16 2 Assignment Except where specified by other contracts only the OpenTrust may assign and delegate this CP to any party of
16. CA The key pair is 2048 bits long minimum for the RSA algorithm RSA algorithm is used with SHA 2 as hash function The key pair size is secp384r1 1 3 132 0 34 for the ecdsa algorithm ecdsa algorithm is used with SHA 2 as hash function 6 1 6 Public Key Parameters Generation and Quality Checking Public key parameters for RCA ICA and CA shall always be generated and checked in accordance with the standard that defines the crypto algorithm for the parameters that are to be used Random numbers for keys RCA ICA and CA shall be generated in FIPS 140 2 Level 3 or Common Criteria EAL 4 validated hardware cryptographic modules refer to section 6 2 below OpenrTrust All rights reserved 67 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 1 7 Key Usage Purpose as per X 509 v3 key usage field The use of a specific key is determined by the keyUsage extension in the X 509 Certificate The Certificate Profiles in section 10 below specify the allowable values for this extension for different types of Certificates defined under this CP and all RCA ICA and CA issued in accordance with this CP must adhere to those values 6 2 Private Key Protection and Cryptographic Module Engineering Controls 6 2 1 Cryptographic Module Standards and Controls The RCA ICA and CA generates its key pairs and stores their private keys within an HSM that is certifie
17. CPS has been reviewed by an auditor or compliance analyst competent in the operations of a PKI and when said person determines that the CPS is in fact in compliance with all aspects of this CP The auditor or compliance analyst shall be designated by PMA Additionally the auditor or compliance analyst may not be the author of the subject CPS and maybe internal employee of OpenTrust The PMA approves the CPS The PKI will be audited periodically to verify compliance as per PMA guidelines and standards approved by the PMA The Audit ensures that the CPS is implemented correctly and is compliant with the CP Further the PMA reserves the right to audit the PKI as set in section 8 of this CP 1 5 4 CPS Approval Procedures Amendments shall either be in the form of a new CPS with a sum up of the modifications or an update notice that contains the modifications and the references in the previous CPS The creation or modification of the existing CPS is at the discretion of the PMA A new CPS automatically replaces the previous one and becomes operational as soon as the PMA has approved it Any new CPS or update to the existing CPS must be verified compliant with this CP before approval 1 6 Definitions and Acronyms 1 6 1 Definitions Accreditation Formal declaration by a Designated Approving Authority that an Information System is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk S
18. Customer in order to determine if the PKI component needs to be rebuilt if only some certificates need to be revoked and or if the PKI component has been compromised In addition the Customer determines which services are to be maintained and how in accordance with the Customer business continuity plan Customer shall alert PMA in case of compromised PKI component Incident Compromise and Business continuity are covered in the Customer documentation which may also rely upon other enterprise resources and plans for implementation 5 7 2 Corruption of Computing Resources Software and or Data If PKI equipment is damaged or rendered inoperative but signature keys are not destroyed the operation is re established as quickly as possible with priority given to the ability to generate certificate status information OpenrTrust All rights reserved 61 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 7 3 Entity Private Key Compromise Procedures If a RCA ICA and or CA key is compromised lost destroyed or suspected of being compromised The PMA investigates on the key issue and revokes the associated certificate Anew key pair is generated and a new certificate is created Alert the Customer If a Customer s CA hosted by Customer s OA key is compromised lost destroyed or suspected of being compromised The Customer investi
19. and ICA certificate o Before start of service for the initial Sub CA and no later than 48 hours after generation of Sub CA certificates following a renewal or re key 2 4 Access Controls on Repositories The PS is responsible for the security policy set granting access to the published information All administration and content updating processes are always strongly authenticated by using the SSL protocol Access to read information is publicly and internationally available through the Internet in readily language for the following information for CP and Sub CA certificate OpenrTrust All rights reserved 29 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 3 IDENTIFICATION AND AUTHENTICATION 3 1 Naming 3 1 1 Types of Names The attribute fields for Issuer Name and Subject shall be compliant with RFC 5280 Details for the type of use coding are given below 3 1 1 1 RCA Content of a DN certificates is the following for RCA OpenTrust identity Issuer DN C FR O OpentTrust CN OpenTrust Root CA G lt N gt C FR O OpentTrust CN OpenTrust Root CA G lt N gt Where N is the number of the RCA created with for O OpenTrust It will start by 1 and then increased by 1 at the time of every renewal Content of a DN certificates is the following for RCA Certplus identity Issuer DN C FR
20. approved by PMA DN shall contain at least the fallowing information C SO country code of the legal entity that owns the CA OQ that contains the official legal name of the entity that owns the CA CN to identify the name of the CA 3 1 2 Need for Names to Be Meaningful The certificates issued pursuant to this CP are meaningful only if the names that appear in the certificates can be understood and used by Relying Parties Names used in the certificates must identify the legal person which owns the CA ICA and RCA in a meaningful way A key pair can be linked with only a unique DN for each RCA CA and ICA certificate 3 1 3 Anonymity or Pseudonymity of Certificate This policy does not permit anonymous certificates refer to section 3 1 2 above OpenrTrust All rights reserved 31 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 3 1 4 Rules for Interpreting Various Name Forms Relying parties shall use the subject name contained in the certificate refer to section 3 1 1 to identify the RCA ICA and CA 3 1 5 Uniqueness of Names DN contained in the certificate of RCA ICA and CA refer to section 3 1 1 above are unique in the RCA trust domain PMC controls that RCA ICA and CA certificates is unique by controlling the DN used in the RCA ICA and CA certificates and approving RCA ICA and CA creation 3 1 6 Recogn
21. below and only exist on backup format refer to section 6 2 4 1 below and ICA key is destroyed inside the HSM refer to section 6 2 9 2 below and only exist on backup format 4 3 1 4 Customer s CA whom CA s key pair are not performed by OpenTrust s OA The PMA shall transmit the CA certificate request to the OA The OA shall authenticate the CA certificate request prior the generation of the CA certificate Transmission of the CA certificate request and CSR shall be performed in a manner which ensures the integrity of the information OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role The following actions must occur during a CA Key Ceremony which shall be witnessed by an OPENTRUST PMA witness Customer may have also a witness e RCA private key is activated to sign CA certificate refer to section 6 2 6 1 6 2 7 1 and 6 2 8 1 below or ICA private key is activated to sign CA certificate refer to section 6 2 6 2 6 2 7 2 and 6 2 8 2 below e At the end of the key ceremony the CA private key is deactivated refer to section 6 2 9 3 below CA key is destroyed inside the HSM refer to section 6 2 9 3 below and only exist on backup format refer to section 6 2 4 3 below At the end of the key ceremony the RCA private key is deactivated refer to section 6 2 9 1 below ICA private key is deactivated refer to section
22. component and does not weaken the security of this authentication control Implement a process technical and or organizational that disables all privileged access of an individual to the PKI component within 24 hours upon termination of the individual s with trusted role employment or contracting relationship with the PKI component Enforce strong authentication for administrator access to all PKI components Computer Security Rating No stipulations 6 6 Life Cycle Technical Controls 6 6 1 System Development Controls The system development controls for the PKI are as follows Use software that has been designed and developed under a formal documented development methodology according to Common Criteria evaluation Hardware and software procured shall be purchased in such a way so as to reduce the likelihood that any particular component was tampered with Hardware and software shall be developed in a controlled environment and the development process shall be defined and documented This requirement does not apply to commercial off the shelf hardware or software All hardware must be shipped or delivered via controlled methods that provide a continuous chain of accountability from the purchase location to the operations location The hardware and software shall be dedicated to performing the PKI activities There shall be no other applications hardware devices network connections or component software installed which a
23. description of the PKI and procedure used by CA and RA OID that identifies the level of trust of the CA and which is contained at least in the Subscriber certificate Type of Subscriber certificates to be issued by CA SSL email protection signature for machine signature for physical protection Type of Subscriber for each type of Subscriber Certificate Internal or External For SSL TLS Certificate and email certificate under Mozilla program choice for the CA certificate between audit against ETSI standards or CAB Forum for SSL TLS refer to section 8 below or technical constraint refer to section 10 3 below o If Subscribers are only internal Customer may choose to have only technical constraint o f some Subscribers are external Customer shall choose to have audit against ETSI standards refer to section 8 below o If Technical constraint choice is made then following information shall be provided All the domain name to be set in extension Name Constraint for dnsNames if Subscriber Certificate are for SSL certificate and or email protection to be set in the CA certificate refer to section 10 3 below All the domain name to be set in extension Name Constraint for rfic822names if Subscriber Certificate are for email protection to be set in the CA certificate refer to section 10 3 below All the possible Extended Key Usage that are set in the Subscriber Certificate in o
24. e eE MM 17 IEEE euet M 18 1 4 Certificate and Private Key Usage 18 1 4 1 Appropriate Certificate LUse A 18 1 4 2 Prohibited Certificate Use A 20 1 5 Policy Administration bee H 20 1 5 4 Organization Administering the Document 20 1 5 2 Crudurutt et E M 20 1 5 8 Person Determining CPS Suitability for the Policy sssssseeeennn 21 1 5 4 CPS Approval Procedures eese entente trnr inneren reins inneren 21 1 6 Definitions and Acronyms ssssssssssssssssesesenneen enne nri treten nennen AEEA nAn Ennn Ennn n eset nenrrnn innen 21 161 ilii e 21 1 0 2 een MS sariei tsi T ubi Deve Rep rei ID E 27 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES 29 2 1 Jesi 29 2 2 Publication of Certification Information ssessssssssssseseseeee nennen nennen nen nennen 29 2 3 Time or Frequency of Publication 0 2 2 0 ce ceeeeeece cece ee eeeeeeeeeeeeeeee cae eeeeaee scenes ennemis nnns tene nre 29 2 4 Access Controls on Repositories cceeeceeeeeeeceeeeeaeeeeeeeeceaeeeeaaeeeeneeceaeeeseaeeseaaeseeeeseaaeeseaeeseeeeeeaees 29 3 IDENTIFICATION AND AUTHENTICATION 30 3 1 EE ul e a E E TE E A E E T E 30 OpenTrust All rights reserved 3 ww
25. generation is video recorded and performed according to a key ceremony script The HSM used for the key ceremony is compliant with requirements defined in section 6 2 1 below ICA key pair generation is undertaken and witnessed in a physically secure environment refer to section 5 1 1 1 and 5 1 2 1 above by personnel in trusted roles refer to section 5 2 above under at least dual supervision Private Key activation data are distributed to activation data holders that are trusted employees ICA key generation is carried out within a hardware security module refer to section 6 2 below Witnesses are persons other than the operational personnel who perform the key ceremony As trusted role witness can only have HSM activation and Key pair protection ICA activation and initialization is under the control of RCA activation data holders During the key ceremony the ICA key pair is backed up refer to section 6 2 below OpenrTrust All rights reserved 65 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The key pair and certificate generation process shall create a verifiable audit trail that the security requirements for procedures were followed The documentation of the procedure shall be detailed enough to show that appropriate role separation was used 6 1 1 3 CA hosted by OpenTrust After the PMA agrees to the generation of the CA a key pai
26. in the ICA certificate refer to section 3 1 1 above Legal Entity which owns ICA identification data i e full name and legal status of the associated legal person or other organizational entity and any relevant existing registration information e g company registration of the associated legal person or other organizational entity CSR associated with the generated key pair refer to section 6 1 1 The CSR shall be included in the application if the ICA s key pair has been generated before the key ceremony to issue ICA certificate Identity of the RCA to be used to sign the ICA certificate Validity period of the ICA certificate Cryptographic information of the ICA certificate ICA Certificate content Authorized representative information o The full name including surname and given name s of the representative o The full name and legal status of the authorized representative s Employer o Professional phone number and email of the authorized representative o A place of business physical address or other suitable method of contact for the authorized representative The ICA certificate request shall be signed by the authorized representative If the signature is electronic signature then PMA shall first authorize means to be used for electronic signature and validation of the electronic signature of the ICA certificate request The ICA certificate request has to be submitted in a due delay in order to be sure to ha
27. is deactivated refer to section 6 2 9 1 below and destroyed inside the HSM refer to section 6 2 9 1 below and only exist on backup format 4 3 1 2 ICA The PMA transmits the ICA certificate request to the OA The OA authenticates the certificate request before issuance OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role The ICA certificate is generated during a key ceremony using an ICA key pair refer to section 6 1 1 2 below and the Root CA private key is activated to sign ICA certificate refer to section 6 2 6 1 6 2 7 1 and 6 2 8 1 below During the key ceremony the ICA private key is backed up refer to section 6 2 4 2 below At the end of the key ceremony the RCA private key is deactivated refer to section 6 2 9 1 below ICA private key is deactivated refer to section 6 2 9 2 below RCA key is destroyed inside the HSM refer to section 6 2 9 1 below and only exist on backup format refer to section 6 2 4 1 below and ICA key is destroyed inside the HSM refer to section 6 2 9 2 below and only exist on backup format 4 3 1 3 OpenTrust s CA and Customer s CA whom CA key pair are performed by OpenTrust s OA The PMA shall transmit the CA certificate request to the OA The OA shall authenticate the CA certificate request prior to the generation of the CA key pair and CSR Transmission of the certificate reque
28. its corresponding CPS PMA main mission at minimum are the following Approves PKI services and prices to be delivered by the PKI infrastructure Approves the Certificate Policy Approves CA creation and revocation Define PMA audit guide Approves the choice of RCA and ICA used to sign CA Approves cryptographic specification algorithms used for signature encryption authentication hash functions and key length operational lifetime for the PKI systems and any related change according a survey made on international standards Approves the choice of cryptographic tokens that generate keys and host Subscriber s certificates Approves CA s CP and level of trust chosen by Customer for its CP This will guarantee the required level of interoperability and acceptance by RCA Approves compliance between security practice documents and related policies for instance CPS CP Approves final annual internal audit report of all the PKI s components Approves external audit report of RA performed by OpenTrust Manage external audit of RA Conduct risk analysis for all PKI services and PKI component and defines security policy and procedure for OA according ISO 27005 and ISO 27001 method Approves procedures defined by Customer for Subscriber management Guarantees the validity and the integrity of the PKI published information Ensures that a proper process to manage security incidents within the PKI serv
29. key as specified in section 5 6 and be coherent with cryptographic constraint as specified by international standards refer to section 6 1 5 Same procedures as the ones applied for initial generation apply for a new CA certificate and associated key pair generation refer to sections 4 1 4 2 4 3 and 4 4 above Dedicated CP mapping and audit may be necessary to renew a CA certificate depending of the requested modification A CA Certificate request shall be processed 4 9 Certificate Revocation and Suspension 4 9 1 1 RCA A RCA certificate is revoked when the binding between the certificate and the public key it contains is considered no longer valid Examples of circumstances that invalidate this binding are The private key is suspected of compromise The private key is compromised The RCA can be shown to have violated the stipulations of the present CP End of RCA services Privilege attributes asserted in the RCA certificate are reduced Changein the key length size or algorithm recommendation coming from PMA or international standard institutes 4 9 1 2 ICA An ICA certificate is revoked when the binding between the certificate and the public key it contains is considered no longer valid Examples of circumstances that invalidate this binding are The RCA is revoked The private key is suspected of compromise The private key is compromised The ICA can be shown to have violated the stipulations of t
30. or CA using same current public key of the ICA and CA Log trail generation that includes records that are used either for audit purposes or for analysis in order to solve incident Publication service publication of RCA ICA and CA certificate life cycle management information and all relevant information related to the use of PKI services CRL issued by RCA and ICA OCSP services RCA and ICA may deliver OCSP status information for the CA certificate according type of certificate issued by CA mandatory for all kind of SSL certificate Establishing RCA ICA CA compliance prior to the generation of a CA and ICA certificate by the RCA or ICA OpenTrust determines the mapping between the CA and ICA CP CPS and the present CP and supervise RCA ICA and CA audit This task is performed by the PMA The CP gives the security requirements applicable to all PKI services while the associated Certification Practice Statement CPS will give more details on practices enforced by each components participating in the PKI activities 1 3 1 Policy Management Authority PMA The PMA is the PKI lead authority and is managed by OPENTRUST The PMA approves CP and Certification Practice Statement CPS used to support the PKI certification services The PMA defines the organization of PKI components and services is in charge of nominating the PKI components and verifying the compliance of the services they deliver with applicable sections of the CP and
31. related to a certificate issued by this PKI or any service involving certificates issued by this PKI certificate is not commenced prior to such time any such action shall be barred 9 17 4 Notice of Limited Liability This CP makes no claims that should be construed to be an agreement between any parties nor does it imply any liability for any parties OpenrTrust All rights reserved 91 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST EFFAN Securing Your Business Is Our Signature 10 CERTIFICATE CRL AND OCSP PROFILE 10 1 RCA 2 version Defined by the software Refer to section 3 1 1 1 above Subject Refer to section 3 1 1 1 above f Key generation algorithm amp OID Refer to section 7 1 3 above Subject Public Key Info Key size Refer to section 6 1 5 above Refer to section 7 1 3 above riticali Authority Key denter FALSE keyidentfe Defined by Sofware used nkeyceremony Subject Key Identifier Fasg Methods of generating key ME Defined by Software SHA1 160bits of the subject public key TRUE keyCertSign EES f Basic Constraint TRUE cA pathLenConstraint None Signature algorithm amp OID 10 2 ICA Base Certificate Value ersion 2 version 3 erial number Defined by the software ssuer Refer to section 3 1 above otBefore YYYY MM DD HH MM SS Z certificate issuance date otAfte
32. section 8 The processes procedures and audit framework used to determine compliance are documented within the CPS The PMA ensures that all requirements on a PKI component as detailed in the present CP and in the corresponding CPS are implemented as applicable to deliver and manage certification services The PMA has the responsibility for compliance with the procedures prescribed in this CP even when PKI component functionality is undertaken by sub contractors PKI components provide all their certification services consistent with their CPS The PMA is responsible to notify Subscriber and Relying Party using PS information as stated in section 2 above and application software suppliers and Customer Mozilla CAB Forum through direct communication managed by PMA in case of RCA and or ICA private key has been lost stolen potentially compromised due to compromise of activation data or other reason OpenrTrust All rights reserved 85 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill 9 6 2 Securing Your Business Is Our Signature RCA and ICA Representations and Warranties Common obligations for RCA and ICA components are 9 6 3 Protect and guarantee integrity and confidentiality of their activation data and or private key Only use their private key and certificate with associated tools specified in CPS for the purpose they have been generated as defined in the CP
33. start operation without prior approval of the PMA OpenrTrust All rights reserved 15 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 1 3 3 Intermediate CA ICA OpenrTrust is the owner of ICAs under the present CP An ICA is a particular CA that is not a Root CA and whose primary function is to issue Certificates to other CAs An ICA is represented by an authorized person named Authorized Representative The Authorized Representative is appointed by the legal entity that owns the ICA ICA is always used and protect in offline mode ICA is never connected to any kind of network The ICA supports the following PKI services Generation of ICA key pair Generation of CA and OCSP certificates Revocation of CA certificates Rekey of a CA certificates Log trail generation An ICA operates its services according to this CP and its corresponding CPS An ICA cannot start operation without prior approval of the PMA 1 3 4 Certification Authorities CA CAs are either owned by OpenTrust or by OpenTrust Customers A CA is represented by an authorized person named Authorized Representative The Authorized Representative is appointed by the legal entity that owns the CA An authorized representative can manage several CAs In general the authorized representative is in charge of all the PKI services supported by the CA that a
34. strictly control the service quality of Certificates issued or containing information verified by a RA by having a trusted role employed by the CA perform ongoing quarterly audits against a randomly selected sample of at least the greater of one certificate or three percent of the Certificates verified by the RA in the period beginning immediately after the last sample was taken The CA shall review each RA s practices and procedures to ensure that the RA is in compliance with the relevant Certificate Policy and or Certification Practice Statement used to manage Subscriber certificate 8 2 Identity Qualifications of Assessor Qualified auditors shall demonstrate competence in the field of compliance audits and shall be thoroughly familiar with requirements of these CP Compliance auditors must perform such compliance audits as a primary responsibility The PMA shall carefully review the methods employed to audit PKI components for its own audit requirements base The PMA is responsible for selecting the auditor for its own audit task as required in section 8 1 above In addition the PMA must approve selected auditors when it is an external auditor selected either for PMA audit need or by Customer audit need to be compliant with requirements defined in section 8 1 above External auditor shall be qualified auditor according CAB Forum Internal auditor used by PMA to lead audit shall be certified by a national accreditation to carry out ISO 27001 a
35. that act as RAs for its CA s In the contract between Customer and OpenTrust all CA obligations as described in the CP are included Customer defines rules that CA and RA shall implement and select the level of trust for Subscriber Certificates management among ETSI 102 042 and ETSI 101 456 standard and CAB Forum requirements Customer validates the CP and CPS used by its CA and RA to manage Subscriber Certificates The CP and CPS shall be consistent with RFC 3647 same structure 1 3 9 2 Relying Parties Relying Parties are entities that rely on the validity of the binding of a Subscriber identity to a public key A Relying Party is responsible for deciding how to check the validity of a Subscriber certificate at least by checking the appropriate certificate status information using CRLs and CRLs or OCSP responses for the Subscriber CA ICA and Root CA certificates A Relying Party may use information in the certificate such as Certificate Policy identifiers to determine the suitability of the certificate for a particular use Relying parties trust certification path provided by the RCA as Subscriber Certificates are issued under defined level of trust ETSI 101 456 ETSI 102 042 and CAB Forum 1 4 Certificate and Private Key Usage 1 4 1 Appropriate Certificate Use 1 4 1 1 RCA RCA certificate shall be only used to validate RCA ICA CA certificates CRLs and Subscriber certificates it has delivered RCA private key sha
36. to notify Subscribers and relying parties that they must not trust Subscriber certificate identified in the list provided by Customer Archives all audit logs and other records prior to terminating the PKI Archived records are transferred to an entity designated by Customer In the event of the termination of the OA services the OA is responsible for keeping all relevant records regarding the needs of Subscriber and PKI components The OA then transmits its records to the Customer OpenrTrust All rights reserved 64 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 TECHNICAL SECURITY CONTROLS 6 1 Key Pair Generation and Installation 6 1 1 Key Pair Generation 6 1 1 1 RCA After the PMA agrees to the generation of the RCA a key pair and RCA certificate are generated for the RCA The operation of the RCA key pair and RCA certificate generation is video recorded and performed according to a key ceremony script Key ceremony operation require to have a Qualified Auditor issue a report opining that the CA followed its key ceremony during its Key and Certificate generation process and the controls used to ensure the integrity and confidentiality of the Key Pair The HSM used for the key ceremony is compliant with requirements defined in section 6 2 1 below RCA key pair generation is undertaken and witnessed in a physically secure environment r
37. treats its own most confidential information 9 3 2 Information Not Within the Scope of Confidential Information All information that is published by the PS is considered to be not confidential 9 3 8 Responsibility to Protect Confidential Information PKI components shall be responsible for protecting the confidential information they possess in accordance with the applicable laws and contracts PKI components must not disclose certificate or certificate related information to any third party unless authorized by this policy required by law government rule or regulation or order of a court of competent jurisdiction as stated in contract between Customer and OpenTrust and as stated in France for OpenTrust 9 4 Privacy of Personal Information 9 4 1 Privacy Plan For the purposes of the PKI related services PKI components may collect store or process personally identifiable information Any such use or disclosure shall be in accordance with applicable laws and regulations specifically the European Data Protection Act and the present Certification Policy OpenTrust manages personal data according applicable laws and regulations specifically the European Data Protection Act and French law and the present Certification Policy Customer manages personal data according applicable laws and regulations specifically the European Data Protection Act and the present Certification Policy Entity CA and RAs shall develop a privacy policy accord
38. under at least dual supervision Private Key activation data are distributed to activation data holders that are trusted employees RCA key pair is carried out within a hardware security module refer to section 6 2 and below Witnesses are persons other than the operational personnel RCA private key is activated to sign CRL refer to section 6 2 6 1 6 2 7 1 and 6 2 8 1 below At the end of the key ceremony the RCA private key is deactivated refer to section 6 2 9 1 below RCA key is destroyed inside the HSM refer to section 6 2 9 1 below and only exist on backup format refer to section 6 2 4 1 below The current RCA issued CRL is replaced by the new one in the PS PMA can decide in this particular case to also destroy the ICA private key backup after all CA certificate issued by ICA has been revoked 4 9 3 3 CA Revocation of the CA certificate requires also revocation of all Subscriber certificates CA has issued The revocation of an ICA certificate requires the authorization of 2 distinct individuals acting as permanent members of the PMA CA revocation request is transmitted to the OA by the PMA The OA authenticates the CA revocation request during a face to face meeting OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role The operation is video recorded and performed according to a key ceremony script
39. 1 Certplus Root CA G2 http get ocsp certificat com certplusrootcag2 4 9 10 On line Revocation Checking Requirements The response of the OCSP system for CA and ICA validity status is based on the RCA and ICA information OCSP is mandatory only for RCA and ICA used to sign CA that issue SSL certificate Revocation entries on an OCSP Response shall not be removed until after the expiration date of the revoked ICA and or CA Certificate OCSP responses for ICA and CA status shall be signed by an OCSP responder whose OCSP Certificate is signed by the RCA and ICA that issued the ICA or CA Certificate whose revocation status is being checked OCSP response shall have the following format for RCA and ICA COEM Responder ID OCSP s public key hash ProducedAT Date and time of the OCSP response signature Cenin Subscriber s certificate serialNumber Sub CA issuerKeyHash and Sub er CA issuerNameHash OpenTrust All rights reserved 47 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature EN This Update Date and time of the verification of the Certificate Next Update 10 days maximum CertStatus Good Revoked or unknown Used if and only if the user Application provides a value for this field nonce and reused in full extensions No extension referenced 4 9 11 Other Forms of Revocation Advertisements Available Not applicable
40. 7 days OpenrTrust All rights reserved 46 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah BN Securing Your Business Is Our Signature PS ensures that superseded CRLs are removed from the repository upon posting of the latest CRL 4 9 8 Maximum Latency for CRLs RCA issues CRL at least each year but CRL is valid for 1 year ICA issues CRL at least each year but CRL is valid for 1 year Revocation entries on a CRL shall not be removed until after the expiration date of the revoked ICA and or CA Certificate OpenTrust maintain CRL for RCA and ICA publication capability with resources sufficient to provide a response time of ten seconds or less under normal operating conditions 4 9 9 On line Revocation Status Checking Availability If CA doesn t include CRL in the signed document therefore Sub CAs shall support online status checking OCSP service in order to include an OCSP response in the signed document OpenTrust maintain OCSP capability with resources sufficient to provide a response time of ten seconds or less under normal operating conditions URLs for RCA s OCSP are the followings OpenTrust Root CA G1 http get ocsp certificat com opentrustrootcaq1 OpenTrust Root CA G2 http get ocsp certificat com opentrustrootcag2 OpenTrust Root CA G3 http get ocsp certificat com opentrustrootcag3 Certplus Root CA G1 http get ocsp certificat com certplusrootcag
41. A system Other data or applications sufficient to verify archive contents All work related to or from the PMA and compliance auditors Oo O0o000000000 000000 0 The Customer shall retain all documentation relating to certificate requests and the verification thereof and all Certificates and revocation thereof for at least seven years after any Certificate based on that documentation ceases to be valid OpenrTrust All rights reserved 59 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature PMA and Customer shall retain any audit logs generated in a way to make it available to its auditor upon request 5 5 2 Archive Retention Period The minimum retention period for archived data is defined in section 5 5 1 above The PMA and Customer decide according the archive owner to delete or keep all or part of the archives at the end of the retention period of each archive 5 5 3 Archive Protection The archives are created in such a way that they cannot be easily deleted or destroyed within their defined retention period Archive protection ensures that only authorized people can access them Archives are held in a manner that ensures integrity authenticity and confidentiality of data 5 5 4 Archive Backup Procedures If the original media cannot retain the data for the required period a mechanism to periodically transfer the archived data to n
42. Access to cabinet used for equipment is dedicated to the OA s trusted roles only Require two person physical access controls for both the cryptographic HSM and activation data for CA CA backup key shall be stored in a safe that fit the requirements set for RCA and ICA safe refer to section 5 1 1 1 and 5 1 2 1 above A security check of the facility housing equipment shall occur if the facility is to be left unattended At minimum the check shall verify the following The equipment is in a state appropriate for the current mode of operation For off line components all equipment is shut down Any security containers tamper proof envelopes safes are properly secured Physical security systems e g door locks vent covers electricity are functioning properly The area is secured against unauthorized access OpenrTrust All rights reserved 52 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Removable cryptographic modules shall be deactivated prior to storage When not in use removable cryptographic modules and the activation data used to access or enable cryptographic modules shall be placed in safe Activation data shall either be memorized or recorded and stored in a manner commensurate with the security afforded the cryptographic module and shall not be stored with the cryptographic module in a way to
43. CA and ICA and safe physical secured area OA uses human to continually monitor the OA facility housing equipment on a 7x24x365 basis The OA facility is never left unattended 5 1 1 2 CA RA and PS The location and construction of the facility of the OA housing CA RA and PS equipment and data log archive HSM server Subscriber request form network security component shall be consistent with facilities used to house high value and sensitive information The site location and construction when combined with other physical security protection mechanisms such as intrusion sensors shall provide robust protection against unauthorized access to equipment and records OA for OpenTrust s CA are located in France Customer s OA shall be installed in location approved by PMA OpenrTrust All rights reserved 50 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The OA shall implements policies and procedures to ensure that the physical environments in which CA RA and PS equipment are installed maintains a high level of security that guarantee Is separated into a series of progressively secure physical perimeter at least 2 The entrances and exits from the secure areas are under constant video surveillance and all systems that provide authentication as well as those that record entry exit and network activity are in secured areas Two fac
44. Deficiency The PMA may determine that PKI components do not comply with obligations set forth in this CP In the case of non compliance the PMA may suspend operation of the non compliant PKI component or may decide to discontinue relations with the affected PKI component or decide that other corrective actions have to be taken When the compliance auditor finds a discrepancy with the requirements of this CP the following actions shall be performed The compliance auditor notes the discrepancy The compliance auditor notifies the Entity of the discrepancy The auditor and the Entity shall notify the PMA promptly The party responsible for correcting the discrepancy determines what further notifications or actions are necessary pursuant to the requirements of this CP and then proceeds to make such notifications and take such actions without delay in relation with the approval of PMA Depending upon the nature and severity of the discrepancy and how quickly it can be corrected the PMA may decide to temporarily halt operation of a PKI component typically end relationship with a Customer temporally or definitively to revoke a certificate issued by the PKI component or take other actions it deems appropriate Based on the audit result the PMA can decide to revoke CA 8 5 Communication of Results An Audit Compliance Report including identification of corrective measures taken or being taken by the component is provided to t
45. I TS 102 042 V2 4 1 2013 02 Technical Specification Electronic Signatures and Infrastructures ESI Policy requirements for certification authorities issuing public key certificates CRYPTO ETSI TS 102 176 1 V2 0 0 2007 11 Technical Specification Electronic Signatures and Infrastructures ESI Algorithms and Parameters for Secure Electronic Signatures Part 1 Hash functions and asymmetric algorithms Adobe CP for CDS Adobe Systems Incorporated CDS Certificate Policy October 2005 Revision 14 CAB Forum https cabforum org Microsoft http technet microsoft com en us library cc751157 aspx Mozilla https www mozilla org en US about governance policies security group certs policy inclusion and https wiki mozilla org CA Information checklist Adobe http Awww adobe com misc pdfs Adobe Root CPS v062004clean pdf 1 2 Document Name and Identification The CP is the OpenTrust property The CP is named OpenTrust RCA CP The CP has a registered policy object identifier OID that is 1 3 6 1 4 1 22234 2 14 3 1 This CP for RCA and ICA and CA certificate life cycle is compliant with ETSI 102 042 PTC BR 1 3 PKI Components OPENTRUST has established a Policy Management Authority PMA to manage PKI components and services The PKI is composed of the components described hereafter and supports the following services PKI services Generation of Root CA key pair generates the Root CA key pairs d
46. I equipment even if those services are enabled for other devices on the network Segment PKI equipment into networks or zones based on their functional logical and physical including location relationship Only authorized flow used for administration and PKI services between PKI equipment shall be authorized Maintain and protect PKI components in at least dedicated zone and make a separation between interfaces accessible from Internet to interfaces accessible by internal needs front end and back end like N Thirds architecture shall be in place Dedicated and distinct networks zones shall be implemented for RA and CA manage by distinct firewalls Implement and configure an administration network a system used to provide security support functions such as authentication network boundary control audit logging audit log reduction and OpenrTrust All rights reserved 76 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature analysis vulnerability scanning anti virus when it is applicable and IT administration that protects systems and communications between PKI systems and communications with non PKI systems outside those zones including those with organizational business units that do not provide PKI related services and those on public networks Configure each network boundary control firewall switch router gateway or other network co
47. ICA Representations and Warranties sse 86 OpenTrust All rights reserved 9 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 9 6 3 CA Representations and Warranties enne enne 86 9 6 4 Customer Representations and Warranties enne 86 9 6 5 OA Representations and Warranties entnehmen nnne nenne 87 9 6 6 Representations and Warranties of Other Participants sseesseesseeeseeeeeseseeernennneennsennsnnssennee 87 9 7 Disclaimers of Warranties A 87 9 8 Limitations ot Liability esse nace tensa iene 88 9 9 leit TEE 88 9 10 Term and Termination ooi Idee Rare Lace tenere ERR tages a Face ERR eege reae Ra ceux ee 88 SMS 88 NICA IEEE EE 88 9 10 3 Effect of Termination and Survival sesenta 88 9 11 Individual Notices and Communications with Parttcpamts 88 9 12 jAmendimetis EE 88 9 12 1 Procedure for Amendment A 88 9 12 2 Notification Mechanism and Period sssssssssssssssssseseeee ener nnne 89 9 12 3 Circumstances under Which OID Must Be Change 89 9 13 Dispute Resolution Provisions eene ennemi nnns tens inne e nes 89 9 14 Governing LAW ATE 89 9 15 Compliance with Applicable Law enemies nnne enne 89 9 16 Miscellaneous PDrovielons eee nnne ener nnns Enan st tenr enr sinn site ne tnn ees 89 9 16 1 Entire Agreement 89 9 16 2 Ee ET 90 9 16 3 Severability
48. Log management Data from the authentication process for Subscribers and PKI components Date time phone number used persons spoken to and end results of verification telephone calls Acceptance and rejection of certificate requests Certificate creation Certificate renewal HSM management Key creation use and destruction Activation data management Role management IT and network management as they pertain to the PKI systems PKI documentation management Security management Successful and unsuccessful PKI system access attempts PKI and security system actions performed Security profile changes System crashes hardware failures and other anomalies Firewall and router activities and entries to and exits from the OA facility At minimum each audit record includes the following either recorded automatically or manually for each auditable event Type of event Trusted date and time the event occurred Result of the event success or failure where appropriate Identity of the entity and or operator that caused the event Identity for which the event is addressed Cause of the event OpenrTrust All rights reserved 57 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 4 2 Log Processing Frequenc PKI operation audit logs are reviewed on an annual basis by the member of the OA responsible for audits who conducts a re
49. O Certplus CN Certplus Root CA G lt N gt C FR O Certplus CN Certplus Root CA G lt N gt Where N is the number of the RCA created with for O Certplus It will start by 1 and then increased by 1 at the time of every renewal 3 1 1 2 ICA Content of a DN certificates is the following for ICA under RCA OpenTrust identity Issuer DN C FR O OpentTrust OpenrTrust All rights reserved 30 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Subject DN The DN contained in the ICA certificate will be the DN contained in the certificate request signed by the authorized representative DN is approved by PMA DN shall contain at least the fallowing information C FR O OpenTrust CN to identify the name of the ICA Content of a DN certificates is the following for ICA under RCA Certplus identity Issuer DN C FR O Certplus CN Certplus Root CA G lt N gt Subject DN The DN contained in the ICA certificate will be the DN contained in the certificate request signed by the authorized representative DN is approved by PMA DN shall contain at least the fallowing information C FR O Certplus CN to identify the name of the ICA 3 1 1 3 CA The DN contained in the CA certificate will be the DN contained in the certificate request signed by the authorized representative DN is
50. OPENTRUST Oe ahi Securing your business is our signature Certificate Policy OpenTrust RCA Program 19 02 2015 OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST Commercial brand of KEYNECTIS Headquarter 11 13 rue Ren Jacques 92 131 Issy les Moulineaux Cedex France Tel 33 0 1 55 64 22 00 Fax 33 0 1 55 64 22 01 www opentrust com OPENTRUST eRe Securing Your Business Is Our Signature OPENTRUST RCA PROGRAM ER EE EEN Emmanuel Montacutelli OpenTrust Diffusion List External X Internal 12 05 2014 Creation of the version 1 0 30 01 2015 1 1 EM Integration of new rules for JYF OSCP and a comment for CAA 19 02 2015 1 2 EM Integration of compliance with JYF ETSI 102042 PTC BR reference OpenrTrust All rights reserved 2 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST IU Securing Your Business Is Our Signature CONTENTS 1 INTRODUCTION 12 1 1 eh M E 12 1 2 Document Name and Identification sessi nnne 13 1 3 PKI Gomponents EE 13 1 3 1 Policy Management Authority PMA sess nennen enses 14 1 3 2 Root Certificate Authority HCA enne trnr enne nnns 15 1 3 3 Intermediate CA CA 16 1 3 4 Certification Authorities CA 16 1 8 5 Registration Authority DA 16 1 3 6 Operational Authority OA enne enses n trnr stress nnne neis 17 VE Ve e le Ee 17 13 8
51. RCA or ICA key pair according which has to be used for the revocation operation is undertaken and witnessed in a physically secure environment refer to section 5 1 above by personnel in trusted roles refer to section 5 2 above under at least dual supervision Private Key activation data are distributed to activation data holders that are trusted employees RCA or ICA key pair is carried out within a hardware security module refer to section 6 2 and below Witnesses are persons other than the operational personnel RCA private key is activated to sign CRL refer to section 6 2 6 1 6 2 7 1 and 6 2 8 1 below or ICA private key is activated to sign CRL refer to section 6 2 6 2 6 2 7 2 and 6 2 8 2 below At the end of the key ceremony the RCA private key is deactivated refer to section 6 2 9 1 below RCA key is destroyed inside the HSM refer to section 6 2 9 1 below and only exist on backup format refer to section 6 2 4 1 below or ICA private key is deactivated refer to section 6 2 9 2 below ICA key is destroyed inside the HSM refer to section 6 2 9 2 below and only exist on backup format refer to section 6 2 4 2 below The current RCA or ICA issued CRL is replaced by the new one in the PS OpenrTrust All rights reserved 45 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature For OpenTrust s CA PMA can decide in this particular case to also d
52. Respect and operate the section s of the CPS that deals with their duties this part of CPS has to be transmitted to the corresponding component Allow the auditor team to control and check the compliance with the present CP and with the components CP CPS and communicate requested information to them in accordance with the intentions of the PMA Document their internal procedures to complete the global CPS Use every means technical and human necessary to achieve the realization of the CP CPS it has to implement and for which they are responsible Alert PMA in case of incident due to RCA and or ICA CA Representations and Warranties The CA has the responsibility to 9 6 4 Protect and guarantee integrity and confidentiality of their activation data and or private key Only use their cryptographic key and certificate with associated tools specified in CPS for what purpose they have been generated as defined in the present CP Respect and operate the section s of the present CP and CPS and its CP and its CPS that deals with their duties this part of CPS has to be transmitted to the corresponding component Allow the auditor team to control and check the compliance with the present CP and with its CP CPS and communicate the requested information to them in accordance with the intentions of the PMA Document their internal procedures to complete their global CPS Use every means technical and human necessary to achieve the realizati
53. SP responses and Subscribers certificates it has delivered CA private key is allowed to sign the following types of certificates CACSR Subscriber certificate among them OCSP certificate OCSP certificate CRL J OCSP response Mechanisms are provided not to issue OCSP responses directly to Internet incoming request CA signed by ICA within Adobe CA program shall only be used to sign Subscriber Certificate for physical persons and for machines according to Adobe CPS and its own CP Additionally ETSI 102 042 or ETSI 101 456 requirements apply and to CA s CP that shall be approved by the PMA SSL certificate shall not be issued by CA signed by an ICA within Adobe CA program CAs that are not part of the Adobe CA program shall only sign Subscriber Certificate according to requirements defined in ETSI 102 042 ETSI 101 456 standards CAB Forum and Mozilla and Microsoft publication Subscriber Certificates for machine that are SSL TLS certificates Organization Validated Domain Validated and EV SSL shall be issued in accordance with the requirements of the CAB Forum requirements and according to requirements defined in ETSI 102 042 OV DV and EV certificate level 1 4 1 4 Subscriber The uses of private key are the following OpenrTrust All rights reserved 19 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Sign
54. TF s RFC 3647 as An instrument that supplements a CP or CPS by disclosing critical information about the policies and practices of a CA PKI A PDS is a vehicle for disclosing and emphasizing information normally covered in detail by associated CP and or CPS documents Consequently a PDS is not intended to replace a CP or CPS PKI Disclosure Statement PDS IETF Working Group chartered to develop technical specifications for PKI components based on X 509 Version 3 Certificates Private Key The Private Key of a Key Pair used to perform Public Key cryptography This key must be kept secret The Public Key of a Key Pair used to perform Public Key cryptography The Public Key is made freely available to anyone who requires it The Public Key is usually provided via a Certificate issued by a Certification Authority and is often obtained by accessing a repository Public Key A set of policies processes server platforms software and workstations OpenrTrust All rights reserved 25 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 Public Key OPENTRUST i aah ill Securing Your Business Is Our Signature Infrastructure used for the purpose of administering Certificates and public private Key PKI Pairs including the ability to issue maintain and revoke Public Key Certificates Two mathematically related keys having the properties that i one key can be used to encrypt data that can only be decrypted usi
55. a manner that any information cannot be used to recover any part of the private key All the ICA private key back ups have to be destroyed in a manner that any information cannot be used to recover any part of the private key If the functions of HSM are not accessible in order to destroy the key contained inside then the HSM has to be physically destroyed The destruction operation is realized in a physically secure environment refer to section 5 1 above by personnel in trusted roles refer to section 5 2 above under at least dual control 6 2 10 3 CA Destroying CA private key inside an HSM requires destroying the key s inside the HSM using the zeroization function of the HSM in a manner that any information cannot be used to recover any part of the private key All the CA private key back ups have to be destroyed in a manner that any information cannot be used to recover any part of the private key If the functions of HSM are not accessible in order to destroy the key contained inside then the HSM has to be physically destroyed The destruction operation is realized in a physically secure environment refer to section 5 1 above by personnel in trusted roles refer to section 5 2 above under at least dual control 6 2 11 Cryptographic Module Rating The Hardware Security Module used to generate RCA ICA and CA key pairs is at least approved in accordance with FIPS 140 2 Level 3 standard or EAL4 Common Criteria equivalent 6 3 Other As
56. agement 71 6 3 1 Public Key re TN 71 6 3 2 Certificate Operational Periods and Key Pair Usage Periods ssssssssssssss 72 E Me Een EE 72 6 4 1 Activation Data Generation and Installation 72 6 4 2 Activation Data Protechon seen enne nennen nsns sn nnns innen reris en nene 73 6 4 8 Other Aspects of Activation Data 73 6 5 Comip ter Sec rity eut 73 6 5 1 Specific Computer Security Technical Requirements s sse 73 6 5 2 Computer Security Hattng A 75 6 6 Life Cycle Technical Controls AAA 75 6 6 1 System Development Controls sse nennen nnne enne nnne nnns 75 6 6 2 Security Management Controls eene enne nnne treten nennen nennen nennen 76 6 6 3 Life Cycle Security Controls ener enne 76 6 7 Network Security Controls esses eene enne ennt nr inttr inre n rentrer enne 76 671 RCAand ICA EE 76 6 7 2 Online PKI eomponent ener entente ind nr interit reni nnns nennen nnns 76 6 8 Time Stamping BEE 77 7 CERTIFICATE CRL AND OCSP PROFILES 78 7 1 Certificate Profile een AUR EC eal EE TR ele sa DE ROPA ERR ERR capsa 78 FAA Version N mbers ue RI ee HEEL ELIGE ROLE Lil dence 78 7 1 2 Certificate Eviensions enne nnne entente nsn snnt sentent nsn a ns intr nennen nnns 78 7 1 3 Algorithm Object Identifiers enne nnne nennen nnne nns 78 Z Name FOM aami nenna RD e CREE RESI RUE CE LAE VOR SEE C ELEME RU BEL Dae Oad 78 AS Name Constraints ii iei ERG a ee RETE CR R EL Re EENS cu
57. al person during face to face meetings refer to section 5 2 below or equivalent method with that provides the same level of security assurance authorized by PMA Evidence of the individual is verified by the PMA or the OA using the following rules Verification of one 1 National Government issued ID document that contains a picture of the individual The identification process has to be done by a trusted in charge of security operation refer to section 5 2 below PMA records unique identification numbers and ID card from the Identifier ID of the verifier and from an ID of the individual 3 2 4 Validation of Authority The PMA appoints and authorizes the OA to generate RCA ICA and CA certificates under its control The PMA controls authority of a CA authorized representative to act on behalf of the Customer that owns the CA 3 2 5 Non Verified Subscriber Information There is no non verified information used by the PMA to fill a RCA ICA and CA Certificate 3 2 6 Criteria for Interoperation Certificates delivered by PKI components are managed according to the rules and requirements stated by the PMA The RCA certificate is a self signed certificate and is never signed by another CA never certified by an external CA or never cross certified with a CA The ICA certificate is signed by RCA s and never receives a certificate from another external CA never certified or cross certified with other external CA ICA is onl
58. all the PMA has to compare the CA s CP with the selected level of trust for reference standard to be full filled this operation is called CP mapping During the mapping process the PMA shall also check that CA applies all relevant CA Information checklist as described in Mozilla This mapping is done by the PMA using its internal Audit guide document For the mapping the PMA needs to involve experts for Legal cryptography security and PKI matters The mapping has to be done to compare the security of the management of the CA and Subscriber certificates with the one stated in the standard selected by owner of the CA or PMA If the mapping is successful then PMA can continue the process If the mapping is not successful then PMA shall request change in the CA s CP If the requested change are accepted then process can be continued if not process is stop and CA certificate can t be issued OpenrTrust All rights reserved 38 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature After successful CP mapping then the CA s PKI has to be audited as defined in section 8 below PMA study audit report of the CA s PKI The PMA either determines that the CA s PKI meets the compliance audit requirements or that the CA s PKI is not able to address remaining issues When CA s PKI doesn t meet the compliance audit requirement then CA s PKI
59. all be deemed to include the feminine and masculine and all terms used in the singular shall be deemed to include the plural and vice versa as the context may require The words hereof herein and hereunder and other words of similar import refer to this CP as a whole as the same may from time to time be amended or supplemented and not to any subdivision contained in this CP Words include and including when used herein are not intended to be exclusive and mean respectively include without limitation and including without limitation 9 17 2 Conflict of Provisions In the event of a conflict between the provisions of this CP the CPS and any Subscriber General Term of Use the order of precedence shall be CP CPS and then Subscriber General Term of Use 9 17 3 Limitation Period on Actions Any legal actions involving a dispute that is related to this PKI or any services provided involving a certificate issued by this PKI shall be commenced prior to the end of date defined in contract between OpenTrust and Customer the period in dedicated by PMA after either the expiration of the certificate in dispute or the date of provision of the disputed service or services involving the PKI certificate whichever is earlier If any action OpenrTrust All rights reserved 90 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST rad ol Securing Your Business Is Our Signature involving a dispute
60. ally constrained with Extended Key Usage extension then the publication of the Customer CA certificate is not mandatory o In case the Customer CA is not technically constrained with Extended Key Usage extension the CA certificate is published by the PS at http www OpenTrust com PC CRL refer to section 4 9 6 below J OCSP refer to section 4 9 9 below CPS and all documents referenced by CPS are not published for security reason because it contains sensitive details about means organization and procedure implemented by OA These documents shall be made available to auditors as required during any audit performed on PMA request OpenTrust ensures that terms and conditions are made available to Subscribers and Relying Party as following Subscriber terms and conditions are shown to the Subscriber during the registration process made by RA Relying Party terms and conditions and information as required by ETSI to be published for Relying party are already contained in the present CP in sections 1 4 4 5 2 5 5 9 9 6 9 7 and 9 8 Customer is responsible to establish and make available particular terms and conditions to complete ETSI requirements for Relying Party and Subscriber 2 3 Time or Frequency of Publication Information identified in section 2 2 above is made available CF o Before start of service for the initial CP o No later than 48 hours after any CP update or replacement is approved by the PMA RCA
61. ame and legal status of the authorized representative s Employer Professional phone number and email of the authorized representative A place of business physical address or other suitable method of contact for the authorized representative The RCA certificate request shall be signed by the authorized representative If the signature is electronic signature then PMA shall first authorize means to be used for electronic signature and validation of the electronic signature of the RCA certificate request The CA certificate request has to be submitted in a due delay in order to be sure to have a new RCA certificate and operational RCA s key pair before the expiration of the current RCA s private key refer to section 5 6 1 and 6 3 2 below The date of submission has also to take in account the time required for approval refer to section 4 2 3 below Associated to the RCA certificate request the Authorized representative shall join its copy of a National Government issued ID containing its picture PMA stores copy of Authorized representative s ID 4 1 2 2 ICA ICA certificates must be authorized by the PMA prior to issuance The issuance process will include documenting the following information to be contained in the ICA certificate request OpenrTrust All rights reserved 35 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Identity to set
62. and staff in trusted roles shall be free from any commercial financial and other pressures which might adversely influence trust in the services it provides 5 3 Personnel Controls 5 3 1 Qualifications Experience and Clearance Requirements PMA Customer and OA components employ a sufficient number of personnel who possess expert knowledge experience and appropriate qualifications necessary for the job functions and services offered PKI personnel fulfill the requirements of expert knowledge experience and qualifications through formal training and credentials actual experience or a combination of the two Trusted roles and responsibilities as specified in the CPS are documented in job descriptions and clearly identified PKI personnel sub contractors have job descriptions defined to ensure separation of duties and least privilege and position OpenrTrust All rights reserved 55 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature sensitivity is determined based on the duties and access levels background screening and employee training and awareness PKI personnel shall be appointed to trusted roles by the PMA and Customer for their respective roles 5 3 2 Background Check Procedures PMA Customer and OA employees in trusted roles shall be free from conflicting interests that might prejudice the impartiality of the PKI operations The Custom
63. arily infeasible to obtain revocation information then the Relying Party must either reject use of the Certificate or make an informed decision to accept the risk responsibility and consequences for using a Certificate whose authenticity cannot be guaranteed to the standards of this policy Such use may occasionally be necessary to meet urgent operational needs The PMA SHALL provide Subscribers Relying Parties Application Software Suppliers and other third parties with clear instructions for reporting suspected RCA ICA and CA Private Key Compromise RCA ICA and CA Certificate misuse or other types of fraud compromise misuse inappropriate conduct or any other matter related to Certificates The PMA SHALL publicly disclose the instructions through a readily accessible online means refer to section 2 above URLs for RCA s CRL distribution point are the followings OpenTrust Root CA G1 http get crl certificat com public opentrustrootcaq1 cl OpenTrust Root CA G2 http get crl certificat com public opentrustrootcag2 crl OpenTrust Root CA G3 http get crl certificat com public opentrustrootcag3 crl Certplus Root CA G1 httpz get crl certificat com public certplusrootcagl crl Certplus Root CA G2 http get crl certificat com public certplusrootcaq2 cr 4 9 7 CRL Issuance Frequency RCA issues CRL every year ICA issues CRL every year CRL publication service availability is 24 out of 24 hours and 7 out of
64. arties use the trusted certification path and associated public keys for the purposes constrained by the certificates extensions such as key usage extended key usage certificate policies etc and to authenticate the trusted common identity of Subscriber certificates Relying parties has to be aware of the security rules to be deployed in the Customer electronic transaction for the usage of a Subscriber certificate A Subscriber certificate is used to identify for example Subscriber as a physical person who sometimes belongs to an entity Relying party has to check additional information key usage OID policy in order to accept and use the right Subscriber certificate in the electronic transaction The relying party has to use all the required information in the certificate DN as described in section 3 1 1 above extensions in order to be sure to accept the right Subscriber A Subscriber certificate can t be used without preliminary check from Relying party like for example trusted path additional information only known from Subscriber and Relying party in order to register the Subscriber s certificate and Customer information about Subscriber enrollment and use of signed document verifiable using Subscriber certificate 4 6 Certificate Renewal According to RFC 3647 certificate renewal is a process in which only the validity period and the serial number of the certificate are changed neither the public key nor any other informatio
65. ases the CA may List CRL choose to split a CRL into a series of smaller CRLs When a Subscriber chooses to accept a Certificate the Relying Party Agreement requires that this Relying Party check that the Certificate is not listed on the most recently issued CRL Certificate Validity Period The certificate validity period is the time interval during which the CA warrants that it will maintain information about the status of the certificate OpenrTrust All rights reserved 22 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah Securing Your Business Is Our Signature Certification Path also called trusted path or trusted certification chain Certification Practice Statement CPS Common Criteria Compromise Confidentiality Cryptographic domain for HSM Delegated Third Party Directory Disaster Recovery Plan Distinguished Name Domain name Domain name space Electronic Signature Opentrust All rights reserved RFC 3280 A chain of multiple certificates needed to validate a certificate containing the required public key A certificate chain consists of a RCA certificate anchor CA certificate and the Subscriber certificates signed by the CA A statement of the practices which a CA employs in issuing and revoking Certificates and providing access to same The CPS defines the equipment and procedures the CA uses to satisfy the requirements specified
66. asonable search for any evidence of malicious activity and following each important operation A Statistically significant sample of security audit data generated by their PKI business entity since the last review shall be examined where the confidence intervals for each category of security audit data are determined by the security ramifications of the category and the availability of tools to perform such a review as well as a reasonable search for any evidence of malicious activity OA review log on day to day basis for IT and physical security The OA shall explain all significant events in log audit report Such reviews involve verifying that the log has not been tampered with there is no discontinuity or other loss of audit data and then briefly inspecting all log entries with a more thorough investigation of any alerts or irregularities in the logs Actions taken as a result of these reviews shall be documented 5 4 3 Retention Period for Audit Logs Records related to PKI operation are held on the OA site for at least one year before being archived 5 4 4 Protection of Audit Log Event logs are protected in such a way that only authorized users can access them Events are logged in such a way that they cannot be easily deleted or destroyed except for transfer to long term media within the period of time that they are required to be held Event logs are protected in such a way so as to remain readable for the duration of their storag
67. atch 6 8 Time Stamping Electronic or manual procedures shall be used to maintain system time Clock adjustments are auditable events as listed in section 5 4 above Key ceremony uses a manual procedure For secured time on audit records all PKI system components shall regularly synchronize with a time service such as Network Time Protocol NTP Service Time derived from the time service shall be used for establishing the time of Initial validity time of a Subscriber Certificate Initial validity time of CRL and OCSP response OpenrTrust All rights reserved 77 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 7 CERTIFICATE CRL AND OCSP PROFILES 7 1 Certificate Profile 7 1 4 Version Numbers Issued certificates are X 509 v3 Certificates populate version field with integer 2 Refer to section 10 7 1 2 Certificate Extensions Any RCA ICA and CA asserting critical private extensions shall be interoperable in their intended community of use RCA ICA and CA may include any extensions as specified by RFC 5280 in a Certificate but must include those extensions required by this CP Any optional or additional extensions shall be non critical and shall not conflict with the Certificate and CRL profiles defined in this CP Section 10 contains these Certificate profiles 7 1 3 Algorithm Object Identifiers The following OID are used
68. ates shall include an organization identity of the Customer that owns the CA authorized representative are required to indicate all useful Customer s identity information The legal existence legal name legal form and provided address of the organization must be verified either through a registration body in the jurisdiction of incorporation formation of the organization or an alternative suitable Qualified Government Information Source QGIS or Qualified Independent Information Source QIIS Alternatively a legal opinion providing additional confirmation of any of the facts required to authenticate the organization s identity may be sought OpenrTrust All rights reserved 32 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Prior to issuance CA certificate PMA shall ensure the existence of the Organization This shall include a verification of suitable proofs of physical and legal existence The PMA shall verify this information as well as The authorization of the representative s sending requests to the PMA to act on behalf of the legal entity that owns the CA The authenticity of the request it receives 3 2 3 Authentication of Physical Person Identity Evidence of the individual identity of a person who has a trusted role refer to section 5 2 below is authorized representatives or Witness is checked by the PMA and OA against a physic
69. ation and construction of the facility of the OA housing RCA and ICA equipment and data HSM activation data backup of key pair computer log key ceremony script certificate request shall be consistent with facilities used to house high value and sensitive information RCA and ICA shall be operated in a dedicated physical area separated from other PKI component physical area The OA has implemented policies and procedures to ensure that the physical environments in which the RCA and ICA equipment are installed maintains a high level of security that guarantee ls isolated from outside networks RCA and ICA are never connected to any kind of network Is separated into a series of progressively secure physical perimeter at least 2 The entrances and exits from the secure physical areas are under constant video surveillance and all systems that provide authentication as well as those that record entry exit and network activity are in secured areas Sensitive data HSM key pair backup activation data tore in dedicated safe located in dedicated physical area under multiple access control The security techniques employed are designed to resist a large number and combination of different forms of attack The mechanisms used include at minimum Perimeter alarms closed circuit television reinforced walls and motion detectors Two factor authentication using Biometrics and badge to go in and out in the R
70. ation status information CRL signed by CA to all Relying parties if any The CA signed by the ICA stops delivering certificates in accordance with and referring to this CP and in accordance with its CP In the case of a compromised CA the PMA and OA both use secure means to notify Subscribers and relying parties that they must delete all trust certificates representing the CA with the compromised s key pair s Archives all audit logs and other records prior to terminating the PKI Archived records are transferred to the PMA OpenrTrust All rights reserved 63 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature In the event of the termination of the OA services the OA is responsible for keeping all relevant records regarding the needs of Subscriber and PKI components The OA then transmits its records to the PMA 5 8 4 Customer s CA and RA In the event of the termination of the CA service the Customer provides notice prior to the termination and Inform PMA by register letter Destroys the CA private key Publishes the most recent revocation status information CRL signed by CA to all Relying parties if any Publishes the most recent revocation status information CRL signed by CA to all Relying parties if any The RA stops delivering certificates request to the CA In the case of a compromised CA the Customer use secure means
71. ature private key physical person used to sign electronic data Authentication private key physical person used to realize SSL connection SSL private key machine used to establish SSL connection IPSEC VPN private key machine used to establish VPN connection Secure email Physical person used secure email Encryption private key physical person used to decrypt data OCSP signature private key machine used to sign OCSP response TSA signature private key machine used to sign time stamp token Code signing Device signature private key used to sign document in the name of legal entity Used to sign CSR Pkcs 10 format The uses of certificate are the following Signature certificate used to verify electronic signature Authentication certificate physical person used to be authenticated SSL Authenticate a signed code and verify its integrity SSL certificate Server used to be authenticated as an authorized web site FQDN IPSEC VPN certificate used to be authenticated during VPN connection Secure email certificate Physical person used to be authenticated during email transmission Encryption certificate physical person used to encrypt data OCSP signature certificate used to verify OCSP response TSA signature certificate used to verify time stamp token Device signature certificate used to validate signature of document Use of key pairs is also defined by ETSI requirements regarding segre
72. avoid only one person having access to private key A person or group of trusted role shall be made explicitly responsible for making such checks When a group of persons is responsible a log identifying the person performing a check at each instance shall be maintained If the facility is not continuously attended the last person to depart shall initial a sign out sheet that indicates the date and time and asserts that all necessary physical protection mechanisms are in place and activated 5 1 3 Power and Air Conditioning The OA ensures that power and air conditioning facilities are sufficient to support the operation of the PKI system using primary and back up installations 5 1 4 Water Exposures The OA ensures that systems are protected in a way that minimizes impact from water exposure 5 1 5 Fire Prevention and Protection The OA ensures that systems are protected with fire detection and suppression systems 5 1 6 Media Storage Media used within the OA are securely handled to protect media from damage theft and unauthorized access Media management procedures are implemented to protect against obsolescence and deterioration of media within the period of time that records are required to be retained Sensitive data shall be protected against being through re used storage objects e g deleted files being accessible to unauthorized users OA shall maintain an inventory of all information assets and shall assign a classification
73. bscribers An RA operates its services according to the CA CP and its corresponding CPS An RA cannot start operation without prior approval of the CA owner When a CA wants to be signed by an OpenTrust RCA or ICA its RA is fully audited by the PMA When LRAs are used only a sample of LRAs may be audited by the PMA refer to section 8 below 1 3 6 Operational Authority OA The Operational Authority OA is the entity that hosts and manages all the software hardware and HSM used to support PKI services of the CP The OA is the entity which sets up and realizes all operations that support the PKI services The CPS gives details on how each service is provided to each PKI component PKI components are operated by OPENTRUST that is the OA for the OpenTrust s CA ICA and RCA and Publication Service PS Customer that is the OA for the Customer s CA Entity designated by CA for RA CAs that are not hosted by OpenTrust but in an OA designated by an Opentrust Customer shall be compliant with the requirements given in the CP applicable to an OA refer to chapter 5 and 6 below OA operates its services according to the CP and the corresponding CPS and its own CP and CPS The OpenTrust s OA cannot start operation without prior approval of the PMA 1 3 7 Publication Service PS is owned by OpenTrust and operated by OpenTrust The PS repository provides the following PKI services Publication service refer to section 2 below L
74. btrees 2 Subtrees 0 Max IP Address 0000 0000 0000 0000 0000 0000 0000 0000 Mask 0000 0000 0000 0000 0000 0000 0000 0000 This technical constraint shall be set only if the CA is not audited by external auditor against ETSI standard according Extended Key Usage section 8 above and is not signed by ICA used for Adobe Value set in Subscriber Certificate 10 4 OCSP for RCA and ICA Base Certificate Value ersion 2 version 3 Serial number Defined by the software ssuer DN of RCA or ICA that issues the OCSP certificate refer to section 3 1 OpenrTrust All rights reserved 94 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST Bsp Securing Your Business Is Our Signature above otBefore YYYY MM DD HH MM SS Z certificate issuance date otAfter Refer to section 6 3 above C FR O same as RCA or ICA that issues the OCSP certificate OU 0002 478217318 CN OCSP RESPONDER lt CN of RCA or ICA that issues the OCSP certificate gt lt date de KC gt lt additional information used for unicity gt Key generation algorithm amp OID Refer to section 7 1 3 above Subject Public Key Info Key size Refer to section 6 1 5 above Refer to section 7 1 3 above N Signature algorithm amp OID Criticality True False ue ase d Defined by Software used in key ceremony ms Defined by Software SHA1 160bits of the subject public
75. cad 78 7 1 6 Certificate Policy Object Identifier essent enne nnne 78 7 1 7 Usage of Policy Constraints Extension 78 7 1 8 Policy Qualifiers Syntax and Semantics ssssssssssssssseeseeeeneennee nennen 79 7 1 9 Processing Semantics for the Critical Certificate Policy Extension 79 7 2 GRE Poll ote Eeer LE 79 73 OCSP Te EE 79 8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS 80 8 1 Frequency or Circumstances of Aesesement sesseessessesrietrittiestietitttttttnnntnnntnnnnntntnnnenn nnn tnt 80 OpenTrust All rights reserved 8 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OP ENTRUST eaaa Securing Your Business Is Our Signature 8 1 4 CA with Technical constraint SSL certificate only 81 8 12 CA Irnit rmal audit iae ep ru ene te ab o Prae aere deret eade EL dae Ai 81 8 2 Identity Qualifications of Aesessor nennen nennen nnn snnt nes 81 8 3 Topics Covered by Assessment sssssssssssssssssese einen entente tentis nnt sentent neis 82 8 4 Actions Taken as a Result of Deficency eene nnne nnne ns 82 8 5 Communication of TEE 82 9 OTHER BUSINESS AND LEGAL MATTERS 83 9 1 E c 83 9 1 1 Certificate Issuance or Renewal Fees 83 9 12 Certificate ACCESS E 83 9 1 3 Revocation or Status Information Access Fees 83 9 1 4 Fees for Other Servis eot ter eite aede le ie agde ea Pe eV a f
76. city of certificates issued under this CP Relying parties may only use these RCA ICA and CA certificates at their own risk OpenTrust assumes no liability what so ever in relation with the use of certificate or associated public private key pairs for any use other than those described in the present CP CPS Customer is liable as regards the accuracy of all information contained in the CA certificate and Subscriber Certificate management 9 9 Indemnities OpenTrust makes no claims as to the suitability of certificates issued under this CP for any purpose whatsoever Relying parties use these RCA ICA and CA certificates at their own risk OpenTrust has no obligation to make any payments regarding costs associated with the malfunction or misuse of certificates issued under this CP 9 10 Term and Termination 9 10 1 Term This CP and subsequent versions shall be effective upon approval by the PMA 9 10 2 Termination In the event that the PKI services ceases to operate a public announcement must be made by the PMA for Subscriber and Relying Party using PS information as stated in section 2 above for and application software suppliers and Customer Mozilla CAB Forum through direct communication managed by PMA Upon termination of service the PMA will properly archive its records including certificates issued CP CPS and CRL according to section 5 8 above 9 10 3 Effect of Termination and Survival End of validity of the present CP
77. clients OpenTrust s ICA may be available in Adobe software to simplify recognition and provide trust to subscriber certificates Being signed OpenrTrust All rights reserved 12 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature by an OpenTrust RCA or an ICA means that all certificates the CA and the ICA delivers will be recognized everywhere at any time in the Internet and application exchanges with an identical level of trust The present CP is consistent with the Internet Engineering Task Force IETF Public Key Infrastructure X 509 IETF PKIX RFC 3647 Internet X 509 Public Key Infrastructure Certificate Policy and Certification Practice Statement Framework This CP is based on RFC 3647 Certificate Policy and Certification Practices Framework issued by the Internet Engineering Task Force IETF RFC 5280 http www ietf org rfc ric5280 txt ETSI 101 456 Requirements of ETSI 101456 without SSCD for qualified certificate only Electronic Signatures and Infrastructures ESI policy requirements for certification authority issuing qualified certificates ETSI TS 101 456 v 1 4 3 2007 05 Cert X 509 V 3 Certificate Profile for Certificates Issued to Natural Persons ETSI TS 102 280 V1 1 1 2004 03 ETSI 102 042 Requirements of ETSI 102 042 LCP for the certificate certified against this standard only ETS
78. d according to the rating specified in section 6 2 11 below 6 2 2 Private Key N out of M Multi Person Control 6 2 2 1 RCA The RCA implements technical and procedural mechanisms that require the participation of multiple trusted individual authorizations to perform sensitive RCA cryptographic operations 6 2 2 2 ICA The ICA implements technical and procedural mechanisms that require the participation of multiple trusted individual authorizations to perform sensitive ICA cryptographic operations 6 2 2 3 CA The CA implements technical and procedural mechanisms that require the participation of multiple trusted individual authorizations to perform sensitive CA cryptographic operations 6 2 3 Private Key Escrow 6 2 3 1 RCA Under no circumstances shall the RCA private key be escrowed by any PKI component or third party 6 2 3 2 ICA Under no circumstances shall an ICA private key be escrowed by any PKI component or third party 6 2 3 3 CA Under no circumstances shall a CA private key be escrowed by any PKI component or third party 6 2 4 Private Key Backup 6 2 4 1 RCA The RCA private signature keys shall be backed up under the same multi person control as the RCA operational signature operation All back up copy of the signature key shall be stored in the RCA off site location refer to section 5 1 8 above and the number of back up copy is controlled by trusted roles 6 2 4 2 ICA ICA private signature keys shall be backed up u
79. d ICA m eege Edge a aaae aa a M 42 D E ER 42 4 7 Certificate IIIA 42 4 8 Certificate Modificati EE 43 481 RootOA and IGA eiie hp eege eet e see Pega as ERR REM ee acu Ee 43 482 C C 43 4 9 Certificate Revocation and Suspension eene nnne nennen 43 4 9 2 Who Can Request Hevocatlon enne enne et nrnn ens nnn entren 44 4 9 3 Revocation Request Procedure sess eene nennen entente nennen sete nen nn 44 4 9 4 Revocation Request Grace Period eene nnne nene 46 4 9 5 Timeframe within which CA Must Process the Revocation Heouest 46 4 9 6 Revocation Checking Requirement for Relying Parties 46 4 9 7 CRL Issuance Frequency nennen nennt rene nr sn tns entretenir senes ennt rennen 46 4 9 8 Maximum Latency for CHL es eene nennen nennen inttr en rent innen nnns inrer 47 4 9 9 On line Revocation Status Checking Availability seeeeeenneen 47 4 9 10 On line Revocation Checking Requirements 47 4 9 11 Other Forms of Revocation Advertisements Available sss 48 4 9 12 Specific Requirements in the Event of Private Key Compromise sss 48 4 9 13 Suspension of token 0 2 cece ccc ee ceeeeecee eect cece ae eeeeee sees eee aeeeeaaeegeeeeseaeeeseaaeseeeeeseeessaeseeeeseeeeseeeees 48 4 10 Certificate Status Services entren en nennen nns trns entente nsns sitne nes 49 4 10 1 Operational Features enne nre trennt nennt isis nnns sitet sins sn nrns entes tne 49 4 10 2 Service Availability
80. dministrative Process OpenTrust is compliant with French law and has secure procedures to clear access to private data Customer is compliant with its national law and has secure procedures to clear access to private data CA is compliant with its national law of the entity that owns the CA and has secure procedures to clear access to private data RA is compliant with its national law of the entity that owns the RA and has secure procedures to clear access to private data 9 4 7 Other Information Disclosure Circumstances The PMA obtains consent from PKI Components to transfer its private data in case of a transfer of activity as described in section 5 8 9 5 Intellectual Property Rights The PMA shall maintain intellectual ownership of RCA and ICA certificates that it publishes This CP shall be the property of the PMA Any service mark trademark or trade name contained within a certificate or certificate application shall remain the property of its owner The RCA and ICA key pairs and corresponding certificate shall be the property of the PMA The CA key pairs and corresponding certificate shall be the property of OpenTrust if CA is owned by OpenrTrust or the Customer if the CA is owned by Customer 9 6 Representations and Warranties 9 6 1 PMA Representations and Warranties The PMA defines the present CP and the corresponding CPS The PMA establishes that PKI components are compliant with the present CP with audit program defined in
81. ds of generating key D Key Usage keyCertSign cRLSign OpenTrust All rights reserved 93 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST ENHE Securing Your Business Is Our Signature Criticality Extensions eruerraloe Certificate Policies FALSE 2 5 29 32 0 or list of OID defined by Customer and approved by policyldentifier PMA In last case only OID set in Subscriber certificate can be set this extension policyQualifier cps CA s URL for CP publication policyQualifier unotice hl policyldentifier 13 6 1 4 1 22234 2 14 3 1 policyQualifier cps http www opentrust com PC 1 T This CA certificate has been issued according OpenTrust policyQualifier unotice RCA program Basic Constraint RUE o gt T T T T EI E E E E r E r E o o o o m m m m rue pathLenConstraint CRL Distribution Points distributionPoint Refer to section 4 9 6 above Authority Information Ocsp Refer to section 4 9 9 above Access This technical constraint shall be set only if the CA is not audited by external auditor against ETSI standard according section 8 above and is not signed by ICA used for Adobe Name Constraint dnsNames mandatory if CA issue SSL TLS certificate r fc822names mandatory if the CA issue certificate for email protection permittedSubtrees directoryName may be used 1 Subtrees 0 Max IP Address 0 0 0 0 Mask 0 0 0 0 excludedSu
82. e PKI systems for online system Require trusted role personnel to follow up on alerts of possible critical security events Conduct a human review of application and system logs and ensure that monitoring logging alerting and log integrity verification functions are operating properly refer to section 5 4 8 above 6 6 3 Life Cycle Security Controls For the software and hardware that are evaluated the PMA and Customer monitor the maintenance scheme requirements to ensure the same level of trust Capacity demands are monitored and projections of future capacity requirements made to ensure that adequate processing power and storage are available 6 7 Network Security Controls 6 7 1 RCAand ICA Key ceremony operations for RCA and ICA and CA hosted by OpenTrust are performed in off line environment The key ceremony workstation is never connected to any communication network 6 7 2 Online PKI component The PKI system shall implement appropriate security measures to ensure they are guarded against denial of service and intrusion attacks Such measures shall include the use of guards firewalls and filtering routers Unused network ports and services shall be turned off Any network software present shall be necessary to the functioning of the PKI system The following rules apply Any boundary control devices used to protect the network on which PKI equipment is hosted shall deny all but the necessary services to the PK
83. e period 5 4 5 Audit Log Backup Procedures Audit logs and audit summaries are backed up via enterprise backup mechanisms under the control of authorized trusted roles separated from their component source generation Audit log backups are protected with the same level of trust defined for the original logs 5 4 6 Audit Collection System Internal vs External Audit processes shall be invoked at system start up and end only at system shutdown The audit collection system has to maintain the integrity and availability of all data collected If necessary the audit collection system protects the integrity of the data If a problem appears during the process of the audit collection system the PMA determines whether it has to suspend operations until the problem is solved and inform the impacted component 5 4 7 Event Causing Subject Notification Where an event is logged by the audit collection system it guarantees that the event is linked to a trusted role 5 4 8 Vulnerability Assessments The role in charge of conducting audit and roles in charge of realizing PKI system operation explain all significant events in an audit log summary Such reviews involve verifying that the log has not been tampered with there is no discontinuity or other loss of audit data and then briefly inspecting all log entries with a more thorough investigation of any alerts or irregularities in the logs Actions taken as a result of these reviews are documented
84. ecret data e g password PIN code certificate or OTP that is used to perform cryptographic operations using a Private Key Activation Data An independent review and examination of documentation records and activities to access the adequacy of system controls to ensure compliance with established policies and operational procedures and to recommend necessary changes in controls policies or procedures The process whereby one party has presented an identity and claims to be Authentication that identity and the second party confirms that this assertion of identity is true Particular technical activation data like for example OTP or authentication certificate used by Subscriber to be authenticated by Protect and Sign Personal signature service in order to sign a document according a Authentication data OpenrTrust All rights reserved 21 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The property of being accessible and upon demand by an authorized entity ISO IEC 13335 1 2004 It means that an electronic data stored using means hard disk paper can be still readable and have the same meaning after and during its storage Availability A Certificate is a data structure that is digitally signed by a Certification Authority and that contains the following pieces of information o The identity of the Certification Authority i
85. eeee enemies 65 6 1 1 Key Pair Generation dee EG HERR ee aes 65 6 1 2 Private Key Delivenm enne enne nnn nennen snnt sentent eniin entren tenens 67 6 1 3 Public Key Delivery to Certificate Issuer enne 67 6 1 4 RCA Public Key Delivery to Relying Parties eene 67 6 125 Key SIZeS iiU Rea OE A ee A Gh in eee 67 6 1 6 Public Key Parameters Generation and Quality Checking sese 67 6 1 7 Key Usage Purpose as per X 509 v3 key usage feld 68 6 2 Private Key Protection and Cryptographic Module Engineering Controls ssssss 68 6 2 1 Cryptographic Module Standards and Controls sene 68 6 2 2 Private Key N out of M Multi Person Control 68 6 2 3 Private Key ESCIOW eite REFERRE ERR SI PIRE ETEER ARR ae aka pede dese 68 6 244 Private Key Backup to perat a a aa enis pA ee 68 6 2 5 Private Key Archival pie ERR des sec TIER Fase elencate ferens pene RER 69 6 2 6 Private Key Transfer Into or From a Cryptographic Module sese 69 6 2 7 Private Key Storage on Cryptographic Module 70 6 2 8 Method of Activating Private key 70 6 2 9 Method of Deactivating Private key 70 6 2 10 Method of Destroying Private Key 71 OpenTrust All rights reserved 7 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 2 11 Cryptographic Module Rating sse enne en nennen sinn ennnnnnns 71 6 3 Other Aspects of Key Pair Man
86. efer to section 5 1 1 1 and 5 1 2 1 above by personnel in trusted roles refer to section 5 2 above under at least dual supervision Private Key activation data are distributed to activation data holders that are trusted employees RCA key generation is carried out within a hardware security module refer to section 6 2 below Witnesses are persons other than operational personnel who perform the key ceremony As trusted role witness can only have HSM activation and Key pair protection RCA activation and initialization is under the control of RCA activation data holders During the key ceremony the RCA key pair is backed up refer to section 6 2 below The key pair and certificate generation process shall create a verifiable audit trail that the security requirements for procedures were followed The documentation of the procedure shall be detailed enough to show that appropriate role separation was used An independent third party shall validate the process RCA key ceremony for key pair and RCA certificate generation is done in order to have an Auditor be able to issue a report opining that the RCA followed its key ceremony during its Key and Certificate generation process and the controls used to ensure the integrity and confidentiality of the Key Pair refer to section 8 1 below 6 1 1 2 ICA After the PMA agrees to the generation of the ICA a key pair and CSR are generated for the ICA The operation of the ICA key pair and CSR
87. er and OA shall not appoint to trusted roles or management any person who is known to have a conviction for a serious crime or other offence which affects his her suitability for the position 5 3 3 Training Requirements The PMA Customer and OA ensure that all personnel performing duties with respect to operations receive comprehensive training in PKI security principles and mechanisms Software versions in use in the PKI system PKI business processes and workflows Duties they are expected to perform Dispute operations and procedures Sufficient IT knowledge Disaster recovery and business continuity procedures 5 3 4 Retraining Frequency and Requirements Individuals in trusted roles shall be aware of changes in the PKI operations as applicable Any significant change to the operations shall be accompanied by a training awareness plan and the execution of said plan shall be documented 5 3 5 Job Rotation Frequency and Sequence The PMA Customer and OA Entity ensure that any change in staff will not affect the security of the system 5 3 6 Sanctions for Unauthorized Actions Appropriate administrative disciplinary sanctions are applied to any PKI component s personnel violating the present CP and the CA s CP 5 3 7 Independent Contractor Requirements Contractors employed to perform PKI component functions are subject to the all personnel controls defined in section 5 3 Contractors can perform PKI system op
88. erations refer to section 5 2 above with approval of the PMA or the Customer according the PKI component 5 3 8 Documentation Supplied to Personnel PKI components make available to their personnel the present CP and the corresponding CPS and any relevant statutes and policies Other technical operational and administrative documents e g Administrator Manual User Manual etc are provided to enable the trusted personnel to perform their duties 5 4 Audit Logging Procedures 5 4 1 Types of Events Recorded Audit log files are generated by OA and PMA for all events related to security and PKI services OpenrTrust All rights reserved 56 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Audit log files are generated for all events related to security and PKI services Where possible security audit logs shall be automatically collected Where this is not possible a logbook paper form or other physical mechanism shall be used All security audit logs both electronic and non electronic shall be retained and made available during compliance audits Each event related to certificate life cycle is logged in such a way that it can be attributed to the person that performed it Logging will include the following topics for each PKI component and each OA Physical facility access Trusted roles management Logical access Backup management
89. ertificate content In case of mistake that is described in section 4 9 1 then Customer shall request CA revocation to the PMA Once the CA certificate acceptance has been received by the PMA the CA may start to sign certificates and CRLs 4 4 2 Publication of the Certificate by the PS RCA ICA and CA when it is needed to have it public certificates are published by the PS as detailed in section 2 above Relying party can test the certificate using information published by PMA and Customer refer to section 2 2 above 4 4 8 Notification of Certificate Issuance by the CA to Other Entities Notification of Certificate issuance is provided by publishing RCA ICA and CA certificates refer to section 2 2 above For Customer notification of CA Certificate issuance is provided according to the contractual obligations established with OpenTrust 4 5 Key Pair and Certificate Usage 4 5 1 Private Key and Certificate Usage RCA ICA and CA shall use their Private Keys for the purposes set forth in section 1 4 above Usage of a key pair and the associated certificate shall also be performed as indicated in the certificate itself via extensions related to key pair usage refer to section 6 1 7 below OpenrTrust All rights reserved 4 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 5 2 Relying Party Public Key and Certificate Usage Relying p
90. estroy the CA private key backup and CA key in HSM hosted by OpenTrust s OA after all Subscriber certificate issued by CA has been revoked 4 9 4 Revocation Request Grace Period There is no revocation grace period Responsible parties must request revocation as soon as they identify the circumstances under which revocation is required 4 9 5 Timeframe within which CA Must Process the Revocation Request PMA shall begin investigation of a Certificate revocation request within twenty four hours of receipt and decide whether revocation or other appropriate action is warranted based on at least the following criteria The nature of the alleged problem The number of Certificate Problem Reports received about a particular Certificate The entity making the complaint for example a complaint from a law enforcement official that a Web site is engaged in illegal activities should carry more weight than a complaint from a consumer alleging that she didn t receive the goods she ordered and Relevant legislation The ICA or RCA shall process a revocation request as soon as possible after receiving the revocation request not to exceed 7 days 4 9 6 Revocation Checking Requirement for Relying Parties Use of revoked Certificates could have damaging or catastrophic consequences in certain applications The matter of how often new revocation data should be obtained is a determination to be made by the Relying Party If it is tempor
91. ew media will be defined by the archive site 5 5 5 Requirements for Record Time Stamping Time stamping services for PKI are not mandatory The records and log data have a trusted time defined by the PKI Details are given in section 6 8 below 5 5 6 Archive Collection System Internal or External The archive collection system is compliant with security requirements defined in section 5 4 6 5 5 7 Procedures to Obtain and Verify Archive Information Media storing PKI archive information are verified upon creation Periodically statistical samples of archived information are tested to check the continued integrity and readability of the information Only authorized PMA and OA personnel are allowed to access archives 5 6 Key Changeover 5 6 1 RCA RCA private key validity period is defined in compliance with cryptographic security recommendations for key size length RCA self signed certificate has a validity period defined in section 6 3 2 1 below RCA cannot generate ICA CA certificate whose validity period would be superior to the RCA certificate validity period A new key pair for RCA requires a new RCA certificate be generated Previous RCA certificates shall be used for validation process of the certification path for all CA and CA certificates signed by this previous RCA and CRL Previous RCA private key shall be used to sign current CRL and revoke if it is necessary the previous ICA and CA signed by the previous RCA The PMA re
92. f PKI components especially RA that operate for CA under this CP The PMA states the reason for any non periodic compliance audit The PMA shall undergo an audit of CA mean all PKI components used by CA to manage Subscriber Certificate RA LRA OA in accordance with depending of the type of audit made one of the following schemes Schema 1 WebTrust for Certification Authorities v2 0 using ETSI 102 042 and or ETSI 101 456 as reference CP according the type Subscriber Certificate Schema 2 A national scheme that audits conformance to ETSI 102 042 and ETSI 101 456 Schema 3 If a Government CA is required by its Certificate Policy to use a different internal audit scheme it may use such scheme provided that the audit either a encompasses all requirements of one of the above schemes or b consists of comparable criteria that are available for public review Schema 4 Internal PMA audit guide based on ETSI 102 042 and or ETSI 101 456 requirements and ANSSI PKI audit guide httpz circulaire legifrance gouv fr pdf 2009 04 cir 1992 pdf and WebrTrust for Certification Authorities v2 0 requirements The PMA shall undergo a yearly audit of its RCA and ICA and CA owned by OpenTrust using the schema 4 of audit CA hosted by Customer key pair generation for CA issuing SSL certificate is audited by external qualified auditor according CAB Forum requirements and under schema 4 for others CAs RCA key pair and
93. fe refer to section 5 1 above If activation data is written on paper then the paper has to be stored securely in a safe 6 4 2 3 CA Activation data is protected from disclosure by a combination of cryptographic and physical access control mechanisms Activation data holders are responsible for their accountability and protection The PMA and or Customer according the owner of the CA requires that activation data holder store activation data in a safe for which access is controlled by both the holder and other employees in trusted roles When they are not used activation data are always stored in safe refer to section 5 1 above If activation data is written on paper then the paper has to be stored securely in a safe 6 4 3 Other Aspects of Activation Data Activation data are changed in case hardware security modules are returned to manufacturer for maintenance or destroyed Before sending HSM to the manufacturer for maintenance all sensitive information contained in the HSM shall be destroyed refer to section 6 2 10 above 6 5 Computer Security Controls 6 5 4 Specific Computer Security Technical Requirements 6 5 1 1 RCA and ICA The following computer security functions are provided by the operating system or through a combination of operating system software and physical safeguards PKI components RCA and ICA implement the following functionalities Require authenticated logins for trusted role Provide discreti
94. for the protection requirements to those assets consistent with the risk analysis 5 1 7 Waste Disposal All media used for the storage of sensitive information such as keys activation data or files shall be destroyed before being released for disposal 5 1 8 Off site Backup 5 1 8 1 RCA and ICA Full back ups of PKI component off line sufficient to recover from system failure are made after PKI deployment and after each new key pair generation Back up copies of essential business information key pair and CRL and software are taken regularly Adequate back up facilities are provided to ensure that all essential business information and software can be recovered following a disaster or media failure Back up arrangements for individual systems are regularly tested to ensure that they meet the requirements of the OA business continuity plan At least one full backup copy is stored at an offsite location disaster recovery OA The back up copy is stored at a site with physical and procedural controls commensurate to that of the operational PKI system OpenrTrust All rights reserved 53 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 1 8 2 CA RA OCSP and PS Full back ups of PKI systems on line sufficient to recover from system failure are made after PKI deployment and on a daily basis Back up copies of essential business information and sof
95. gates on the key issue and revokes the associated certificate Anew key pair is generated and a new certificate is created Alert the PMA When any of the algorithms or associated parameters used by the RCA and or ICA and or CA or Subscriber becomes insufficient for its remaining intended usage then the PMA shall inform the Customer and change the used algorithms 5 7 4 Business Continuity Capabilities after Disaster The business continuity plan addresses all necessary operations as described in section 5 7 1 above 5 8 Termination and transfer 5 8 1 RCA In the event of the termination of the RCA service provided by a RCA the PMA provides notice prior to the termination and Revoke all ICA and CA certificate under the RCA Destroys the RCA private key Communicate last revocation status information CRL signed by RCA to the relying party indicating clearly that it is the latest revocation information ICA stops delivering certificates according to and referring to this CP CA stops delivering certificates according to and referring to this CP But CA can deliver certificate using its own CA certificate signed by itself or by another CA in order to validate certificate and CRL Incase of compromising RCA PMA and OA both use secure means to notify Customers to delete all trust anchors representing RCA with the compromised s key pair s PMA alerts and notifies software platform providers to de
96. gation of use for a key pair 1 4 2 Prohibited Certificate Use No other uses than the ones stated in section 1 4 1 above are addressed by the CP OpenTrust is not responsible for any other use than the ones stated in the CP 1 5 Policy Administration 1 5 1 Organization Administering the Document PMA is responsible for all aspects of this CP and the associated CPS 1 5 2 Contact Person The person to contact is Mr Jean Yves Faurois Director of Managed Services at OPENTRUST OPENTRUST 11 13 rue Ren Jacques 92131 Issy les Moulineaux Cedex FRANCE Email PMA opentrust com Phone 33 0 1 53 94 22 00 Fax 33 0 1 53 94 22 01 OpenrTrust All rights reserved 20 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 1 5 3 Person Determining CPS Suitability for the Polic The term CPS is defined in the RFC 3647 as A statement of the practices which a Certification Authority employs in issuing Certificates It is a comprehensive description of such details as the precise implementation of service offerings and detailed procedures of Certificate life cycle management It shall be more detailed than the corresponding Certificate Policy defined above and reference all internal document of the OA classified documentation A CPS may be approved as sufficient for fulfilling the obligations under this CP when such a
97. gher ranking nodes in the Domain Name System An HSM is a hardware device used to generate cryptographic Key Pairs keep the Private Key secure and generate digital signatures It is used to secure the CA keys and in some cases the keys of some applications Subscribers A hardware device that can hold Private Keys digital Certificates or other electronic information that can be used for authentication or authorization Smart card and USB tokens are examples of hardware tokens A function which maps string of bits to fixed length strings of bits satisfying the following two properties Itis computationally infeasible to find for a given output an input which maps to this output It is computationally infeasible to find for a given input a second input which maps to the same output ISO IEC 10118 1 The Internet Engineering Task Force is a large open international community of network designers operators vendors and researches concerned with the evolution of the Internet architecture and the smooth operation of the Internet Refers to the correctness of information of originator of the information and the functioning of the system which processes it Implies that equipment and procedures in use by two or more entities are compatible and hence that it is possible to undertake common or related activities 24 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your B
98. he PMA as well as the dedicated persons in the entity The report identifies the versions of the CP and CPS and any other auditing criteria used as the basis for assessment The Audit Compliance Report is not available on the Internet for relying parties However it may be provided to law of court or any official body based on legal request In addition it should be available in part or in whole to the audited entity according to the PMA decision OpenrTrust All rights reserved 82 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 9 OTHER BUSINESS AND LEGAL MATTERS 9 1 Fees 9 1 1 Certificate Issuance or Renewal Fees These services are defined in the contract established between OPENTRUST and Customer 9 1 2 Certificate Access Fees No fees 9 1 3 Revocation or Status Information Access Fees Not applicable 9 1 4 Fees for Other Services These services are defined in the contract established between OPENTRUST and Customer 9 1 5 Refund Policy These services are defined in the contract established between OPENTRUST and Customer 9 1 6 Fines List These services are defined in the contract established between OPENTRUST and Customer 9 2 Financial Responsibility 9 2 1 Insurance Coverage OPENTRUST maintains reasonable levels of insurance coverage 9 2 2 Other Assets OPENTRUST maintains sufficient financial resources to maintain
99. he present CP End of ICA services Privilege attributes asserted in the ICA certificate are reduced Change in the key length size or algorithm recommendation coming from international standard institutes OpenrTrust All rights reserved 43 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 9 1 3 CA A certificate is revoked when the binding between the certificate and the public key it contains is considered no longer valid Examples of circumstances that invalidate the binding are 4 9 2 4 9 2 1 The RCA is revoked The ICA that signed the certificate is revoked The CA private key is suspected of compromise or is compromised The entity owning the CA has not respect the contract between Customer and OpenTrust and PMA decides to revoke its certificates The CA can be shown to have violated the stipulations of the present CP The CA can be shown to have violated the stipulations of its CP End of the CA services Privilege attributes asserted in the CA s certificate are reduced Change in the key length size or algorithm recommendation coming from international standard institute Customer requests Customer s CA to be revoked by transmitting a signed CA revocation request to the PMA PMA obtains evidence that the CA Certificate was misused Customer s CA notifies the PMA that the original CA certificate request was not autho
100. he public key is compromised A new key pair shall be generated in all cases Same procedures as the ones applied for initial generation apply for a new RCA ICA and CA certificate and associated key pair generation refer to sections 4 1 4 2 4 3 and 4 4 above OpenrTrust All rights reserved 42 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 8 Certificate Modification According to RFC 3647 certificate modification is the process of generating new certificates using the same key pair 4 8 1 Root CA and ICA This practice is not allowed for RCA and ICA In case a new certificate is created a new key pair shall be created 4 8 2 CA This practice is allowed for CA only in order to modify the technical constraint set in the CA certificate and or modify OID policy This practice is submitted to the approval of the PMA According modification made in the CA certificate PMA may request previous CA certificate to be revoked like restriction in technical constraint In any case CA Certificates may be renewed in order to reduce the size of CRLs A CA Certificate may be renewed if the public key has not reached the end of its validity period the associated private key has not been compromised and the CA name and attributes are unchanged In addition the validity period of the Certificate must not exceed the remaining lifetime of the private
101. her be memorized or recorded and stored in a manner commensurate with the security afforded the cryptographic module and shall not be stored with the cryptographic module in a way to avoid only one person having access to private key A person or group of trusted role shall be made explicitly responsible for making such checks When a group of persons is responsible a log identifying the person performing a check at each instance shall be maintained If the facility is not continuously attended the last person to depart shall initial a sign out sheet that indicates the date and time and asserts that all necessary physical protection mechanisms are in place and activated 5 1 2 2 CA RA OCSP and PS CA PS and RA Equipment shall always be protected from unauthorized access and damage The physical security mechanisms for equipment at minimum shall be in place to Ensure monitoring either manually or electronically of unauthorized intrusion at all times Ensure no unauthorized access to the hardware and activation data is permitted Ensure all removable media and paper containing sensitive plain text information is stored in secure location Any non authorized individual entering secure areas shall always be under oversight by an authorized employee Ensure an access log is maintained and inspected periodically Provide at least 2 layers of increasing security such as perimeter building and operational room
102. icate Customer shall be successfully audited against all required standards for each type of Subscriber Certificate by auditor approved by PMA according schema 1 2 3 or 4 OpenrTrust All rights reserved 80 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature CA issue Subscriber Certificate for Internal Subscriber o For EV SSL certificate level of Trust shall be at minimum ETSI 102 042 for EVCP Customer may choose also ETSI 102 042 for EVCP plus relevant CA Information checklist as described in Mozilla Customer shall be successfully audited against this standard by external qualified auditor according schema 1 2 or 3 o For DV SSL and OV SSL certificate level of Trust shall be ETSI 102 042 for DVCP and OVCP plus relevant CA Information checklist as described in Mozilla Customer shall be successfully audited against all required standards for each type of Subscriber Certificate by auditor approved by PMA according schema 1 2 3 or 4 If schema 4 is used then CA shall be technically constrained o For other type of Subscriber certificate any level of trust among ETSI 102 042 and ETSI 101 456 plus relevant CA Information checklist as described in Mozilla One level of trust for each type of Subscriber Certificate Customer shall be successfully audited against all required standards for each type of Subscriber Certificate b
103. icate request Once a completed RCA and ICA certificate request has been submitted to the PMA the PMA studies it PMA can t take decision based on an incomplete CA certificate request All required information listed in section 4 1 2 above shall be given to the PMA The PMA shall evaluate the completeness of the submitted request In the case where the RCA and or ICA certificate request is complete and compliant with this CP statement the PMA approves the RCA and or ICA certificate creation In the case where the RCA and or ICA certificate request is rejected the PMA will ask to re submit a new RCA and or ICA certificate request 4 2 2 2 CA CA certificate requests shall be submitted to the PMA by the authorized representative Once a completed CA certificate request has been submitted to the PMA the PMA studies it PMA can t take decision based on an incomplete CA certificate request All required information listed in section 4 1 2 above shall be given to the PMA The PMA shall evaluate the completeness of the submitted request The PMA shall be responsible for approving or rejecting the CA certificate request In the case where the CA certificate request is complete and compliant with this CP statement the PMA approves the CA certificate request and continue the evaluation process In the case where the CA certificate request is rejected the PMA will ask to re submit a new CA certificate request with all required information First of
104. ices and PKI components is in place OpenrTrust All rights reserved 14 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Arbitrates disputes relating to the PKI services and the use of certificates and ensures that the resolution of such disputes is published Communicate CP RCA certificate and useful URL to the application software suppliers that have a program to reference RCA like CAB Forum Mozilla PMA perform an annual Risk Assessment that Identifies foreseeable internal and external threats that could result in unauthorized access disclosure misuse alteration or destruction of any Certificate or certificate process Assesses the likelihood and potential damage of these threats taking into consideration the sensitivity of the Certificate or certificate process Assesses the sufficiency of the policies procedures information systems technology and other arrangements that the PKI components have in place to counter such threats PMA defines rules that OpenTrust s CA and designated RA shall implement and select the level of trust for Subscriber Certificate management among ETSI 102 042 and ETSI 101 456 standard and CAB Forum requirements The CP and CPS shall be consistent with RFC 3647 same structure ETSI 101 456 and ETSI 102 042 and CAB Forum according the level of trust selected for each
105. in the CP that are supported by it Common Criteria for Information Technology Security Evaluation is an international standard ISO IEC 15408 for information technology security certification A violation or suspected violation of a security policy in which an unauthorized disclosure of or loss of control over sensitive information may have occurred With respect to private keys a Compromise is a loss theft disclosure modification unauthorized use or other compromise of the security of such private key The property that information is not made available or disclosed to unauthorized individuals entities or processes ISO IEC 13335 1 2004 Trusted environment that contains one or several keys and managed with dedicated activation data This trusted environment is deployed in a Hardware Security Module HSM to activate and use keys Delegated Third Party A natural person or Legal Entity that is not the CA but is authorized by the CA to assist in the Certificate issuance process by performing or fulfilling one or more of the CA s CP and CPS A directory system that conforms to the ITU T X 500 series of Recommendations A plan defined by a CA to recover its all or part of PKI services after they ve been destroyed following a disaster in a delay define in the CP CPS A string created during the certification process and included in the Certificate that uniquely identifies the Subscriber within the CA domain The label a
106. ing to European Law and stipulate in the contract between Customer and OPENTRUST how they protect any personally identifiable information they collect 9 4 2 Information Treated as Private Personal data managed by OpenTrust must be treated as private as well as any information protected under French law Personal data managed by Customer must be treated as private as well as any information protected under national law of the Customer The Subscriber information must be treated as private as well as any information protected under national law of the entity that owns CA and RA 9 4 3 Information Not Deemed Private Any and all information within a certificate is inherently public information and shall not be considered confidential information OpenrTrust All rights reserved 84 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 9 4 4 Responsibility to Protect Private Information PMA Customer OA and PKI component shall have the responsibility to protect private information and shall refrain from disclosing it unless by order of the RCA ICA CA and RA pursuant to law enforcement 9 4 5 Notice and Consent to use Private Information All private information coming from a PKI component cannot be used without any explicit consent from the Subscriber refer to section 4 1 and PMC for dedicated treatment 9 4 6 Disclosure Pursuant to Judicial or A
107. ion or documents asked from PMA in order to audit and control CA certificate request against the present CP requirements If the CA is owned by a Customer before to issue a CA certificate request Customer and OpenTrust shall sign a contract related to the RCA service OpenrTrust All rights reserved 37 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 2 Certificate Application Processing 4 2 1 Performing Identification and Authentication Functions 4 2 1 1 RCA and ICA Requests are submitted by an authorized representative at the discretion of the PMA prior to issuance It is the responsibility of the PMA to authenticate the authorized representative as described in section 3 2 above and to verify that the information in RCA and ICA Certificate request is accurate for the RCA and ICA 4 2 1 2 CA Requests are submitted by an authorized representative at the discretion of the PMA prior to issuance It is the responsibility of the PMA to authenticate the authorized representative as described in section 3 2 above and to verify that the information in CA Certificate request is accurate for the CA 4 2 2 Approval or Rejection of Certificate Applications 4 2 2 1 RCA and ICA RCA and ICA certificate requests shall be submitted to the PMA by the authorized representative The PMA shall be responsible for approving or rejecting the RCA and ICA certif
108. ition Authentication and Role of Trademarks No stipulations 3 2 Initial Identity Validation 3 2 41 Method to Prove Possession of Private Key 3 2 1 1 RCA and ICA RCA and ICA key pairs are generated stored activated used and destroyed by the OA in a manner that the PMA is ensured that RCA and ICA owns the private key corresponding to the public key contained in its RCA and ICA certificate 3 2 1 2 CA hosted by OpenTrust s OA CA key pairs are generated stored activated used and destroyed by the OA in a manner that the PMA is ensured that CA owns the private key corresponding to the public key contained in its CA certificate 3 2 1 3 CA hosted by Customer s OA CA key pairs are generated stored activated used and destroyed by the OA in a manner that the Customer is ensured that CA owns the private key corresponding to the public key contained in its CA certificate 3 2 2 Authentication of Organization Identity 3 2 2 4 RCA ICA and CA owned by OpenTrust The PMA authenticates and appoints OpenTrust as the organization that owns RCA and ICA components to be included in RCA trust domain Prior to issuance of a RCA ICA and CA certificate PMA shall ensure the existence of the Organization stated in the O X 501 Distinguished name of the RCA ICA and CA refer to section 3 1 1 above 3 2 2 2 CA owned by Customer The PMA authenticates all organizations that own a CA to be included in the RCA trusted domain As CA certific
109. its choice 9 16 3 Severability Should it be determined that one section of this CP is incorrect or invalid the other sections of this CP shall remain in effect until the CP is updated The process for updating this CP is described in section 9 12 9 16 4 Waiver of Rights and obligation No waiver of any breach or default or any failure to exercise any right hereunder shall be construed as a waiver of any subsequent breach or default or relinquishment of any future right to exercise such right The headings in the CP are for convenience only and cannot be used in interpreting the CP 9 16 5 Force Majeure OpenTrust shall not be liable for any failure or delay in its performance under the CP due to causes that are beyond its reasonable control including but not limited to an act of God act of civil or military authority natural disasters fire epidemic flood earthquake riot war failure of equipment failure of telecommunications lines lack of Internet access sabotage and governmental action or any unforeseeable events or situations OPENTRUST HAS NO LIABILITY FOR ANY DELAYS NON DELIVERIES NON PAYMENTS MIS DELIVERIES OR SERVICE INTERRUPTIONS CAUSED BY ANY THIRD PARTY ACTS OR THE INTERNET INFRASTRUCTURE OR ANY NETWORK EXTERNAL TO OPENTRUST 9 17 Other Provisions 9 17 1 Interpretation All references in this CP to sections refer to the sections of this CP As used in this CP neutral pronouns and any variations thereof sh
110. key 10 5 CRL for RCA and ICA a Signature algorithm amp OID Refer to section 7 1 3 above Authority Key Identifier keyldentifier Subject Key Identifier Methods of generating key n 4 4 D E E c c m m D o digitalSignature Basic Constraint Oo m A g g amp e d S c ES i 3 A x lt J Q c pathLenConstraint OCSPSigning OCSPNoCheck 1 3 6 1 5 5 7 48 1 5 Critical i Val CRLNumber Integer number monotonically increasing OpenrTrust All rights reserved 95 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2
111. le is authenticated before activating an ICA private key 6 2 8 3 CA Several trusted roles with activation data are required to realize the initial activation of the HSM that contains the key pair corresponding to the CA certificate Once the HSM containing the CA key are operational only the authorized services of the PKI system can use the CA key pair within the HSM 6 2 9 Method of Deactivating Private Key 6 2 9 1 RCA An activated RCA HSM is never left unattended or otherwise available to unauthorized access After use the HSMs are deactivated The HSMs are removed from RCA component and stored in secure locations refer to section 5 1 above to avoid their use without authorization and strongly authenticated roles After deactivation the use of the HSM based RCA key pair shall require the presence of the trusted roles with the activation data in order to reactivate said RCA key pair refer to section 6 2 8 1 above 6 2 9 2 ICA ICA HSM that has been activated is never left unattended or otherwise available to unauthorized access After use HSM are deactivated HSM are removed from ICA component and stored in secure locations to refer to section 5 1 above avoid their use without authorization and strongly authenticated roles After deactivation the use of the HSM based ICA key pair shall require the presence of the trusted roles with the activation data in order to reactivate said ICA key pair refer to section 6 2 8 2 above Open
112. lete all trust anchors Archives all audit logs and other records prior to termination of the PKI Archived records are transferred to an appropriate authority The PMA may take appropriate measures and reasonable effort to transfer RCA records to an entity appointed by PMA In the event of the transfer of the RCA component to an entity different from OpenTrust the PMA provides notice prior to the termination and Authenticate the entity with check described in section 3 2 2 2 above OpenrTrust All rights reserved 62 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Revoke all ICA and CA certificate under the RCA when the ICA and or CA are not transfer to the entity Communicate last revocation status information CRL signed by RCA to the relying party indicating clearly that it is the latest revocation information provided by OpenTrust as owner of the RCA ICA stops delivering certificates according to and referring to this CP if ICA is not signed again by another RCA of OpenTrust CA stops delivering certificates according to and referring to this CP if ICA is not signed again by another RCA of OpenTrust But CA can deliver certificate using its own CA certificate signed by itself or by another CA in order to validate certificate and CRL PMA alerts and notifies software platform providers and Customer that the RCA trust anchor is
113. line and on line Key pair protection Cleared to hold activation data that are necessary for CA private key management role different from the HSM activation role On line PKI Software administration manage technical roles of the PKI software and configuration of the PKI software On line PKI software operation uses the PKI software functionality in order to manage Subscriber s certificate life cycle For OpenTrust all personnel are formally appointed to trusted roles by the PMA Customer is responsible to define and documented trusted roles and associated operation Customer shall define trusted to manage CA and RA personal shall be formally appointed by senior manager PMA controls that Customer s trusted roles are compliant with the present CP and standard used by Customer refer to section 4 1 2 above 5 2 2 Number of Persons Required per Task The number of persons who provide PKI services is detailed in the CPS for OpenTrust and Customer document The number of persons is defined to guarantee trust for all services key generation certificate generation revocation certificate request so that no malicious activity may be conducted by a single person acting on behalf of the PKI All participants shall serve in a trusted role as defined in section 5 2 1 above RCA ICA and CA keys are under dual control at minimum The following tasks shall be completed by two persons authorized for PKI system operations key genera
114. ll be only allowed to sign the following OCSP certificate ICAcertificate CA certificate CRL RCA shall only sign ICAs and CAs that are approved by the PMA and compliant with the present CP OpenrTrust All rights reserved 18 www opentrust com Ref OpenTrust_DMS_RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 1 4 1 2 ICA ICA certificate shall be only used to validate CA Subscriber certificates CRLs and Subscriber certificates it has delivered ICA private key shall be only allowed to sign the following ICA Certificate Signing Request CSR OCSP and Time stamping certificate ICA Certificate CA certificate CRL ICAs within the Adobe CA program shall only be used to sign CA that issue certificates for physical persons and for machines according to Adobe CPS and its own CP Additionally ETSI 102 042 or ETSI 101 456 requirements apply and to CA s CP that shall be approved by the PMA SSL TLS certificates shall not be issued by an ICA ICAs that are not part of the Adobe CA program shall only sign CA that issues Subscriber Certificate according to requirements defined in ETSI 102 042 ETSI 101 456 standards CAB Forum and Mozilla and Microsoft publication ICA shall only sign CAs that are approved by PMA and compliant with the present CP 1 4 1 3 CA CA certificate shall only be used to validate Subscriber certificates CRLs OC
115. m Adobe Certified Document Services e Certificate Policy tam Certification Practice Statement en Certification Revocation List ctam Certificate Signing Request pes Data Encryption Standard KS SCH Distinguished Name Evaluation assurance level ISO 15408 Common Criteria norm for certification of security products e e EC OpenrTrust All rights reserved 27 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Meaningless But Unique Number a number that is assigned by the PKI to assist in differentiating Subscribers with otherwise similar attributes RCA Root Certification Authority Request For Comment RFC fee remo o a ee OpenrTrust All rights reserved 28 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ll Securing Your Business Is Our Signature 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES 2 1 Repositories The Publication Service is responsible for making available necessary information related to the PKI services The PS shall be deployed to provide high level of reliability 24 out of 24 hours 7 out of 7 days 2 2 Publication of Certification Information The PS publishes the following data CP http www OpenTrust com PC OpenTrust s RCA ICA and CA certificate http www OpenTrust com PC Customer CA certificate o Incase the Customer CA is technic
116. munication Require user identification Provide domain isolation for processes involving roles using PKI services Remove unwanted services and ports from the PKI components When the PKI equipment is hosted on platforms certified for computer security assurance requirements the system hardware software and operating system when possible operates in said certified configuration At minimum such platforms use the same version of the computer operating system as the one which received the evaluation rating OA computer systems are configured with minimum required accounts network services and no remote login The following rules apply Follow a documented procedure for appointing individuals to trusted roles and assigning responsibilities to them on each PKI component Document the responsibilities and tasks assigned to trusted roles and implement separation of duties for said trusted roles based on the security related concerns of the functions to be performed on each PKI component Ensure that only personnel assigned to trusted roles have access to PKI components Ensure that an individual in a trusted role acts only within the scope of said role when performing administrative tasks assigned to that role on the PKI component Require employees and contractors to observe the principle of least privilege when accessing or when configuring access privileges on PKI system refer to section 5 2 abo
117. n in the certificate are changed 4 6 1 Root CA and ICA This practice is not allowed for RCA and ICA In case a new certificate is created a new key pair shall be created 4 6 2 CA This practice is allowed for CA only in order to cover all the validity period of the Subscriber certificate signed by the CA After the end of validity period of the Subscriber certificate signed by the CA this practice is submitted to the approval of the PMA In any case CA Certificates may be renewed in order to reduce the size of CRLs A CA Certificate may be renewed if the public key has not reached the end of its validity period the associated private key has not been compromised and the CA name and attributes are unchanged In addition the validity period of the Certificate must not exceed the remaining lifetime of the private key as specified in section 5 6 and be coherent with cryptographic constraint as specified by international standards refer to section 6 1 5 Same procedures as the ones applied for initial generation apply for a new CA certificate refer to sections 4 1 4 2 4 3 and 4 4 above Dedicated CP mapping and audit are not necessary to renew a CA certificate Only a CA Certificate request shall be processed Key ceremony to generate CA key pair is not realized 4 7 Certificate Re key Certificate re key shall be processed when a key pair reaches the end of its life refer to section 6 3 2 below the end of operational use or when t
118. nd risk mitigation methodology 5 5 Records Archival 5 5 1 Types of Records Archived PKI component archived records shall be detailed enough to establish the validity of a signature and of the proper operation of the PKI At minimum the following data shall be archived PKI events records Physical facility access log of OA one year minimum Video facility access log of OA one month according privacy rule in France Video of key ceremony for CA only minimum 10 years Trusted roles management log for OA minimum 10 years IT access log for OA 5 years minimum Subscriber and CA key creation use and destruction log minimum 5 years kept by OpenTrust Activation data management log for OA minimum 5 years IT and network log for OA minimum 5 years PKI documentation for OA minimum 5 years Security incident and audit report for OA minimum 10 years System equipment software and configuration for OpenTrust minimum 5 years The PMA shall retain all documentation relating to certificate requests and the verification thereof and all RCA ICA and CA Certificates and revocation thereof for at least 7 years after any Certificate based on that documentation ceases to be valid o PKI audit documentation kept by PMA CP document kept by PMA CPS documents kept by PMA Contract between OPENTRUST and acting RA kept by PMA Certificates or other revocation information kept by CA Certificate request records in C
119. nder the same multi person control as ICA operational signature operation All back up copy of the signature key shall be stored in the ICA off site location refer to section 5 1 8 above and the number of back up copy is controlled by trusted roles OpenrTrust All rights reserved 68 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 24 3 CA CA private signature keys shall be backed up under the same multi person control as the operational ones All back up copy of the signature key shall be stored in the CA off site location refer to section 5 1 8 above and the number of back up copy is controlled by trusted roles 6 2 5 Private Key Archival 6 2 5 1 RCA RCA private keys shall never be archived 6 25 2 ICA ICA private keys shall never be archived 6 2 5 3 CA Private keys shall never be archived 6 2 6 Private Key Transfer Into or From a Cryptographic Module 6 2 6 1 RCA Private Key In case of private key transfer then the RCA key pair is transferred to another Hardware Security Module HSM of the same specification as described in section 6 2 1 above by direct token to token copy or via a trusted transfer under N out of M multi person control Refer to section 6 2 2 above RCA keys are generated activated and stored in HSMs or in an encrypted format When they are not stored onto HSMs RCA private keys are encrypted An encrypted RCA
120. ng Your Business Is Our Signature 4 CERTIFICATE LIFE CYCLE OPERATIONAL REQUIREMENTS 4 1 Certificate Application Sections 4 1 4 2 4 3 and 4 4 specify the requirements for an initial application for certificate issuance Sections 4 6 4 7 and 4 8 specify the requirements for certificate renewal 4 1 4 Who Can Submit a Certificate Application 4 1 1 1 RCA and ICA The authorized representative of the RCA and ICA shall submit the RCA and ICA certificate request as directed by the PMA 4 1 1 2 CA The authorized representative of the CA shall submit the CA certificate request 4 1 2 Enrollment Process and Responsibilities 4 1 2 1 RCA RCA certificates must be authorized by the PMA prior to issuance The issuance process will include documenting the following information to be contained in the RCA certificate request Identity to set in the RCA certificate refer to section 3 1 1 above Validity period of the RCA certificate Cryptographic information of the RCA certificate RCA Certificate content Legal Entity which owns RCA identification data i e full name and legal status of the associated legal person or other organizational entity and any relevant existing registration information e g company registration of the associated legal person or other organizational entity Authorized representative information o O O O The full name including surname and given name s of the representative The full n
121. ng the other key and ii knowing one of the keys which is called the Public Key it is computationally infeasible to discover the other key which is called the Private Key Public Private Key Pair also named Key Pair Sub CA domain space is the set of all the certificates delivered by the Sub CA A legal entity that officially enrolls and manages domain names in compliance with ICANN Internet Corporation for Assigned Names and Registrar Numbers regulations A Registrar implements a WHOIS service that searches for information on the management of domain names including Wildcards and verifiable IP addresses on the Internet Registration The process whereby a user applies to a Certification Authority for a digital Certificate Publication service providing all information necessary to ensure the Repository intended operation of issued digital Certificates e g CRLs encryption Certificates CA Certificates Revocation To prematurely end the Operational Period of a Certificate from a specified time forward Document published by the IETF which presents a framework to assist the writers of Certificate Policies or certification practice statements for participants within Public Key infrastructures such as certification RFC3647 authorities policy authorities and communities of interest that wish to rely on Certificates In particular the framework provides a comprehensive list of topics that potentially at the writer s di
122. now owned by another entity and that the URL to find the CRL is modified Archives all audit logs and other records prior to transfer of the PKI The PMA may take appropriate measures and reasonable effort to transfer RCA records to an entity appointed by PMA 5 8 2 ICA In the event of the termination of the ICA service the PMA provides notice prior to the termination and 5 8 3 Revoke all ICA and CA certificate under the ICA Destroys the ICA private key Communicate last revocation status information CRL signed by ICA to the relying party indicating clearly that it is the latest revocation information ICA and CA signed by the ICA stops delivering certificates according to and referring to this CP CA signed by ICA stops delivering certificates according to and referring to this CP But CA can deliver certificate using its own CA certificate signed by itself or by another CA in order to validate certificate and CRL In case of compromising ICA PMA and OA both use secure means to notify customers to delete all trust certificates representing ICA with the compromised s key pair s Archives all audit logs and other records prior to termination of the PKI Archived records are transferred to an appropriate authority OpenTrust s CA In the event of the termination of the PKI service the PMA provides notice prior to the termination and Inform Customer Destroys the CA private key Publishes the most recent revoc
123. ntrol device or system with rules that support only the services protocols ports and communications that the PKI component has identified as necessary to its operations Configure PKI components by removing or disabling all accounts applications services protocols and ports that are not used in the PKI component s operations and allowing only those that are approved by the PKI component Review configurations of the PKI system on at least a weekly basis for CA to determine whether any changes have violated the PKI component s security policies Grant administration access to PKI components only to persons acting in trusted roles and require their accountability for the PKI component s security Implement strong authentication for each component of the PKI system that supports multi factor authentication Change authentication keys and passwords for any privileged account or service account on a PKI System whenever a person s authorization to administratively access that account on the PKI System is changed or revoked A Apply recommended security patches viewed by the software editor and entity like CERT as mandatory to avoid a concrete and high risk attack on the PKI system with to PKI systems within six months of the security patch s availability unless the PKI establishes that the security patch would introduce additional vulnerabilities or instabilities that outweigh the benefits of applying the security p
124. og trail generation 1 3 8 Subscriber A Subscriber is a physical person or a machine whose identity appears as subject in a Certificate issued by a CA who asserts that it uses its key pair and Certificate in accordance with the CA CP asserted in the Certificate with an OID and who does not itself issue Certificates OpenrTrust All rights reserved 17 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature When the Subscriber is a machine or a service its key pairs and certificates are managed by a Technical Contact TC The CP addresses 2 types of Subscribers External Subscribers Subscribers who don t belong to the owner of the CA whether the owner is Customer or OpenTrust For example an SSL Certificate delivered for a given Domain name the Customer or OpenTrust do not have control on Internal Subscribers Subscribers who belong to the owner of the CA whether the owner is Customer or OpenTrust For example an SSL Certificate delivered for a given Domain name the Customer or OpenTrust has control on Subscribers abide to the CA s CP and the associated procedures CPS as described in the RA documentation provided by RA 1 3 9 Other Participants 1 3 9 1 Customer Customer is a Legal Entity that establishes a contract with OpenTrust to have one or several of its CA s signed by a RCA and or an ICA The Customer designates entities
125. on Mechanism and Period The PMA notifies PKI components and Customer on its intention to modify CP CPS no less than 2 months before entering in a modification process of CP CPS and according to the scope of modification The PMA transmits new CP to the application software suppliers that have a program to reference RCA like Mozilla 9 12 3 Circumstances under Which OID Must Be Changed The present CP OIDs have to be changed if the PMA determines that a change in the CP modifies the level of trust provided by the CP requirements or CPS material 9 13 Dispute Resolution Provisions Provisions for resolving disputes between OpenTrust and its Customers shall be set forth in the applicable contract between the parties 9 14 Governing Law Subject to any limits appearing in applicable law the laws of France shall govern the enforceability construction interpretation and validity of the CP irrespective of contract or other choice of law provisions and without the requirement to establish a commercial nexus in the State of France This governing law provision applies only to the CP Contract with Customer incorporating the CP by reference may have their own governing law provisions provided that this section 9 14 governs the enforceability construction interpretation and validity of the terms of the CP separate and apart from the terms of such other agreements subject to any limitations appearing in applicable law 9 15 Compliance with
126. on of the present CP and its CP CPS it has to implement and for which they are responsible Respect the agreement establish between Customer and OpenTrust Transmit the right public key to be certified by RCA or ICA Generates and uses CA s key pair in a HSM certified EAL or FIPS 140 2 level 3 certified Establishes contract with CA and RA entity when they are different legal entity from it with clear identification of PKI services run by the entity and all RA s obligations and warranties according PKI services managed Only issue and manage type of Subscriber Certificate with level of trust approved by PMA Alert PMA in case of incident due to CA or PKI component used by CA to manage Subscriber Certificate Customer Representations and Warranties The Customer has the responsibility to Select the level of trust to manage Subscriber Certificate Defines CP and CPS for CA to manage Subscriber Certificate Realize internal audit of the PKI component used by CA to manage Subscriber Certificate Respect and operate the section s of the present CP and CPS and its CP and its CPS that deals with their duties this part of CPS has to be transmitted to the corresponding component Allow the auditor team to control and check the compliance with the present CP and with its CP CPS and communicate the requested information to them in accordance with the intentions of the PMA Document their internal procedures to complete their global CPS Use eve
127. onary access control Require use of authentication for session communication Require identification of users Provide domain isolation for process regarding roles using PKI services Removal of unwanted services from the PKI components OpenrTrust All rights reserved 73 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature When the PKI equipment is hosted on platforms certified for computer security assurance requirements then the system hardware software and operating system when possible operates in said certified configuration At a minimum such platforms use the same version of the computer operating system as the one which received the evaluation rating RCA and ICA computer systems are configured with minimum required accounts and no remote login PKI components RCA and ICA that are used for RCA and ICA key ceremony operation are not connected to any communication network Key ceremony workstations are dedicated to key ceremony operations only 6 5 1 2 CA RA OCSP and PS The following computer security functions are provided by the operating system or through a combination of operating system software and physical safeguards PKI components implement the following functionalities Require authenticated logins for trusted roles Provide discretionary access control Require use of authentication for session com
128. operations and fulfill PKI services 9 2 3 Insurance or Warranty Coverage for Subscribers If there is damage for a Customer due to OPENTRUST fault OPENTRUST will activate its insurance to cover part of the customer damage in the limits stated in contractual arrangements between OPENTRUST and Customer 9 3 Confidentiality of Business Information 9 3 4 Scope of Confidential Information PMA guarantees a special treatment for the following confidential information Records and archive of OA Personal identity data RCA ICA OCSP and CA private keys CA RCA OCSP and ICA activation data Audit result and reports Business continuity plan OpenrTrust All rights reserved 83 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Contractual and agreement with Customer nternal facility security policy CPS The treatment of confidential business information provided by Customer in the context of submitting a certificate request for CA will be in accordance with the terms of the contract entered into between the Customer and OPENTRUST Customer and OA shall maintain the confidentiality of confidential information that is clearly identified or labeled as confidential or by its nature should reasonably be understood to be confidential and shall treat such information with the same degree of care and security as the Customer and OA
129. ord CAA 1 3 5 Registration Authority RA An RA is owned by an entity entities designated by Customer or OpenTrust OpenrTrust All rights reserved 16 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature An RA is designated and authorized by the CA on a contractual basis An RA is used to authenticate and identify Subscribers and manage certificate requests revocation requests suspend and resume requests token management and renewal requests If the Customer designates a legal entity different from the Customer as an RA then a contract or legal document according the link between the Customer and legal Entity designated by Customer as an RA has to be established between Customer and this legal entity in order to cover the RA services addressed by the legal entity Procedures to manage Subscribers defined by an RA are performed by RA Operators An RA is responsible to establish and maintain an RA Operator list of all RA Operators that are allowed to enroll Subscribers An RA can deploy LRA Local Registration Authority An LRA can be owned by entities different from the RA In this case LRA s and the RA it belongs shall have a contract to cover all aspect of CP and CPS delegated to the LRA s by the RA The CA CPS shall give details on how RA and LRA are organized and performs their operation according to the type of certificates delivered to Su
130. owner of the CA appointed individuals shall receive their activation data during the key ceremony through a face to face meeting Creation and distribution of activation data are logged The activation data are never transmitted by any other means OpenrTrust All rights reserved 72 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 4 2 Activation Data Protection 6 4 2 1 RCA Activation data is protected from disclosure by a combination of cryptographic and physical access control mechanisms Activation data holders are responsible for their accountability and protection The PMA requires that activation data holder store activation data in a safe for which access is controlled by both the holder and other employees in trusted roles When they are not used activation data are always stored in safe refer to section 5 1 above If activation data is written on paper then the paper has to be stored securely in a safe 6 4 2 2 ICA Activation data is protected from disclosure by a combination of cryptographic and physical access control mechanisms Activation data holders are responsible for their accountability and protection The PMA requires that activation data holder store activation data in a safe for which access is controlled by both the holder and other employees in trusted roles When they are not used activation data are always stored in sa
131. pects of Key Pair Management 6 3 4 Public Key Archival Public keys are archived as part of certificate archival as described in section 5 5 above OpenrTrust All rights reserved 71 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 3 2 Certificate Operational Periods and Key Pair Usage Periods 6 3 2 1 RCA The maximum operational period for a RCA certificate is 25 years maximum The maximum operational period for a RCA private key is the end validity period of the valid RCA certificate 6 3 2 2 ICA The maximum operational period for an ICA certificate is fixed by RCA certificate validity period The maximum operational period for an ICA private key is the end validity period of the valid ICA certificate 6 3 2 3 CA The maximum operational period for a CA certificate is determined by PMA For Customer s CA contract between Customer and OpenTrust fix the CA validity period The maximum operational period for a CA private key is the end validity period of the valid CA certificate 6 4 Activation Data 6 4 4 Activation Data Generation and Installation 6 4 1 1 RCA RCA activation data used to protect HSM containing RCA private keys are generated during the initial key ceremony The activation data used to unlock private keys in conjunction with any other access control shall have an appropriate level of strength for the keys or data to be pro
132. private key cannot be decrypted without using an HSM with the required trusted role activation data holder and must be performed in the presence of multiple persons in trusted roles 6 2 6 2 ICA Private Key In case of private key transfer then the ICA key pair is transferred to another Hardware Security Module HSM of the same specification as described in section 6 2 1 above by direct token to token copy or via a trusted transfer under N out of M multi person control Refer to section 6 2 2 above ICA keys are generated activated and stored in HSMs or in an encrypted format When they are not stored onto HSMs ICA private keys are encrypted An encrypted ICA private key cannot be decrypted without using an HSM with the required trusted role activation data holder and must be performed in the presence of multiple persons in trusted roles 6 2 6 3 CA Private Key In case of private key transfer then the ICA key pair is transferred to another Hardware Security Module HSM of the same specification as described in section 6 2 1 above by direct token to token copy or via a trusted transfer under N out of M multi person control Refer to section 6 2 2 above Sub CA keys are generated activated and stored in HSMs or in an encrypted format When they are not stored onto HSMs private keys are encrypted An encrypted private key cannot be decrypted without using an HSM with the required trusted role activation data holder and must be perfo
133. protect their private key The present CP represents the common requirements that RCAs ICAs and CAs have to enforce to be signed by a RCA or an ICA and designates standards to be implemented by a CA in order to issue Subscriber or Subject Certificates OpenTrust manages its RCA certificates lifecycle as detailed in ETSI 102 042 and ETSI 101 456 CAs signed by a RCA or an ICA shall be audited against ETSI standards 102 042 and or 101 456 or WebTrust http www webtrust org item64428 aspx or according to rules defined by Adobe for all types of Subscriber certificates it issues and in the certification path of the RCA In case the CA issues SSL and or email certificates as an alternative to the above audits this CA may be technically constrained in the CA certificate and audited by Opentrust An OpenTrust RCA owns a self signed certificate and represents the common anchor of all trusted link certification path created by the CA optionally the ICA it certifies The trusted links are built as follow RCA trust common anchor self signed RCA certificate generated and managed by OpenTrust according to the CP optionally ICA certificate certificate delivered by the RCA according to the CP CA certificate certificate delivered by the RCA or an ICA according to the CP Subscriber certificate certificates delivered by the CA according to its CP OpenTrust s RCA certificates are available in web browsers and messaging
134. r Refer to section 6 3 above Subject Refer to section 3 1 above Key generation algorithm amp OID Refer to section 7 1 3 above ey size Refer to section 6 1 5 above Subject Public Key Info Signature algorithm amp Refer to section 7 1 3 above OID Criticality Extensions 22 OpenrTrust All rights reserved 92 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST EFFAN Securing Your Business Is Our Signature iticali Extensions Kaze FALSE keyldentifier Defined by Software used in key ceremony Methods of generating key C Defined by Software SHA1 160bits of the subject public key o CD 2 keyCertSign cRLSign Certificate Policies policyldentifier policyQualifier cps policyQualifier unotice CD o N oO Ds N o ttp www opentrust com PC o gt Qm A fy i o lt o c o S e a o N 3 E FE Pg dE x lt s S 3 D zt o 3 gt r o m pathLenConstraint CRL Distribution Points distributionPoint Refer to section 4 9 6 above z 2 Sic ol E E pe 10 3 CA Subject Refer to section 3 1 above Key generation algorithm amp OID Refer to section 7 1 3 above Subject Public Key Info Key size Refer to section 6 1 5 above Signature algorithm amp OID Refer to section 7 1 3 above True False Authority Key Identifier FALSE keyldentifier Subject Key Identifier Metho
135. r and CSR are generated for the CA The operation of the CA key pair and CSR generation is video recorded and performed according to a key ceremony script The HSM used for the key ceremony is compliant with requirements defined in section 6 2 1 below CA key pair generation is undertaken and witnessed in a physically secure environment refer to section 5 1 1 1 and 5 1 2 1 above by personnel in trusted roles refer to section 5 2 above under at least dual supervision Private Key activation data are distributed to activation data holders that are trusted employees CA key generation is carried out within a hardware security module refer to section 6 2 below Witnesses are persons other than the operational personnel who perform the key ceremony As trusted role witness can only have HSM activation and Key pair protection CA activation and initialization is under the control of CA activation data holders During the key ceremony the CA key pair is backed up refer to section 6 2 below After key ceremony CA key pair are securely transferred to HSM refer to section 6 2 6 3 below in the online environment refer to section 5 1 1 2 and 5 1 2 2 above The key pair and certificate generation process shall create a verifiable audit trail that the security requirements for procedures were followed The documentation of the procedure shall be detailed enough to show that appropriate role separation was used 6 1 1 4 CA hosted by Customer
136. r the validation process of the certification path for all Subscriber certificates signed by the previous Subscriber The PMA reserves the right to change the key at any time 5 7 Compromise and Disaster Recovery 5 7 1 Incident and Compromise Handling Procedures This system shall be supported by the OpenTrust enterprise computing infrastructure and its incident compromise and business continuity plans These plans shall be periodically tested reviewed and updated as directed by the OpenTrust according risk analysis If a PKI component for OpenTrust detects a potential hacking attempt or other form of compromise it performs an investigation in order to determine the nature and the degree of damage The scope of potential damage is assessed by the PMA in order to determine if the PKI needs to be rebuilt if only some certificates need to be revoked and or if the PKI has been compromised In addition the PMA determines which services are to be maintained revocation and certificate status information and how in accordance with the PMA business continuity plan Incident Compromise and Business continuity are covered in the CPS which may also rely upon other enterprise resources and plans for implementation If a PKI component for Customer detects a potential hacking attempt or other form of compromise it performs an investigation in order to determine the nature and the degree of damage The scope of potential damage is assessed by the
137. rTrust All rights reserved 70 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 2 9 3 CA HSM that has been activated is never left unattended or otherwise available to unauthorized access After use HSM are deactivated After deactivation the use of the HSM based CA key pair shall require the presence of the trusted roles with the activation data in order to reactivate said CA key pair refer to section 6 2 8 3 above The HSM automatically deactivate the HSM if there is an incident 6 2 10 Method of Destroying Private Key 6 2 10 1 RCA Destroying RCA private key inside an HSM requires destroying the key s inside the HSM using the zeroization function of the HSM in a manner that any information cannot be used to recover any part of the private key All the RCA private key back ups have to be destroyed in a manner that any information cannot be used to recover any part of the private key If the functions of HSM are not accessible in order to destroy the key contained inside then the HSM has to be physically destroyed The destruction operation is realized in a physically secure environment refer to section 5 1 above by personnel in trusted roles refer to section 5 2 above under at least dual control 6 2 10 2 ICA Destroying ICA private key inside an HSM requires destroying the key s inside the HSM using the zeroization function of the HSM in
138. rder to be set in the CA certificate refer to section 10 3 below Level of trust chosen for each type of Subscriber Certificate among ETSI 102 042 and ETSI 101 456 and CAB Forum level of trust with the following rules o External Subscriber For DV SSL certificate level of Trust shall be ETSI 102 042 for DVCP For OV SSL certificate level of Trust shall be ETSI 102 042 for OVCP For EV SSL certificate level of Trust shall be at minimum ETSI 102 042 for EVCP Customer may choose also ETSI 102 042 for EVCP For other type of Subscriber certificate any level of trust among ETSI 102 042 and ETSI 101 456 One level of trust for each type of Subscriber Certificate o Internal Subscriber For EV SSL certificate level of Trust shall be at minimum ETSI 102 042 for EVCP Customer may choose also ETSI 102 042 for EVCP For DV SSL and OV SSL certificate level of Trust shall be ETSI 102 042 for DVCP and OVCP For other type of Subscriber certificate any level of trust among ETSI 102 042 and ETSI 101 456 One level of trust for each type of Subscriber Certificate Type of electronic transaction where the Subscriber certificates may be used URL of the certificate validity status for all the CA and Subscriber certificates Status of the CA On line or Off line Audit report about PKI if there are any and that can be applied to cover the present CP requirements Any other requested informat
139. rding segregation rule set in standard taken as reference refer to section 4 1 2 above Customer shall document the segregation of duty for all trusted role used to manage CA and RA PMA controls that Customer s trusted roles segregation is compliant with the present CP and standard used by Customer refer to section 4 1 2 above 5 2 3 Identification and Authentication for Each Role All necessary checks must be completed before any individual enters a trusted role within the PKI components All persons assigned a role as described in this CP are identified and authenticated so as to guarantee that said role enables them to perform their PKI duties The CPS describes the mechanisms used to identify and authenticate individuals 5 2 4 Roles Requiring Separation of Duties Segregation of duties may be enforced using PKI equipment procedures or both PKI component employees are individually appointed to trusted roles for operations defined in section 5 2 1 above No individual shall be assigned more than one identity unless approved by the PMA for OpenTrust s OA and by the Customer for OpenTrust s OA The part of the RCA ICA and CA concerned with certificate generation and revocation management shall be independent of other organizations for its decisions relating to establishing provisioning and maintaining and suspending of services in conformance with the applicable certificate policies in particular its senior executive senior staff
140. re not part of the PKI operation Proper care shall be taken to prevent malicious software from being loaded onto the equipment Only applications required to perform the PKI operations shall be obtained from sources authorized by local policy PKI hardware and software shall be scanned for malicious code on first use and periodically thereafter Hardware and software updates shall be purchased or developed in the same manner as original equipment and be installed by trusted and trained personnel in a defined manner OpenrTrust All rights reserved 75 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 6 2 Security Management Controls The configuration of the PKI system as well as any modifications and upgrades shall be documented and controlled A procedure shall be used for installation and ongoing maintenance of the PKI system The PKI software shall be verified as being that supplied from the vendor with no modifications and be the version intended for use There shall be a mechanism for detecting unauthorized modification to software or configuration A formal configuration management methodology shall be used for installation and ongoing maintenance for the system The following rules apply Implement an IT administration system under the control of the OA that monitors detects and reports any security related configuration chang
141. re required to manage Subscriber certificates and described in the CA CP The authorized representative is in charge of CA certificate request and CA revocation request A CA is managed by the legal entity that owns the CA CA included in an OpenTrust Root CA trust domain cannot start operation without prior approval of the PMA A CA operates its services according to this CP and the corresponding CPS and its own CP and CPS CA that wish to be signed by RCA or ICA shall provide to the PMA a CA request refer to section 4 below and shall be audited refer to section 8 below In case of CA owned by Customer a contract shall be signed between Customer and OpenTrust before CA can be signed by OpenTrust In any case CA shall manage Subscriber Certificates according to CP and CPS that shall be consistent with RFC 3647 and with content required by ETSI 102 042 and or ETSI 101 456 and or CAB Forum requirements depending on the type of Subscriber Certificates its issues CP and CPS shall address all requirements registration key pair and certificate delivery revocation process suspension process recovery process usage of certificate and key pair certificate profile cryptographic topics for each type of Subscriber Certificates OpenTrust does not implement Certification Authority Authorization DNS Resource Record CAA and doesn t require that CA signed by RCA or ICA implement Certification Authority Authorization DNS Resource Rec
142. rer pet pede teen cha aee n EE Eege erkx a eda Ree curte deer 59 5 5 2 Archive Retention Period rrt rr as aee ab Eege ENEE EA a aaaeaii 60 5 5 3 Archive Protection EE 60 5 5 44 Archive Backup Procedures nre tec Er e aa aiea Fue CURE NS dH aeaaea 60 5 5 5 Requirements for Record Time Stamping ener nennen 60 5 5 6 Archive Collection System Internal or External enne 60 5 5 7 Procedures to Obtain and Verify Archive Information ssssssseeeeeeens 60 OpenTrust All rights reserved 6 www opentrust com Ref OpenTrust DMS RCA Program OpenTrust CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 5 6 Key Changeover E 60 561 RCA EE 60 5 62 IICA EE 60 56 3 CA Certificate eei aa a Galen i Wai a pesa E Ps e e eee 61 5 7 Compromise and Disaster Recovery ssssssssssssssesesee eene enne ensi nnne nennen 61 5 7 1 Incident and Compromise Handling Procedures nn 61 5 7 2 Corruption of Computing Resources Software and or Data 61 5 7 3 Entity Private Key Compromise Procedures eene 62 5 7 4 Business Continuity Capabilities after Disaster sese 62 5 8 Termination and te NEE 62 MEC PEE 62 DAMEN E 63 5 8 3 PSM PUSt SCA EE 63 5 8 4 Customer s CA and RA cciiccicccseccccscsccosceesssecesacceseccsescaeeasecaccessatectessnsechectentecensatsaaaeananceensanssesazzaces 64 6 TECHNICAL SECURITY CONTROLS 65 6 1 Key Pair Generation and Installation essesssssssseseeeee
143. rized and does not retroactively grant authorization PMA determines that any of the information appearing in the CA Certificate is inaccurate or misleading The RCA or ICA or CA ceases operations for any reason and has not made arrangements for another CA to provide revocation support for the Subscriber or CA Certificate The Issuing CA s or Subordinate CA s right to issue Certificates under these Requirements expires or is revoked or terminated unless the Issuing CA has made arrangements to continue maintaining the CRL OCSP Repository Revocation is required by the Issuing CA s Certificate Policy and or Certification Practice Statement or The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties e g the CA Browser Forum might determine that a deprecated cryptographic signature algorithm or key size presents an unacceptable risk and that such Certificates should be revoked and replaced by CAs within a given period of time Who Can Request Revocation RCA and ICA Only the PMA has the authority to request RCA and ICA certificate revocation 4 9 2 2 CA It is the responsibility of the authorized representative to request revocation of the said CA certificate of the CA he she represents Only the authorized representative appointed for said CA can request the revocation of the certificate of said CA PMC has also the authority to request for CA certificate revoca
144. rmed in the presence of multiple persons in trusted roles OpenrTrust All rights reserved 69 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 2 7 Private Key Storage on Cryptographic Module 6 2 7 1 RCA The HSM may store Private Keys in any form as long as the keys are not accessible without authentication mechanisms that are compliant with the ones mentioned in the security policy attached to the HSM approved use 6 2 7 2 ICA The HSM may store Private Keys in any form as long as the keys are not accessible without authentication mechanisms that are compliant with the ones mentioned in the security policy attached to the HSM approved use 6 2 7 3 CA The HSM may store CA private Keys in any form as long as the keys are not accessible without authentication mechanisms that are compliant with the ones mentioned in the security policy attached to the HSM approved use 6 2 8 Method of Activating Private Key 6 2 8 1 RCA Activation of the RCA s HSM to sign and or revoke ICA and CA certificates requires several trusted roles with activation data to activate the RCA private key Each trusted role is authenticated before activating a RCA private key 6 2 8 2 ICA Activation of the ICA s HSM to sign and or revoke Sub CA and ECA certificate requires several trusted roles with activation data to activate the ICA private key Each trusted ro
145. ry means technical and human necessary to achieve the realization of the present CP and its CP CPS it has to implement and for which they are responsible Respect the agreement establish between Customer and OpenTrust Transmit as Authorized Representative the right public key to be certified by RCA or ICA Notify Subscriber and Relying Party in case of CA private key has been lost stolen potentially compromised due to compromise of activation data or other reason OpenrTrust All rights reserved 86 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill 9 6 5 Securing Your Business Is Our Signature Establishes contract with Customer and OA entity when they are different legal entity from it with clear identification of PKI services run by the entity and all OA s obligations and warranties according PKI services managed Alert PMA in case of incident due to CA or PKI component used by CA to manage Subscriber Certificate OA Representations and Warranties The OA has the responsibility to 9 6 6 9 6 6 1 Respect its security policy Protect and guarantee integrity and confidentiality of their secret data and or private key Allow the auditor team to control and check the compliance with the present CP auditing criteria and components of the CPS as well as the OA s security policy and communicate every useful piece of information to them in accordance with the intentions of the PMA
146. s it may be necessary to verify said signature Check alert provided by Application Software Suppliers Customer and OpenTrust using PS information as stated in section 2 above Cease to use such issued Certificates Subscriber RCA ICA and CA if they become invalid and remove them from any applications they have been installed on 9 7 Disclaimers of Warranties OpenTrust guarantees through the PKI services Identification and authentication of CA with the CA Certificate generated by the RCA and or ICA Management of corresponding certificates and certificate status information regarding the present CP Level of trust of Subscriber Certificate managed by CA signed by RCA and or ICA CA certificate content according information transmitted by Customer OpenrTrust All rights reserved 87 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature OpenTrust provides no warranty express or implied statutory or otherwise and disclaims any and all liability for the success or failure of the deployment of the PKI or for the legal validity acceptance or any other type of recognition of its own certificates otherwise mentioned above No more guarantees can be pinpointed by the Customer Subscriber and Relying Party in their contractual relationship if there is any 9 8 Limitations of Liability OpenTrust makes no claims with regard to the suitability or authenti
147. scretion need to be covered in a Certificate Policy or a certification practice statement A public key cryptographic system invented by Rivest Shamir and Adelman A public and private Key Pair used for the purposes of digitally signing electronic documents and verifying digital signatures Trusted Role Those individuals who perform a security role that is critical to the operation or integrity of this PKI Sub CA domain space Signature Key Pair Computer hardware software and or procedures that a are reasonably secure from intrusion and misuse b provide a reasonable level of availability reliability and correct operation c are reasonably suited to Trustworthy System OpenTrust All rights reserved 26 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature performing their intended functions and d adhere to generally accepted security procedures A Certificate that 1 a Certification Authority has issued 2 the Subscriber listed in it has accepted 3 has not expired and 4 has not been revoked Thus a Certificate is not valid until it is both issued by a CA and has been accepted by the Subscriber Valid Certificate Wildcard Means a complete domain name containing an asterisk in the leftmost label of the Customer FQDN 1 6 2 Acronyms Acs Advanced Encryption Standard e Certification Authority ta
148. serves rights to take decision to change key at any time 5 6 2 ICA ICA private key validity period is defined in compliance with cryptographic security recommendations for key size length ICA certificate has a validity period defined in section 6 3 2 2 below OpenrTrust All rights reserved 60 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature ICA cannot generate CA certificate whose validity period would be superior to the ICA certificate validity period A new key pair for ICA requires a new ICA certificate be generated Previous ICA certificates shall be used for validation process of the certification path for all CA certificates signed by this previous ICA and CRL Previous ICA private key shall be used to sign current CRL and revoke if it is necessary the previous CA signed by the previous ICA The PMA reserves rights to take decision to change key at any time 5 6 3 CA Certificate The CA private key validity period is defined in compliance with cryptographic security recommendations for key size length The CA certificate validity period is defined in section 6 3 below The CA cannot generate Subscriber certificates whose validity period would be superior to the CA certificate validity period The Subscriber certificate has a fixed validity period which cannot be changed due to end of life of CA Previous CA certificates shall be used fo
149. shall modify its practice to full fill the discrepancy If CA s PKI is not able or not willing to address remaining discrepancies then PMA ends the process and CA certificate can t be delivered to CA If CA s PKI full fills the audit requirement then CA certificate can be issued CA signed by RCA or ICA can only issue type of Subscriber Certificate that are covered by audit and approved by PMA refer to section 4 1 below If CA wants to issue other type of Subscriber Certificate after having signed by RCA or ICA then the new type of Subscriber Certificate shall be declared to PMA and approved by PMA following the processes described in section 4 1 and 4 2 According type of new Subscriber Certificate it might be necessary to issue a new CA certificate 4 2 3 Time to Process Certificate Applications No stipulation 4 3 Certificate Issuance 4 3 1 CA Actions during Certificate Issuance 4 3 1 1 RCA The PMA transmits the RCA certificate request to the OA The OA authenticates the certificate request before issuance OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role The RCA certificate is generated during a key ceremony using a RCA key pair refer to section 6 1 1 1 below During the key ceremony the RCA private key is backed up refer to section 6 2 4 1 below At the end of the key ceremony the RCA private key
150. sons Required per Task 54 5 2 3 Identification and Authentication for Each Pole 55 5 2 4 Roles Requiring Separation of Dutes esee enne 55 5 3 Personnel Controls Geessen iere E 55 5 3 4 Qualifications Experience and Clearance Requirements sseesseesseessesssessernennreennsnnnrenneenene 55 5 3 2 Background Check Procedures seen nennen entre en tentent snnt 56 RCM aus RE UTC 56 5 3 4 Retraining Frequency and Requirements nennen nennen 56 5 3 5 Job Rotation Frequency and Sequence eene nennen nnne nennen 56 5 3 6 Sanctions for Unauthorized Actons enne nennen nnne nnne nnns 56 5 3 7 Independent Contractor Heouiremente eee nnne 56 5 3 8 Documentation Supplied to Personnel sssssssssssssseseseeeen nennen 56 5 4 Audit Logging Procedures eene nennen nennen nennen nets entente rinse nunnu nann 56 5 4 1 Types of Events Hecorded nennen tnnt rentes nnne enne 56 5 4 2 Log Processing Frequency ssssssssssssssssees esee enne nennt sene etre ersten tenens 58 5 43 Retention Period for Audit Loge en nennen internes 58 5 4 4 Protection of Audit Log 58 5 4 5 Audit Log Backup Procedures enne tree rennen sinet nns 58 5 4 6 Audit Collection System Internal vs External sss 58 5 4 7 Event Causing Subject Notification sse eee nnns 58 5 4 8 Vulnerability Assessments AA 58 5 5 Records o vecim 59 55 1 Types of Records ArchiVed uui ent
151. ssigned to a node in the Domain Name System Means all the possible names of a domain that are subordinate to a unique node in the Domain Name System The result of a transformation of a message by means of a cryptographic 23 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Encryption Key Pair Federal Information Processing Standards FIPS Fully Qualified Domain Name FQDN Hardware Security Module HSM Hardware Token Hash Function Internet Engineering Task Force IETF Integrity Interoperability Opentrust All rights reserved system using keys such that a person who has received a digitally signed message can determine e Whether the transformation was created using the private signing key that corresponds to the signer s public verification key e Whether the message has been altered since the transformation was made A public and private Key Pair issued for the purposes of encrypting and decrypting data Federal standards that prescribe specific performance requirements practices formats communications protocols etc for hardware software data telecommunications operation etc U S Federal agencies are expected to apply these standards as specified unless a waiver has been granted in accordance with agency waiver procedures Means a domain name that includes all the labels of all the hi
152. ssuing it o The identity of the certified Subscriber Certificate o A Public Key that corresponds to a Private Key under the control of the certified Subscriber The Operational Period A serial number The Certificate format is in accordance with ITU T Recommendation X 509 version 3 A Certificate may include extension fields to convey additional information Certificate Extension about the associated Public Key the Subscriber the Certificate Issuer or elements of the certification process The process of accepting a Public Key and identifying information from an authorized Subscriber producing a digital Certificate containing that and other pertinent information and digitally signing the Certificate Certificate Manufacturing A named set of rules that indicates the applicability of a Certificate to a Certificate Policy CP particular community and or class of applications with common security requirements A message sent from a Customer to a Sub CA in order to apply for a digital Certificate Request Certificate The Certificate request contains information identifying the Subscriber and sometimes activation data A list of revoked Certificates that is created and signed by a CA A Certificate is added to the list if revoked e g because of suspected key compromise distinguished name DN change and then removed from it when it reaches Certificate Revocation the end of the Certificate s validity period In some c
153. st and CSR shall be performed in a manner which ensures the integrity of the information OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role OpenrTrust All rights reserved 39 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The following actions must occur during a CA Key Ceremony which shall be witnessed by an OPENTRUST PMA witness at least Customer may have also a witness e Issuance of CA keys refer to section 6 1 1 3 below e Backup of Sub CA private key refer to section 6 2 4 3 below e Generation of CA CSR The CSR shall include the CA s public key e RCA private key is activated to sign CA certificate refer to section 6 2 6 1 6 2 7 1 and 6 2 8 1 below or ICA private key is activated to sign CA certificate refer to section 6 2 6 2 6 2 7 2 and 6 2 8 2 below e At the end of the key ceremony the CA private key is deactivated refer to section 6 2 9 3 below CA key is destroyed inside the HSM refer to section 6 2 9 3 below and only exist on backup format refer to section 6 2 4 3 below At the end of the key ceremony the RCA private key is deactivated refer to section 6 2 9 1 below ICA private key is deactivated refer to section 6 2 9 2 below RCA key is destroyed inside the HSM refer to section 6 2 9 1
154. stops all obligation and liability for the PMA RCA ICA and CA cannot continue delivering electronic certificate referred to by the present CP refer to section 5 8 above 9 11 Individual Notices and Communications with Participants The PMA provides all participants with new version of CP via the PS as soon as it is validated by the PMA 9 12 Amendments 9 12 1 Procedure for Amendment The PMA reviews CP and CPS at least yearly and each time a new requirements are set in CAB Forum Mozilla and or ETSI that have direct impact on the present CP and PKI services Additional reviews may be enacted at any time at the discretion of the PMA Spelling errors or typographical corrections which do not OpenrTrust All rights reserved 88 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature change the meaning of the CP are allowed without notification Prior to approving any changes to this CP PMA notifies PKI components According change in the CP some CA certificate may have to be revoked and re issued if it is possible according the new rules set in the CP again according the new rules to be respected If the PMA wishes to recommend amendments or corrections to the CP such modifications shall be circulated to appropriate parties identified by PMA The PMA collects sums up and proposes CP modifications according to approval procedures 9 12 2 Notificati
155. tected and shall meet the applicable security policy requirements of the cryptographic module used to store the keys The PMA appointed individuals shall receive their activation data during the key ceremony through a face to face meeting Creation and distribution of activation data are logged The activation data are never transmitted by any other means 6 4 1 2 ICA ICA activation data used to protect HSM containing ICA private keys are generated during the initial key ceremony The activation data used to unlock private keys in conjunction with any other access control shall have an appropriate level of strength for the keys or data to be protected and shall meet the applicable security policy requirements of the cryptographic module used to store the keys The PMA appointed individuals shall receive their activation data during the key ceremony through a face to face meeting Creation and distribution of activation data are logged The activation data are never transmitted by any other means 6 4 1 3 CA CA activation data used to protect HSM containing CA private keys are generated during the initial PKI key ceremony The activation data used to unlock private keys in conjunction with any other access control shall have an appropriate level of strength for the keys or data to be protected and shall meet the applicable security policy requirements of the cryptographic module used to store the keys The PMA and or Customer according the
156. tion key activation OpenrTrust All rights reserved 54 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature key backup CA and CA certificate revocation It is forbidden to own privileges role for the following operation at the same time An individual owning a role in PKI system operation shall not be involved in any other operation An individual owning a role in security operation shall not be involved in any other operation except HSM activation and Key pair protection only if dual control is respected An individual owning a role in key management operation shall not be involved in any other operation except HSM activation and Key pair operation only if dual control is respected An individual owning a role in audit only for internal and Customer audit operation shall not be involved in any other operation except security operation This rule doesn t apply to any kind of external auditor which can t have any role in the PKI An individual owning a role in on line PKI Software administration shall not be involved in on line PKI software operation An individual owning a role in HSM activation may be involved in key pair protection if and only if she he cannot control key pair alone this rule applies only for RCA ICA CA and OCSP Customer is responsible to define and implement trusted roles and associated operation acco
157. tion 4 9 3 4 9 3 1 Revocation Request Procedure RCA Revocation of the RCA certificate requires revocation of all ICA certificate refer to section 4 9 3 2 below and CA certificates refer to section 4 9 3 3 below it has issued The revocation of a RCA certificate requires the authorization of 2 distinct individuals acting as permanent members of the PMA PMA can decide in this particular case to also destroy the RCA private key backup OpenrTrust All rights reserved 44 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 4 9 3 2 ICA Revocation of the ICA certificate requires also revocation of all CA certificates refer to section 4 9 3 3 below ICA has issued The revocation of an ICA certificate requires the authorization of 2 distinct individuals acting as permanent members of the PMA ICA revocation request is transmitted to the OA by the PMA The OA authenticates the ICA revocation request during a face to face meeting OA authenticates all key ceremony attendee refer to section 3 2 above using list provided by authorized representative for witness and the list of OA of PKI trusted role The operation is video recorded and performed according to a key ceremony script RCA key pair is undertaken and witnessed in a physically secure environment refer to section 5 1 above by personnel in trusted roles refer to section 5 2 above
158. tor authentication for example using Biometrics and badge to go in and out in the CA PS and RA physical secured area Two person physical access controls to both the cryptographic module and computer system shall be required CA RA and PS equipment and data server HSM log archive are stored in cabinet in dedicated area under control of trusted role only The security techniques employed are designed to resist a large number and combination of different forms of attack The mechanisms used include at minimum Perimeter alarms closed circuit television reinforced walls and motion detectors Two factor authentication using Biometrics and badge All the networking and systems components are installed in cabinets in secure area OA uses human to continually monitor the OA facility housing equipment on a 7x24x365 basis The OA facility is never left unattended 5 1 2 5 1 2 1 Physical Access RCA and ICA Equipment and data HSM activation data backup of key pair computer log key ceremony script certificate request shall always be protected from unauthorized access The physical security mechanisms for equipment at a minimum shall be in place to Store all removable media and paper containing sensitive plain text information in secure containers Monitor either manually or electronically for unauthorized intrusion at all times Ensure no unauthorized access to the hardware and activation data is permitted Ens
159. tware are taken regularly Adequate back up facilities are provided to ensure that all essential business information and software can be recovered following a disaster or media failure Back up arrangements for individual systems are regularly tested to ensure that they meet the requirements of the OA business continuity plan At least one full backup copy is stored at an offsite location disaster recovery OA The back up copy is stored at a site with physical and procedural controls commensurate to that of the operational PKI system 5 2 Procedural Controls 5 2 1 Trusted Roles PMA shall ensure that OA s roles are defined in order to operate the following set of trusted functions in support of the PKI services deployed by OpenTrust only with an appropriate separation of duties Security operation Owns overall responsibility for managing the implementation of policy practices and CP and defines all the PKI roles and appoints physical person to trusted role PKI system operation Cleared to install configure back up recover and maintain PKI systems off line and on line Key management operation Manages all HSM of the PKI on line and performs key ceremonies off line and on line Audit operation Authorized to view archives and audit logs produced during the usage and management of the PKI systems on line HSM activation Cleared to hold activation data which are necessary for hardware security module operation off
160. type of Subscriber Certificate PMA is composed of internal expert and managed by the Director of Managed Services According to the need of tasks to be performed PMA may involve external persons External persons act only for temporary mission and do not belong to PMA 1 3 2 Root Certificate Authority RCA OpenTrust is the RCA owner A RCA is a CA which is characterized by having itself as the issuer i e it is self signed RCA can t be revoked in the normal manner i e being included in an Authority Revocation List and when used as a Trust Anchor must be transmitted or made available to any Relying Parties according to secure mechanisms outlined in section 6 1 4 A RCA is represented by an authorized person named Authorized Representative The Authorized Representative is appointed by the legal entity that owns the RCA RCA is always used and protected offline RCA is never connected to any network The RCA certificate is a self signed certificate and never receives a certificate from another CA never certified or cross certified with other external CA The RCA supports the following PKI services Generation of Root CA key pair Generation of Root CA and OCSP certificate Generation of ICA and CA certificates Revocation of ICA and CA certificates Rekey of a Root CA ICA and CA certificates Log trail generation The RCA operates its services according to this CP and its corresponding CPS The RCA cannot
161. udits Auditor may rely and delegate some part of the audit to selected auditor that is expert OpenrTrust All rights reserved 81 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The auditor is either a private firm which is independent from the entity being audited or sufficiently organizationally separated from that entity to provide an unbiased independent evaluation The PMA determines whether a compliance auditor meets these requirements in order to audit RCA ICA CA and RA 8 3 Topics Covered by Assessment The purpose of a compliance audit shall be to verify that a component operates in accordance with this CP and the corresponding CPS For RCA and ICA the scope of audit is the RCA and ICA OA and PS component as described in the present CP and CPS For CA the scope of audit shall cover all PKI component used to manage Subscriber Certificate as identified in section 4 1 above as described in CA s CP and CPS When RA uses LRA then only sample of LRA is audited in order to be sure that the LRA know and respect the CA s CP and CPS Audit shall also cover contracts between Customer and Opentrust with OA when OA is hosted by distinct entity from the entity that owns the CA RA and LRA and Subscriber General Term of Usage and the internal audit made by entity that owns the CA refer to section 8 1 above 8 4 Actions Taken as a Result of
162. ull name including surname and given name s of the representative o The full name and legal status of the authorized representative s Employer o Professional phone number and email of the authorized representative o A place of business physical address or other suitable method of contact for the authorized representative The CA certificate request shall be signed by the authorized representative If the signature is electronic signature then PMA shall first authorize means to be used for electronic signature and validation of the electronic signature of the CA certificate request The CA certificate request has to be submitted in a due delay in order to be sure to have a new CA certificate and operational CA s key pair before the expiration of the current CA s private key refer to section 5 6 3 and OpenrTrust All rights reserved 36 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 6 3 2 below The date of submission has also to take in account the time required for approval refer to section 4 2 3 below Associated to the CA certificate request the Authorized representative shall join its copy of a National Government issued ID containing its picture PMA store copy of Authorized representative s ID The following information shall accompany the CA certificate request CA s CP and CPS Technical and organizational architecture
163. urari 83 e cere C 83 SE Eeer E E e 83 9 2 Financial Responsibility erat tete een tae etn tiet edes ce Ro Papx rt auae 83 GEN Ne nee ee teet eter ec be e Dea pate ea nee Rog eub enis Due 83 9 2 2 Other ASSels udi EUER eA ae ane 83 9 2 83 Insurance or Warranty Coverage for Subscribers ssssssssssssseeeenee 83 9 3 Confidentiality of Business Information 83 9 3 1 Scope of Confidential Iniormatton ener enne nns 83 9 3 2 Information Not Within the Scope of Confidential Information sssssseeeseeeseeeeenesenesnnesnnsnnssenees 84 9 3 3 Responsibility to Protect Confidential Information sse 84 9 4 Privacy of Personal Information esssssssssssssseeesesenneneen nennen entere enne nnne enne 84 94 1 Privacy Plans a eR IRR Re DOE EE A A ae 84 9 4 2 Information Treated as Private 84 9 4 3 Information Not Deemed Private 84 9 4 4 Responsibility to Protect Private Information 85 9 4 5 Notice and Consent to use Private Information essen 85 9 4 6 Disclosure Pursuant to Judicial or Administrative Process 85 9 4 7 Other Information Disclosure Circumstances eene 85 9 5 Intellectual Property Rights AAA 85 9 6 Representations and Warranties ssssssssssssessseeeeenen nennen entretenir nnne enne 85 9 6 1 PMA Representations and Warranties nennen nennen nnns nnne 85 9 6 2 RCA and
164. ure all removable media and paper containing sensitive plain text information is stored in secure containers Any non authorized individual entering secure areas shall not be left for any significant period without oversight by an authorized employee Ensure an access log is maintained and inspected periodically Provide at least 2 layers of increasing security such as perimeter building and operational room Require two trusted role physical access controls to both the cryptographic HSM and activation data A security check of the OA facility housing equipment shall occur if the facility is to be left unattended At a minimum the check shall verify the following OpenrTrust All rights reserved 51 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature The equipment is in a state appropriate to the current mode of operation For off line component all equipment is shut down Any security containers temper envelop safe are properly secured Physical security systems e g door locks vent covers electricity are functioning properly The area is secured against unauthorized access Removable cryptographic modules shall be deactivated prior to storage When not in use removable cryptographic modules and the activation data used to access or enable cryptographic modules shall be placed in safe Activation data shall eit
165. uring key ceremonies Generation of Root CA and OCSP certificate generates the Root CA certificates and OCSP certificate during key ceremonies Generation of ICA key pair generates the ICA key pairs and CSR during key ceremonies Generation of CA key pair generates the CA key pairs and CSR during key ceremonies This service is only for Customer which requests this service and for OpenTrust s CA Generation of OCSP certificate for ICA generates OCSP certificate for ICA during key ceremonies Generation of ICA and CA certificate RCA generates Intermediate CA and CA certificates during key ceremonies Generation of CA and OCSP certificate ICA generates OCSP and CA certificates during key ceremonies OpenrTrust All rights reserved 13 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature Revocation of ICA and CA certificate when the link between the CA and CA public key defined within the certificate delivered by the Root CA is considered no longer valid the Root CA revokes the Intermediate CA and or CA certificate s Revocation of CA certificate when the link between the CA and CA public key defined within the certificate delivered by the ICA is considered no longer valid the ICA revokes the CA certificate s Rekey of an ICA and CA certificate action of delivering a new certificate whatever the certificate content modification to the ICA and
166. usiness Is Our Signature A Key Ceremony KC is an operation enabling the management generation and destruction of cryptographic key pairs and CA life cycle Key Ceremony KC certificate signature and revocation A key ceremony requires a minimum number of trusted employees whom represent the owner of the PKI The process of creating a Private Key and Public Key pair Object Identifier OID An object identifier is a specially formatted sequence of numbers that is registered with an internationally recognized standards organization Protocol useful in determining the current status of a digital Certificate without requiring CRLs An online server operated under the authority of the RCA or ICA and OCSP Responder connected to its Repository for processing Certificate status requests See also Online Certificate Status Protocol The operational period of a Certificate is the period of its validity It would Operational Period of typically begin on the date the Certificate is issued or such later date as a Certificate specified in the Certificate and end on the date and time it expires as noted in the Certificate or earlier if revoked Department agency partnership trust joint venture or other association PN Personal Identification Number See activation data for definition PKCS 10 Public Key Cryptography Standard 10 developed by RSA Security Inc which defines a structure for a Certificate Signing Request Defined by IE
167. ve Require that each individual in a trusted role use a unique credential created by or assigned to that person in order to authenticate to PKI component If an authentication control used by a trusted role is a username and password then the handling of those authentications shall be performed in accordance with corporate enterprise security policy Require trusted roles to log out from the PKI service of the PKI component and lock workstations when no longer in use OpenrTrust All rights reserved 74 www opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill 6 5 2 Securing Your Business Is Our Signature Configure workstations with inactivity time outs that log the user off and lock the workstation after a set time of inactivity without input from the user PKI components allow a workstation to remain active and unattended if the workstation is otherwise secured and running administrative tasks that would be interrupted by an inactivity time out or system lock Review all system accounts and deactivate any accounts that are no longer necessary for operations If applicable for a PKI component means only for a PKI component that uses a different access control system than a certificate for a trusted role lockout account access to the PKI component after no more than a defined maximum value of failed access attempts provided that this security measure is supported by the PKI
168. ve a new ICA certificate and operational ICA s key pair before the expiration of the current ICA s private key refer to section 5 6 2 and 6 3 2 below The date of submission has also to take in account the time required for approval refer to section 4 2 3 below Associated to the ICA certificate request the Authorized representative shall join its copy of a National Government issued ID containing its picture PMA store copy of Authorized representative s ID 4 1 2 3 CA CA certificates must be authorized by the PMA prior to issuance The issuance process will include documenting the following information to be contained in the CA certificate request dentity to set in the CA certificate refer to section 3 1 1 above Legal Entity which owns CA identification data i e full name and legal status of the associated legal person or other organizational entity and any relevant existing registration information e g company registration of the associated legal person or other organizational entity CSR associated with the generated key pair refer to section 6 1 1 3 The CSR shall be included in the application if the CA s key pair has been generated before the key ceremony to issue CA certificate Identity of the RCA or ICA to be used to sign the CA certificate Validity period of the CA certificate Cryptographic information of the CA certificate CA Certificate content Authorized representative information o The f
169. w opentrust com Ref OpenTrust DMS RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 9 12 Types of Names i inier c neni rtt un fe eas eg bid d erra cha atts Medes Anes 30 3 1 2 Need for Names to Be Meaningfu enne en nnne nnn nennen 31 3 1 8 Anonymity or Pseudonymity of Certificate sss 31 3 1 4 Rules for Interpreting Various Name FOrmS nennen nennen nnne 32 3 1 5 Uniqueness of Names enne nsi thnn aaa neni tenens sa sn isis TTS 32 3 1 6 Recognition Authentication and Role of Trademarks ssssnsssssnnsssnnnsennnnsrnnnnntnnnnssenn nnne nn nnne 32 3 2 i itialldentity Validation E aaa i aaa ap i a a 32 3 2 1 Method to Prove Possession of Private key 32 3 2 2 Authentication of Organization Identity nnne nen 32 3 2 8 Authentication of Physical Person Jdentitv nnne 33 KREE EN einfer gt e Lu EE 33 3 2 5 Non Verified Subscriber Information ener enne 33 3 2 6 Criteria for Interoperation sessssssssseseeseesseeenne en tnen ennt nnns nnns entente nns nnns sentent tern 33 3 3 Identification and Authentication for Re key Requests nens 34 3 3 1 Identification and Authentication for Routine PHe key sese 34 3 3 2 Identification and Authentication for Re key After Revocation sse 34 3 4 Identification and Authentication for Revocation Request ssssssssseeenenenes 34 4 CERTIFICATE LIFE CYCLE OPERATIONAL REQUIREMENTS 35
170. y auditor approved by PMA according schema 1 2 3 or 4 8 1 1 CA with Technical constraint SSL certificate onl During the period in which the CA issues Certificates the PMA shall monitor adherence to its Certificate Policy Certification Practice Statement and these Requirements and strictly control its service quality by performing audits on at least a quarterly basis against a randomly selected sample of the greater of one certificate or at least three percent of the Certificates issued by it during the period commencing immediately after the previous self audit sample was taken This sample has to be transmitted by CA to the PMA on a quarterly basis During yearly audit PMA control how CA selects the sample 8 1 2 CA internal audit CA shall have its internal audit control procedure in order to periodically audit PKI component at least once a year component in order to control adherence between its CP CPS and the present CP For SSL certificate during the period in which the CA issues Certificates the Customer shall monitor adherence to its Certificate Policy Certification Practice Statement and these Requirements and strictly control its service quality by performing self audits on at least a quarterly basis against a randomly selected sample of the greater of one certificate or at least three percent of the Certificates issued by it during the period commencing immediately after the previous self audit sample was taken The CA shall
171. y signed by RCA s approved by PMA CA can t be cross certified however CA can be signed by others ICA s and or RCA s approved by PMA Certificates delivered by PKI components of CA contained in RCA trusted domain are managed according to the rules and requirements stated by OpenTrust and Customer According the chosen level of trust for the CA refer to section 1 4 above and section 4 1 and 4 2 below the Subscriber certificates are managed according requirements set ETSI 102 042 ETSI 101 456 and CAB forum OpenrTrust All rights reserved 33 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securing Your Business Is Our Signature 3 3 Identification and Authentication for Re key Requests 3 3 1 Identification and Authentication for Routine Re ke Same procedures as described in section 3 2 above apply 3 3 2 Identification and Authentication for Re key After Revocation Same procedures as described in section 3 2 above apply Before to apply the procedure the PMA has to investigate and wait the audit report conclusion realized after the revocation in order to decide to if the renewal certificate is possible 3 4 Identification and Authentication for Revocation Request Same procedures as described in section 3 2 above apply OpenrTrust All rights reserved 34 www opentrust com Ref OpenTrust_DMS_RCA Program_OpenTrust_CP v 1 2 OPENTRUST i aah ill Securi

Download Pdf Manuals

image

Related Search

Related Contents

SU Carb Adjusting - Jag  BakkerElkhuizen Goldtouch Adjustable  JVC KW-XC828 User's Manual  Secure Copy User Guide  床暖房コントローラ C-12HB 取扱説明書  Manual - CPcam  Avocent Cyclades CS Alterpath ACS32  Tripp Lite SU5000RT4UTF User's Manual  Granville Phillips 358 Controller Manual  アウルキッズ - EXGEL エクスジェル | 株式会社 加地  

Copyright © All rights reserved.
Failed to retrieve file