Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ballot NS004 - Updating Section 4 - Vulnerability Management - of the NSRs #34

Merged
merged 21 commits into from
Dec 17, 2024

Conversation

miguelantonios
Copy link
Contributor

@miguelantonios miguelantonios commented Apr 9, 2024

Summary: Section 4 of the Network and Certificate System Security Requirements (NCSSRs) stipulates that CAs have to perform a number of vulnerability management practices and emphasizes regular vulnerability scans and penetration tests. This Ballot proposes to replace Section 4 with a more comprehensive vulnerability management approach that is not limited to specific practices. Vulnerability scans and penetration tests are useful controls for some CA system environments but they are insufficient if they are not embedded in a broader set of policies and procedures that take CA specific risks into account. The network and system architecture can differ significantly between CAs. CAs should identify and address vulnerabilities based on the risks in their respective environments .

We propose that CAs should address all vulnerabilities within their own predefined timelines that must be commensurate with the risks they introduce. To meet the requirements of the new Section 4, CAs need to demonstrate that they have developed and implemented an effective vulnerability management program. We expect the CAs’ auditors to verify that remediation timelines are defined, measurable and adequate. This will replace the specific rule that limits remediation tracking to only critical vulnerabilities and within a 96 hour timeline. We have determined that this is an insufficient mechanism to achieve vulnerability management as multiple lower risk issues can also create an insecure system.

Similarly, CAs must create a policy definition of what network or system changes they regard as significant and require an additional (non-periodic) penetration test. The definition can vary from CA to CA. As a guideline, we assume that changes which alter the data flow or introduce new service integrations are typically significant. Penetration tests must still be performed by qualified and independent internal or external penetration testers as stated in the requirements.

All systems that are involved in performing CA functions must be in scope of the vulnerability management program. After multiple discussions in the NetSec and other meetings it has been determined that the system definitions in the NCSSRs can be interpreted in multiple different ways. This could create an inconsistency in what may be audited across CAs. To resolve this we propose two changes to Section 4. First, we have defined the functions of a CA. Second, CAs will be formally required to maintain an inventory of systems instead.

This Pull Request:

  • Makes changes to section 4 of the Network and Certificate System Security Requirements

How can you help?

  • Better: Add comments to this Pull Request.
  • Best: Add suggested edits directly to this Pull Request.

@miguelantonios miguelantonios requested a review from a team as a code owner April 9, 2024 18:43
@miguelantonios miguelantonios changed the title Ballot NS003 - Vulnerability Management Ballot NS-004 - Vulnerability Management May 7, 2024
@miguelantonios miguelantonios changed the title Ballot NS-004 - Vulnerability Management Ballot NS004 - Vulnerability Management May 8, 2024
@miguelantonios miguelantonios changed the title Ballot NS004 - Vulnerability Management Ballot NS004 - Updating Section 4 - Vulnerability Management - of the NSRs May 8, 2024
clintwilson pushed a commit that referenced this pull request May 29, 2024
Update wording throughout Section 4
Fix headings to fit within NS-003 structure
@clintwilson clintwilson added the ballot PR for ballots in the NSWG label Jun 7, 2024
docs/NSR.md Outdated Show resolved Hide resolved
miguelantonios and others added 3 commits July 4, 2024 00:07
This is  the latest PR for the work that the NetSec  team is doing to revamp section 4 of the NSRs
Incorporate feedback from Clint as discussed at CA/BF F2F #62

NB: This had to be rebased onto a branch that also changed the
definition of Certficate Systems, to Certificate System, with a list
similar to the one initially contained in this commit, but in fact more
extensive.

The list after Ballot NS-003 was:

   1. identity validation;
   2. identity authentication;
   3. account registration;
   4. certificate application;
   5. certificate approval;
   6. certificate issuance;
   7. certificate revocation;
   8. authoritative certificate status; or
   9. key escrow.

in the NS-004 pull request, the list was:

* certificate application;
* certificate validation;
* certificate approval;
* signing;
* certificate revocation;
* serving authoritative certificate status information; or
* key escrow.

I have resolved this conflict by taking "certificate validation" and
inserting it into the list as of NS-003 as the fifth item.

    -- tobij
Tobias S. Josefowitz and others added 4 commits July 17, 2024 17:33
In the Cloud Services call, we agreed that the term is problematic as
"certificate validation" is something that is performed by browsers when
encountering a certificate on a website, and also otherwise not required
as it should be covered by the "identity validation" list item.
Added a very minor addition to the Network Equipment definition by adding an "other" in "Hardware devices and OTHER components that..."
Added some language for clarity to the Certificate Systems definition.
Removed the word `minimally` from section 4 as it is already covered in the Introduction section. 

Made some verbiage changes to make the requirements clearer in section 4
Clint Wilson and others added 4 commits August 15, 2024 14:54
Based on discussion August 13, 2024, update Section 4.
Also reordering 4 of the 5 subsections to be more "sequential"
…iscussion

Proposed NS004 reorder and NSWG discussion updates
docs/NSR.md Show resolved Hide resolved
Added a preamble to section 4.4 that states: "The CA's vulnerability identification process MUST include monitoring for relevant security advisories and penetration testing."
Copy link
Contributor Author

@miguelantonios miguelantonios left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please disregard this commit. This is meant to be in the NS-004 PR.

Added preamble for section 4.4 

"The CA's vulnerability identification process MUST include monitoring for relevant security advisories and penetration testing."
docs/NSR.md Outdated Show resolved Hide resolved
docs/NSR.md Outdated Show resolved Hide resolved
docs/NSR.md Outdated

3. Document the factual basis for the CA’s determination that the vulnerability does not require remediation because
The CA's vulnerability identification process MUST include monitoring for relevant security advisories and penetration testing.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This duplicates line 502. Probably just cut it.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will remove one of them. Thanks.

Closing out some comments. Changes made:

1. Removed duplicate sentence about monitoring external sources for vulns

2. Updated language in 4.3
docs/NSR.md Outdated Show resolved Hide resolved
docs/NSR.md Show resolved Hide resolved
docs/NSR.md Outdated Show resolved Hide resolved
Clint Wilson and others added 2 commits September 10, 2024 09:17
Based on Dan's comments and discussion in 10 Sep 24 NSWG meeting, incorporating these changes prior to discussion period start.
Updating the effective date to April 22, 2025 and making it optional to adhere to these new requirements prior to April 22, 2025.
miguelantonios and others added 5 commits October 15, 2024 16:16
Changed the language in the ##Requirements section to read: 

"Effective 2025-04-29, the CA shall adhere to these Requirements"

This represents an effective date that is 7 days after NS-005 ballot goes into effect.
Updated ## Requirements language.
Remove unused definitions and clarify what NCSSR version is in force.
    
This was made in response to Corey Bonnell's feedback at https://groups.google.com/a/groups.cabforum.org/g/netsec/c/k4T0UfTRBDI/m/6LBjnhWbAQAJ


The date in force was revised to reflect what was used in NS005.
Remove the OWASP Top 10 definition.

I missed it in my previous commit.
@clintwilson clintwilson merged commit ad224e2 into cabforum:main Dec 17, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ballot PR for ballots in the NSWG
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants