-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA Infrastructure Scope update #44
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. CS group thoughts: What if we use something similar to what is in section 3.1.2.1 "The CA SHOULD ensure retained and/or archived audit logs are kept and managed in a manner sufficiently effective to prevent unapproved alteration or access." for all other relevant security support system sections (e.g. change management, vuln management, etc.) The benefit of this is that it would bring back the requirements to protect security support systems without blowing up the trusted roles bit (which was a concern in the past). Vuln management example: "Vuln management systems would have to be configured/locked down in a way that prevents malicious attacks on Certificate Systems" |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,9 @@ | ||
--- | ||
title: Network and Certificate System Security Requirements | ||
subtitle: Version 2.0.1 | ||
subtitle: Version {} | ||
author: | ||
- CA/Browser Forum | ||
date: 28 Oct, 2024 | ||
date: {} | ||
copyright: | | ||
Copyright 2024 CA/Browser Forum | ||
|
||
|
@@ -64,15 +64,10 @@ The following are outcomes that this document seeks to achieve: | |
|
||
**CA Infrastructure**: Collectively the infrastructure used by the CA or Delegated Third Party which qualifies as a: | ||
|
||
* Certificate Management System; | ||
* Certificate System; | ||
* Delegated Third Party System; | ||
* Issuing System; | ||
* Root CA System (Air-Gapped and otherwise); or | ||
* Security Support System. | ||
|
||
**Certificate Management System**: A system used by a CA or Delegated Third Party to process, approve issuance of, or store certificates or certificate status information, including the database, database server, and storage. | ||
|
||
**Certificate System**: A system used by a CA or Delegated Third Party to access, process, or manage data or provide services related to performing: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Cloud Services Subgroup Concern: Removal of Support Systems from Certificate Systems no longer encompasses those periphery systems in any kind of requirements for controls. How can we incorporate those requirements into this definition? |
||
|
||
1. identity validation; | ||
|
@@ -89,10 +84,6 @@ The following are outcomes that this document seeks to achieve: | |
|
||
**Delegated Third Party**: A natural person or legal entity that is not the CA and that operates any part of a Certificate System. | ||
|
||
**Delegated Third Party System**: Any part of a Certificate System used by a Delegated Third Party while performing the functions delegated to it by the CA. | ||
|
||
**Issuing System**: A system used to sign certificates or validity status information. | ||
|
||
**Key Pair**: The Private Key and its associated Public Key. | ||
|
||
**Multi-Factor Authentication**: An authentication mechanism consisting of two or more of the following independent categories of credentials (i.e. factors) to verify the user’s identity for a login or other transaction: | ||
|
@@ -145,20 +136,20 @@ Each factor is independent of the other(s). | |
2. store a Root CA Private Key; or | ||
3. create digital signatures using a Root CA Private Key. | ||
|
||
**Security Support System**: A system or set of systems supporting the security of the CA Infrastructure, which minimally includes: | ||
**Security Support System**: The System(s) supporting the security of CA Infrastructure, performing functions such as: | ||
|
||
1. authentication; | ||
2. network boundary control; | ||
3. audit logging; | ||
4. audit log reduction and analysis; | ||
5. vulnerability scanning; | ||
6. physical intrusion detection; | ||
7. host-based intrusion detection; and | ||
8. network-based intrusion detection. | ||
#. authentication; | ||
#. network boundary control; | ||
#. audit logging; | ||
#. audit log reduction and analysis; | ||
#. vulnerability scanning; | ||
#. physical intrusion detection; | ||
#. host-based intrusion detection; and | ||
#. network-based intrusion detection. | ||
|
||
**System**: One or more pieces of equipment or software that stores, transforms, or communicates data. | ||
|
||
**Trusted Role**: An employee or contractor of a CA or Delegated Third Party who has authorized access to any component of CA Infrastructure. | ||
**Trusted Role**: An individual employee or contractor of a CA or Delegated Third Party who has authorized access to any Certificate System or Root CA System. | ||
|
||
**Workstation**: A device, such as a phone, tablet, or desktop or laptop computer, which is: | ||
|
||
|
@@ -171,6 +162,8 @@ Prior to 2025-03-12, the CA SHALL adhere to these Requirements or Version 1.7 of | |
|
||
### 1. CA Infrastructure and Network Equipment Configuration | ||
|
||
The CA MUST define an inventory of Certificate Systems. | ||
|
||
#### 1.1 Network Segmentation | ||
|
||
##### 1.1.1 | ||
|
@@ -208,13 +201,10 @@ CA Infrastructure MUST be in a Physically Secure Environment. | |
|
||
##### 1.2.2 | ||
|
||
Connections to the CA Infrastructure MUST be authenticated and encrypted, except where documented that a formal specification prohibits or limits the use of authentication and/or encryption. | ||
Connections to the CA Infrastructure MUST be authenticated and encrypted, except where formal specification(s) prohibits or limits the use of authentication and/or encryption. | ||
|
||
Connections within the CA Infrastructure SHOULD be authenticated and encrypted. | ||
|
||
1. between CA Infrastructure components; and | ||
2. between CA Infrastructure and non-CA Infrastructure. | ||
|
||
CA Infrastructure and Network Equipment MUST be implemented and configured in a manner that minimizes unnecessary active components and capabilities such that: | ||
|
||
1. all connections, communications, applications, services, protocols, and ports not used are removed and/or disabled; and | ||
|
@@ -292,6 +282,7 @@ The CA MUST ensure personnel assigned to Trusted Roles that are authorized to ac | |
###### 2.2.1.2 | ||
|
||
The CA SHOULD NOT allow group accounts or shared role credentials to authenticate to or access CA Infrastructure and/or Network Equipment. If group accounts or shared role credentials are used, the CA MUST be able to attribute each use to | ||
|
||
* an approved activity; and | ||
* an individual user or service account. | ||
|
||
|
@@ -441,16 +432,14 @@ The CA SHOULD ensure incident response plans minimally include: | |
|
||
### 4. Vulnerability Management | ||
|
||
The CA MUST implement the policies and procedures in this Section for identifying, evaluating, and resolving security vulnerabilities. | ||
#### 4.1 | ||
|
||
The CA MUST implement the policies and procedures in [Section 4](#4-vulnerability-management) for identifying, evaluating, and resolving security vulnerabilities. | ||
|
||
These policies and procedures MUST apply to all Certificate Systems. | ||
|
||
These policies and procedures SHOULD apply to Security Support Systems. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Security Support Systems has been removed as a defined term. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. +1 |
||
|
||
#### 4.1 Inventory of Certificate Systems | ||
|
||
The CA MUST define an inventory of Certificate Systems. | ||
|
||
#### 4.2 Intrusion Detection and Prevention | ||
|
||
The CA MUST protect the systems in the inventory of Certificate Systems against common network and system threats using intrusion detection and prevention controls. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For this objective, "CAs are able to clearly understand the minimum security requirements found in this document and successfully adapt/implement these Requirements to their own infrastructure and architecture" maybe add something like ", which requires a comprehensive inventory of their Certificate Systems to ensure that their infrastructure is adequately protected."