Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider adding NetSec audit requirement #251

Closed
clintwilson opened this issue Jun 5, 2024 · 6 comments
Closed

Consider adding NetSec audit requirement #251

clintwilson opened this issue Jun 5, 2024 · 6 comments
Labels

Comments

@clintwilson
Copy link
Member

Now that CPA Canada has broken out the Audit Criteria which address assessment of compliance with the CA/B Forum's NCSSRs, we should consider requiring this audit (e.g. WebTrust Principles and Criteria for Certification Authorities – Network Security – Version 1.7 or later) within Section 8.4 of the SBRs.

@srdavidson
Copy link
Contributor

Something like this?

image

@srdavidson
Copy link
Contributor

srdavidson commented Jun 13, 2024

For item 2, according to Dave Chin, the separate reporting for WebTrust for NetSec starts for audit periods beginning on or after April 1, 2025 and the minimum version should be bumped up to NetSec 2.0

@srdavidson
Copy link
Contributor

Should also update the "Additional Compliance Date" table as follows

| -- | NS003 | Comply with Network and Certificate System Security Requirements, Version 2.0 | November 12, 2024 |

@srdavidson
Copy link
Contributor

srdavidson commented Jul 18, 2024

Draft text may be seen at srdavidson/smime@927a788...8919252

@srdavidson
Copy link
Contributor

srdavidson commented Jul 18, 2024

Note that a similar change needs to occur in the TLS BR.
cabforum/servercert#525

@clintwilson
Copy link
Member Author

FWIW, I have an open PR for this in the TBRs here: https://github.com/cabforum/servercert/pull/514/files

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants