[Cscwg-public] Ian's presentation from June 18 CS call
Dean Coclin
dean.coclin at digicert.com
Thu Jun 25 11:38:50 MST 2020
Ian McMillan (Microsoft) presented this at the last meeting regarding cloud
private key protection. This is still in discussion:
Current CS BR's in v2.0:
16.3 Subscriber Private Key Protection
For Non-EV Code Signing Certificates, the CA MUST obtain a representation
from the Subscriber that the Subscriber will use one of the following
options to generate and protect their Code Signing Certificate private keys:
a. A Trusted Platform Module (TPM) that generates and secures a key
pair and that can
document the Subscriber's private key protection through a TPM key
attestation.
2. A hardware crypto module with a unit design form factor certified as
conforming to at
least FIPS 140 Level 2, Common Criteria EAL 4+, or equivalent.
3. Another type of hardware storage token with a unit design form
factor of SD Card or
USB token (not necessarily certified as conformant with FIPS 140 Level 2 or
Common
Criteria EAL 4+). The Subscriber MUST also warrant that it will keep the
token
physically separate from the device that hosts the code signing function
until a signing
session is begun.
For Non-EV Code Signing Certificates, a CA MUST recommend that the
Subscriber protect Private Keys using the method described in Section
16.3(1) or 16.3(2) over the method described in Section 16.3(3) and obligate
the Subscriber to protect Private Keys in accordance with 10.3.2(2).
a. For EV Code Signing Certificates, CAs SHALL ensure that the
Subscriber's private key is
generated, stored and used in a crypto module that meets or exceeds the
requirements
of FIPS 140-2 level 2. Acceptable methods of satisfying this requirement
include (but
are not limited to) the following: The CA ships a suitable hardware crypto
module, with
a preinstalled key pair, in the form of a smartcard or USB device or
similar;
2. The Subscriber counter-signs certificate requests that can be
verified by using a
manufacturer's certificate indicating that the key is managed in a suitable
hardware
module;
3. The Subscriber provides a suitable IT audit indicating that its
operating environment
achieves a level of security at least equivalent to that of FIPS 140-2 level
2.
My draft proposal:
16.3 Subscriber Private Key Protection
For Code Signing Certificates, the CA MUST obtain a representation from the
Subscriber that the Subscriber will use one of the following options to
generate and protect their Code Signing Certificate private keys:
a. A hardware crypto module with a unit design form factor certified as
conforming to at
least FIPS 140 Level 2, Common Criteria EAL 4+, or equivalent;
2. A Cloud-based key protection solution with the following
requirements enabled on the subscription, and a usage pattern as follows:
i. A hardware crypto module with a unit design form factor certified as
conforming to at least FIPS 140 Level 2, Common Criteria EAL 4+, or
equivalent;
ii. Key creation, storage, and usage of private key must remain within
the security boundaries of the cloud solutions hardware crypto module;
iii. Subscription must be configured to log all access, operations, and
configuration changes on the key. The configuration change log is available
for audits.
For Code Signing Certificates, CAs SHALL ensure that the Subscriber's
private key is generated, stored and used in a crypto module that meets or
exceeds the requirements of FIPS 140-2 level 2. Acceptable methods of
satisfying this requirement include (but are not limited to) the following:
a. The Subscriber counter-signs certificate requests that can be
verified by using a
manufacturer's certificate indicating that the key is managed in a suitable
hardware
module;
2. The Subscriber provides a suitable IT audit indicating that its
operating environment
achieves a level of security at least equivalent to that of FIPS 140-2 level
2;
3. The Subscriber provides a suitable report of the cloud key
protection solution subscription configuration protecting the key in
hardware crypto model with a unit design form factor certified as conforming
to at least FIPS 140 Level 2, Common Criteria EAL 4+, or equivalent.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20200625/ddd99135/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4916 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/cscwg-public/attachments/20200625/ddd99135/attachment-0001.p7s>
More information about the Cscwg-public
mailing list