[cabfcert_policy] Trusted Roles Discussion

Dimitris Zacharopoulos jimmy at it.auth.gr
Mon Mar 28 07:16:43 MST 2016


Hello everyone,

Some comments in-line.

On 24/3/2016 5:19 μμ, Ben Wilson wrote:
>
> Here is a draft proposal.
>
> 5.1.        PROCEDURAL CONTROLS
>
> 5.1.1.     Trusted Roles
>
> A trusted role is one whose incumbent performs functions that can 
> introduce security problems if not carried out properly, whether 
> accidentally or maliciously. Trusted role operations include:
>
> •             The validation, authentication, and handling of 
> information in Certificate Applications
>
> •             The acceptance, rejection, or other processing of 
> Certificate Applications, revocation requests, renewal requests, or 
> enrollment information
>
> •             The issuance, or revocation of Certificates, including 
> personnel having access to restricted portions of its repository
>
> •             Access to safe combinations and/or keys to security 
> containers that contain materials supporting production services
>
> •             Access to hardware security modules (HSMs), their 
> associated keying material, and the secret share splits of the PINs 
> that protect access to the HSMs
>
> •             Installation, configuration, and maintenance of the CA
>
> •             Access to restricted portions of the certificate repository
>
> •             The ability to grant physical and/or logical access to 
> the CA equipment
>
> Each CA or Delegated Third Party SHALL:
>
> a.            Follow a documented procedure for appointing individuals 
> to Trusted Roles and assigning responsibilities to them;
>
> b.            Document the responsibilities and tasks assigned to 
> Trusted Roles and implement “separation of duties” for such Trusted 
> Roles based on the security-related concerns of the functions to be 
> performed;
>
> c.            Ensure that only personnel assigned to Trusted Roles 
> have access to Secure Zones and High Security Zones;
>
> d.            Ensure that an individual in a Trusted Role acts only 
> within the scope of such role when performing administrative tasks 
> assigned to that role;
>
> e.            Require employees and contractors to observe the 
> principle of “least privilege” when accessing, or when configuring 
> access privileges on, Certificate Systems;
>
> f.             Require that each individual in a Trusted Role use a 
> unique credential created by or assigned to that person in order to 
> authenticate to Certificate Systems;
>
> g.            Grant administration access to Certificate Systems only 
> to persons acting in Trusted Roles and require their accountability 
> for the Certificate System’s security;
>
> h.            Change authentication keys and passwords for any 
> privileged account or service account on a Certificate System whenever 
> a person’s authorization to administratively access that account on 
> the Certificate System is changed or revoked.
>
> 5.1.2.     Number of Individuals Required per Task
>
> Where multi-party control is required, all participants shall hold a 
> Trusted Role.  In the CA’s CPS, the CA or Delegated Third Party SHALL 
> disclose those tasks that require the involvement of two or more 
> persons, including the generation, activation, and backup of CA keys.
>
> 5.1.3.     Identification and Authentication for Trusted Roles
>
> Each CA or Delegated Third Party SHALL:
>
> a.            Require that each individual in a Trusted Role use a 
> unique credential created by or assigned to that person in order to 
> authenticate to Certificate Systems; and
>
> b.            Implement multi-factor authentication to each component 
> of the Certificate System that supports multi-factor authentication.
>
> 5.1.4.     Roles Requiring Separation of Duties
>
> No stipulation.
>

Should we add here at least some Roles that MUST be separated like 
operations related to Root Private Keys? For example:

- Root Private Key Activation
- Root Private Key Backup/Restore
- ...

> 5.2.        PERSONNEL CONTROLS
>
> 5.2.1.     Qualifications, Experience, and Clearance Requirements
>
> Individuals appointed to any Trusted Role SHALL be employees, 
> contractors, or employees of a contractor of the CA or Delegated Third 
> Party and bound by terms of employment or contract, and have 
> successfully completed an appropriate training program.   Prior to the 
> engagement of any person in the Certificate Management Process, 
> whether as an employee, agent, or an independent contractor of the CA 
> or Delegated Third Party, the CA or Delegated Third Party SHALL verify 
> the identity, qualifications, and trustworthiness of such person.  The 
> CA SHALL set forth its verification practices in its CPS.
>
> 5.2.2.     Background Check Procedures
>
> Persons fulfilling Trusted Roles shall pass a comprehensive background 
> check.
>
> Prior to commencement of employment in a Trusted Role, the CA shall 
> conduct background checks (where possible and in accordance with local 
> law) which include the following:
>
> •             Confirmation of previous employment, if any;
>
> •             Check of professional reference;
>
> •             Confirmation of the highest or most relevant educational 
> degree obtained;
>
> •             Search of criminal records (local, state or provincial, 
> and national);
>
> •             Check of credit/financial records; and
>
> •             Identification verification via government-issued photo 
> ID check.
>
> Factors revealed in a background check that should be considered 
> grounds for rejecting candidates for Trusted Roles or for taking 
> action against an individual currently serving in a Trusted Role 
> generally include (but are not limited to) the following:
>
> •             Misrepresentations made by the individual;
>
> •             Highly unfavorable or unreliable professional references;
>
> •             Certain criminal convictions; and
>
> •             Indications of a lack of financial or personal 
> responsibility.
>
> Background checks SHALL be refreshed at least every ten years.
>

This language "the CA shall conduct background checks (where possible 
and in accordance with local law) which include the following", as I 
understand it, means that ALL of these bullets MUST be checked during 
background check, unless they are not in accordance with local law. 
Perhaps something similar to the Data Source Accuracy section could be used:

"the CA shall conduct background checks (where possible and in 
accordance with local law). The CA SHOULD consider the following during 
its evaluation:"

All the rest looks fine.


Best regards,
Dimitris.

> 5.2.3.     Training Requirements and Procedures
>
> All personnel performing duties in Trusted Roles SHALL receive 
> comprehensive training.  Training SHALL be conducted in the following 
> areas:
>
> •             Security principles and mechanisms
>
> •             All PKI software relevant to their duties on the 
> Certificate System
>
> •             All PKI duties they are expected to perform
>
> •             Disaster recovery and business continuity procedures
>
> •             Relevant stipulations of this policy
>
> The CA SHALL provide all personnel performing information verification 
> duties with skills-training that covers basic Public Key 
> Infrastructure knowledge, authentication and vetting policies and 
> procedures (including the CA’s Certificate Policy and/or Certification 
> Practice Statement), common threats to the information verification 
> process (including phishing and other social engineering tactics), and 
> these Requirements.
>
> The CA SHALL maintain records of such training and ensure that 
> personnel entrusted with Validation Specialist duties maintain a skill 
> level that enables them to perform such duties satisfactorily.
>
> The CA SHALL document that each Validation Specialist possesses the 
> skills required by a task before allowing the Validation Specialist to 
> perform that task.
>
> The CA SHALL require all Validation Specialists to pass an examination 
> provided by the CA on the information verification requirements 
> outlined in these Requirements.
>
> 5.2.4.     Retraining Frequency and Requirements
>
> All personnel in Trusted Roles SHALL maintain skill levels consistent 
> with the CA’s training and performance programs.   Retraining SHALL 
> take place whenever a significant change to the Certificate System, 
> policies, or procedures occur.
>
> Documentation shall be maintained identifying all personnel who 
> received training and the level of training completed.
>
> 5.2.5.     Job Rotation Frequency and Sequence
>
> No stipulation.
>
> 5.2.6.     Sanctions for Unauthorized Actions
>
> Appropriate administrative and disciplinary actions as documented in 
> organization policy shall be taken against personnel who perform 
> unauthorized actions (i.e., not permitted by this CP or other 
> policies) involving the CA’s systems, the certificate status 
> verification systems, and the repository. Disciplinary actions may 
> include measures up to and including termination and shall be 
> commensurate with the frequency and severity of the unauthorized actions.
>
> 5.2.7.     Independent Contractor Controls
>
> Contractor personnel filling Trusted Roles SHALL be subject to all 
> requirements stipulated in this document.
>
> 5.2.8.     Documentation Supplied to Personnel
>
> Documentation sufficient to perform duties and procedures for each 
> Trusted Role SHALL be provided to the personnel filling that Trusted Role.
>
> *From:* Silva, Marcelo [mailto:masilva at visa.com]
> *Sent:* Thursday, March 24, 2016 9:03 AM
> *To:* Ben Wilson <ben.wilson at digicert.com>; policyreview at cabforum.org
> *Subject:* RE: Trusted Roles Discussion
>
> I agree with Ben.
>
> Additionally I think we have always to make a clear distinction 
> between RA and RA system, once RA can be used to identify an 
> organization that is a Registration Authority for a CA, and RA system 
> is the system itself managed by the RA organization.
>
> *From:* policyreview-bounces at cabforum.org 
> <mailto:policyreview-bounces at cabforum.org> 
> [mailto:policyreview-bounces at cabforum.org] *On Behalf Of *Ben Wilson
> *Sent:* Thursday, March 24, 2016 10:46 AM
> *To:* Ben Wilson <ben.wilson at digicert.com 
> <mailto:ben.wilson at digicert.com>>; policyreview at cabforum.org 
> <mailto:policyreview at cabforum.org>
> *Subject:* Re: [cabfcert_policy] Trusted Roles Discussion
>
> After talking on the call about this, I think it is better if we don’t 
> go down this path of defining specific roles.  Instead, Peter 
> suggested that  we outline tasks or functions to be performed and then 
> specify that they be performed by a person in a trusted role, and 
> that  persons in trusted roles receive training appropriate to the 
> performance of the task or function assigned.  That will make this 
> section 5.2.1 shorter and easier to digest, and therefore the  ballot 
> will be more likely to pass.
>
> *From:* policyreview-bounces at cabforum.org 
> <mailto:policyreview-bounces at cabforum.org> 
> [mailto:policyreview-bounces at cabforum.org] *On Behalf Of *Ben Wilson
> *Sent:* Thursday, March 24, 2016 7:57 AM
> *To:* policyreview at cabforum.org <mailto:policyreview at cabforum.org>
> *Subject:* [cabfcert_policy] Trusted Roles Discussion
>
> For discussion today:
>
> *European - ETSI*
>
> 	
>
> *U.S.  - NIST*
>
> 	
>
> *CABF Proposal?*
>
> - System Administrators: Authorized to install, configure and maintain 
> the TSP trustworthy systems for service management.
>
> 	
>
> CA Administrator:    Installation, configuration, and maintenance of 
> the CA and CSS
>
> 	
>
> Administrator – responsible for the installation, configuration, and 
> maintenance of systems
>
> - System Operators: Responsible for operating the TSP trustworthy 
> systems on a day-to-day basis.
> Authorized to perform system backup and recovery.
>
> 	
>
> Operations Staff:   Registering new subscribers and requesting the 
> issuance of certificates. …
>
> Configuring certificate profiles or templates
>
> 	
>
> Operator – responsible for backup and recovery
>
> - Security Officers: Overall responsibility for administering the 
> implementation of the security practices.
>
> 	
>
> Security Auditors are responsible for internal auditing of CAs and 
> RAs.  Security Auditors shall review, maintain, and archive audit 
> logs, and perform or oversee internal audits (independent of formal 
> compliance audits) to ensure that CAs and RAs are operating in 
> accordance with the associated CPSs
>
> 	
>
> Security Officer – responsible for administering the implementation of 
> the security practices.
>
> - System Auditors or evaluators: Authorized to view archives and audit 
> logs of the TSP trustworthy systems.
>
> 	
>
> See above
>
> 	
>
> Internal auditors - -responsible for reviewing the audit logs
>
> 	
>
> RA Staff -   Installation, configuration, and maintenance of the RA, etc.
>
> 	
>
> Validation Specialist – responsible for validating certificate requests
>
>
>
> _______________________________________________
> Policyreview mailing list
> Policyreview at cabforum.org
> https://cabforum.org/mailman/listinfo/policyreview

-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://cabforum.org/pipermail/policyreview/attachments/20160328/cfafc0e5/attachment-0001.html 


More information about the Policyreview mailing list