[Servercert-wg] Results of Review Period: SC39 - Definition of Critical Vulnerability

Jos Purvis (jopurvis) jopurvis at cisco.com
Thu Apr 1 16:21:38 UTC 2021


This is to notify the community that the IPR review period for ballot SC39 (Definition of Critical Vulnerability) has completed. No IPR Exclusion Notices were filed, and the ballot becomes effective as of 30 March 2021.

 

The Network and System Security Requirements version 1.6 document is attached for reference and will be uploaded to the public website.

 

 

-- 
Jos Purvis (jopurvis at cisco.com)
.:|:.:|:. cisco systems | Cryptographic Services
PGP: 0xFD802FEE07D19105 | Controls and Trust Verification

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210401/bd5b81c4/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CA-Browser-Forum-Network-Security-Controls-v1.6.pdf
Type: application/pdf
Size: 69570 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210401/bd5b81c4/attachment-0001.pdf>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3699 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/servercert-wg/attachments/20210401/bd5b81c4/attachment-0001.p7s>


More information about the Servercert-wg mailing list