On Wed, Mar 8, 2017 at 12:57 AM, Peter Bowen via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote:
> If the DTP is only performing the functions that Jakob lists, then > they only need an auditor's opinion covering those functions. In fact > there is no way for an auditor to audit functions that don't exist. > For example, consider the WebTrust for CA criteria called "Subordinate > CA Certificate Life Cycle Management". If the only CA in scope for > the audit does not issue Subordinate CA Certificates, then that > criteria is not applicable. Depending on the auditor, it might be > that the CA needs to write in some policy (public or private) "the CA > does not issue Subordinate CA Certificates." > > Many auditors vary how much they charge for their work based on the > expected effort required to compete the work. I believe Jakob's point > is that an audit where all the criteria are just "we do not do X" is > very quick -- for example a DTP that does not have a HSM and does not > digitally sign things is going to be a much cheaper audit than one > that does have a HSM and signs things under multi-person control. So I agree with this - namely, that a DTP audit does not include the Principles and/or Criteria relevant for the operational aspects they don't control, because the auditor neither forms an opinion about the third-party operation. I think a good example, to continue with yours, if the issuing CA handles the HSM, and is already audited as such, then the auditor will not opine on another auditors work. So the scope of a DTP audit will be limited to the functions provided by the DTP. But the same is true for an externally operated sub-CA, for which the majority of services are provided for by the "issuing" CA, and the DTP performs the validation functions for this sub-CA. This is why I'm suggesting, from an audit scope, they're functionally equivalent approach, except one avoids the whole complexity of identifying where or not a DTP is something different-than a sub-CA, since the _intent_ is true in both, which is that 100% of the capabilities related to issuance are appropriately audited - either by the DTP/sub-CA or by the issuing CA/managed CA provided Does this make it clearer the point I was trying to make, which is that they're functionally equivalent - due to the fact that both DTPs and sub-CAs have the issue of multi-party audit scopes? _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy