On Wed, Mar 8, 2017 at 8:46 AM, Jakob Bohm via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Yes, I agree they should be functionally equivalent, in the sense that
> all aspects of the operation and issuance are validated, and that one
> entity is ultimately responsible for the actions of the others.
>
> The distinction I am making is that the entity named as ultimately
> responsible ("the CA") needs an audit report that covers all the
> requirements with some requirements possibly audited in the form of
> auditing the presence of valid audit report from the other entities
> involved.
>

Except that, from discussions with a number of WebTrust auditors, there is
an issue accepting such evidence. So the scenario you describe further is
not what actually happens in practice - and this is part of the motivation
for the Policy suggestion I provided, so that theory and practice can align.

For example, an auditor will not necessarily examine the audits of other
parties - this is true whether the other party is, for example, a
datacenter operator (which relates to physical security principles), a
"Cloud HSM" provider (which relates to key security principles), or what
we've identified as a Delegated Third Party.

If the function is not at all performed by the CA, then as Peter has noted,
the auditor will not report on it - and as a consequence, be unable to
produce a seal.
If the function is _partially_ performed by the CA, then the auditor will
report to the extent that function is provided by the CA.

So the disconnect here is your assertion that auditors are examining these
reports - whether they be sub-CA or DTPs. The extent of the reporting an
auditor performs during such an engagement is to report on the controls
relative to the principles - e.g. does the CA have a documented process to
review such audits, does the auditor have an opinion that such controls
provide sufficient evidence to the criteria and principles, and were they,
to the extent for the period in question, performed as such.

So we end up in a situation where such audits are not required to be
disclosed (at present), such audits may not conform to the expected
standards (and the audits Symantec has provided amply demonstrate this),
and for which the auditor of the 'issuing CA' may provide a clean opinion,
because their opinion was scoped to the specific activities of those
provided by Symantec Corporation (notably, in its omission, excluding that
of delegated third parties). This does not seem a desirable outcome,
particularly because it conflicts with Mozilla's many improvements towards
transparency.

Each of the Policy proposals Gerv has mentioned ends up in this scenario of
insufficiently controlling for and disclosing the concerns related to
issuance.

So now we circle back to the provision of delegated third party services by
reforming it such that it's treated as an externally operated sub-CA. As
Peter has noted, the extent of such audits would need to include the full
activities of that sub-CA in some form - you don't get to carve that up. In
practice, I'm suggesting that the "Issuing CA", during their annual audit
cycle, would have all the relevant controls and policies examined for that
sub-CA as part of the audit engagement and scope, and would perform some
form of 'site visit' to examine the set of controls and procedures relative
to the function they provide. This is, I assert, functionally similar to
the site audits a number of auditors already perform with respect to
third-party datacenter operations (fairly common) or more complex cases
such as managed key material (rare, but done).

It has the benefit, however, of aligning the practice of what an audit
opinion covers (e.g. there's no carve-out for the DTP operations), when the
audit is disclosed (publicly), and the technical capability for distinctive
issuance. I further suggest that anything less is to undermine the goal and
intent of Mozilla policy, which is quite reasonable - know who can issue
certs and what their policies are.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to