Thanks everyone for your input on this topic. I'm hearing consensus that we should not require a newly issued subordinate CA certificate to appear on an audit statement prior to being used to sign end-entity certificates. This is something that could be clarified in our policy with a statement such as "Newly issued subordinate CA certificates MUST appear on the CAs next period-of-time audit statements" in section 5.3.2.
It's not yet clear to me if we should require something more than disclosure of the actual certificate because: * All end-entity certificates are already required to contain "A Policy Identifier, defined by the issuing CA, that indicates a Certificate Policy asserting the issuing CA's adherence to and compliance with these Requirements" (BR 7.1.2.3). Isn't this enough to assert the controls applied to the subCA certificate? * I'm not opposed to explicitly stating that any newly issued subCA certificate MUST appear in the appropriate CP/CPS before being used, but isn't that obvious? * The amount of effort needed to verify compliance with a new requirement for a management assertion (option #2) is significant and could outweigh the benefit we receive from those documents. * Peter's sample assertion letter [1] includes a link to an auditor's key generation ceremony report. Can this type of audit report be shared publicly? If so, those might be a reasonable thing to require via a new field in CCADB. - Wayne [1] https://cabforum.org/pipermail/public/attachments/20160923/3da206b8/attachment-0001.bin On Wed, Mar 28, 2018 at 10:32 PM, Buschart, Rufus via dev-security-policy < [email protected]> wrote: > Operating a technically unconstrained issuing CA, Siemens CA (aka TSP) > does something very similar in case a new CA is necessary: > > * In an audited ceremony based on the operational and technical controls > audited in the last annual audit a key pair is generated on one of the HSMs > * A CSR is constructed and sent to our cross signing partner, together > with the witness report of the auditor, filled with all the information > required by Microsoft in the Audit Cover Letter Template > * The cross signing partner checks the report and creates the certificate > for the issuing CA After receiving the new certificate we update our CPS > Only after the new CPS is published certificates are issued > > In the next annual audit the new CA is part of the normal audit. > > So I would recommend to choose a combination of options #1 and #2. > > With best regards, > Rufus Buschart > > Siemens AG > GS IT HR 7 4 > Hugo-Junkers-Str. 9 > 90411 Nuernberg, Germany > Tel.: +49 1522 2894134 > mailto:[email protected] > > www.siemens.com/ingenuityforlife > > -----Original Message----- > From: dev-security-policy [mailto:dev-security-policy- > [email protected]] On Behalf Of Bruce > via dev-security-policy > Sent: Mittwoch, 28. März 2018 23:38 > To: [email protected] > Subject: Re: Audits for new subCAs > > Entrust does the following: > - Each subCA certificate is created through a audited ceremony. The > auditor creates a report indicating the key ID and the CPS which was used > for key generation. > - When it is time for the subCA to go into production, an intermediate > certificate is issued from a root. The intermediate certificate will meet > the requirements of the CPS and the BRs if applicable. > - The subCA can now issue certificates. The end entity certificates will > have a certificate policy which is stated in the CPS. As such, issuing a > certificate is an assertion that the subCA is issuing in accordance with > the certificate policy and CPS. > - The new subCA is compliance audited at the next time in our annual audit > cycle. Note the new subCA is operated the same as all other CAs meeting the > same certificate policy. > > I would note that if there was a significant change such as data center > location or new certificate policy, then we may want to consider a > point-in-time readiness assessment. I think that all CAs required a > point-in-time readiness assessment, before we started to issue EV > certificates. > > I suppose that I am stating that I support option 1 as I think the option > 2 attestments are already covered. However, option 3 may be required for a > new data center or a policy which has not been previously audited. > > Thanks, Bruce. > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

