On 28/1/2019 8:48 μ.μ., Ryan Sleevi via Public wrote:
On Thu, Jan 24, 2019 at 2:30 PM Dimitris Zacharopoulos (HARICA) via
Public <[email protected] <mailto:[email protected]>> wrote:
On 24/1/2019 8:16 μ.μ., Wayne Thayer via Public wrote:
On today's call we discussed a number of changes to the bylaws
aimed at clarifying the rules for membership. The proposal for
section 2.1(a)(1) resulting from today's discussion is:
Certificate Issuer: The member organization operates a
certification authority that has a publicly-available audit
report or attestation statement that meets the following
requirements:
* Is based on the full, current version of the WebTrust for
CAs, ETSI EN 319 411-1 , or ETSI EN 319 411-2 audit criteria
Using the example reports for discussion (
http://www.webtrust.org/practitioner-qualifications/docs/item85808.pdf )
If a CA does not escrow CA keys, does not provide subscriber key
generation services, or suspension services, does that count as being
based on the "full, current version"? (Page 11, paragraph 2)
I think so, yes. Based on the exact CA operations, the exact audit scope
is determined. The Forum has set the WebTrust for CAs and ETSI EN 319
411-1 as an absolute minimum that includes attestation of the existence
of reasonable organizational and technical controls. If you recall, I
had proposed that for the SCWG we should also require WebTrust for CAs
Baseline and NetSec because they are already included in ETSI EN 319
411-1 and are more suitable for SSL/TLS Certificates. If a CA obtains a
WebTrust for CAs or ETSI EN 319 411-1 audit report, it means that the
core CA services are there and are operational.
Root programs have audit requirements exceptions and this applies
equally to Microsoft and Mozilla. I don't disagree to being more
inclusive but I believe the Forum must have objective and specific
requirements based on some international standards and not just
government regulations.
* Covers a period of at least 60 days
I'm curious for feedback from the ETSI folks, but perhaps a more
inclusive definition would be
- "Reports on the operational effectiveness of controls for a historic
period of at least 60 days"
The context being that ETSI is a certification scheme, but as part of
that certification, the CAB "may" ("should") examine the historic
evidence for some period of time. 7.9 of 319 403 only requires "since
the previous audit"
I am not representing ETSI or ACAB'c but if there are concerns with this
requirement we can solve this issue using the language proposed by Wayne
"Covers a period of at least 60 days". I would use "Covers a period of
operations of at least 60 days".
* Covers a period that ends within the past 15 months
This may also be resting on the BR definition of Audit Period. I can
see similar ambiguities arising with respect to ETSI and that its
certification decisions last two years, not one, thus it might cause a
CA to believe that they have up to three years from first completing
their audit (that is, if the letter is issued at T=2 years, covering
T=0 to T=2, and is valid to T=4 years, then the CA may believe it's
covered until T=5 years and 3 months)
There's also the potential of surveillance audits conducted over
specific issues being resolved, without being a full recertification
(e.g. if the CAB classified it as a minor non-conformity)
"With no more than 27 months having elapsed since the beginning of the
reported-on period and no more than 15 months since the end of the
reported-on period"
It's a mouthful, but perhaps there's a more concise way to capture
that unambiguously.
AFAIK, Microsoft still requires annual full audits even for non-SSL
certificate issuance. In any case, I prefer a mouthful than an ambiguous
requirement.
Dimitris.
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public
_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public