Commonwealth of Pennsylvania JNET. Certificate Practice Statement

Size: px
Start display at page:

Download "Commonwealth of Pennsylvania JNET. Certificate Practice Statement"

Transcription

1 JNET Phone: Technology Park Harrisburg State Hospital Grounds Fax: Harrisburg, PA jnet@state.pa.us Commonwealth of Pennsylvania JNET Certificate Practice Statement

2 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Table of Contents Table of Contents...1 Revision History Overview Document Name and Identification PKI Participants Certificate Authorities Registration Authorities End Entities...14 a) Users...14 b) Operators...14 c) Applications / Servers Certificate Usage Policy Administration Specification administration organization Contact Person Person determining CPS suitability for the policy Definitions and Acronyms Acronyms Definitions Obligations CA obligations RA obligations Subscriber obligations Relying party obligations Repository obligations...25

3 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Publication and Repository Publication of CA information Frequency of publication Access controls Naming Types of names Need for names to be meaningful and unique Rules for allowing anonymous or pseudonymous subscribers Recognition, authentication and role of trademarks Initial identity Validation Method to prove possession of private key Authentication of organization identity Authentication of individual identity Identification and Authentication for Re-key Requests Subscriber Re-key Request CA Re-key Request RA Re-key Request Identification and Authentication for Revocation Requests CA Revocation Request RA Revocation Request Subscriber Revocation Request Certificate Application Certificate Application Processing Certificate Issuance Certificate Acceptance Key Pair and Certificate Usage Certificate Renewal...31

4 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Certificate Re-Key Certificate Modification Certificate Revocation and Suspension Circumstances for revocation Who can request revocation Procedure for revocation request Revocation request grace period Circumstances for suspension Who can request suspension Procedure for suspension request Limits on suspension period CRL issuance frequency CRL checking requirements On-line revocation/status checking availability On-line revocation checking requirements Other forms of revocation advertisements available Checking requirements for other forms of revocation advertisements Certificate Status Services CRL OCSP Thumbprint match / JNET directory End of Subscription Key Escrow and Recovery Security Audit Procedures Types of event recorded Frequency of processing log Retention period for audit log...36

5 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Protection of audit log Audit log backup procedures Audit collection system (internal vs. external) Notification to event-causing subject Vulnerability assessments Viewing Audit Logs Physical Security Controls Site location and construction Physical access Power and air conditioning Water exposures Fire prevention and protection Media storage Waste disposal Off-site backup Procedural Controls Trusted roles Number of persons required per task Identification and authentication for each role Personnel Security Controls Background, qualifications, experience, and clearance requirements Background check procedures Training requirements Retraining frequency and requirements Job rotation frequency and sequence Sanctions for unauthorized actions Contracting personnel requirements...40

6 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Documentation supplied to personnel Need for separation of privileges Audit Logging Procedures Records Archival Types of event recorded Retention period for archive Protection of archive Archive backup procedures Requirements for time-stamping of records Archive collection system (internal or external) Procedures to obtain and verify archive information Viewing archived records (1.0) Key changeover Compromise and Disaster Recovery Incident and Compromise Reporting and Handling Procedures Recovery Procedures for Computing Resources, Software, and/or Data corruption Recovery Procedures for Entity Key compromise Business Continuity and Disaster Recovery CA Termination Key Pair Generation and Installation Key pair generation and Installation Private key delivery to entity Public key delivery to certificate issuer CA public key delivery to users Key sizes Public key parameters generation Key usage purposes (as per X.509 v3 key usage field)...45

7 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Private Key Protection and Cryptographic Module Engineering Controls Standards for cryptographic module Private key (2 out of 3) multi-person control Encryption Private key escrow Private key backup Private key archival Private key entry into cryptographic module Private key storage Method of activating private key Method of deactivating private key Method of destroying private key Crypto Module Capabilities Other Aspects of Key Pair Management Public key archival Usage periods for the public and private keys Activation Data Activation data generation and installation Activation data protection Computer Security Controls Specific computer security technical requirements Computer security rating Life Cycle Technical Controls System development controls Security management controls Life cycle security ratings Network Security Controls Time-stamping...48

8 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Certificate Profile Version number(s) Certificate extensions Algorithm object identifiers Name forms Name constraints Certificate policy Object Identifier Usage of Policy Constraints extension Policy qualifiers syntax and semantics Processing semantics for the critical certificate policy extension CRL Profile Version number(s) CRL and CRL entry extensions OCSP Profile Specification change procedures Publication and notification policies CPS approval procedures Fees Certificate issuance or renewal fees Certificate access fees Revocation or status information access fees Fees for other services such as policy information Refund policy Financial responsibility Indemnification by relying parties Fiduciary relationships Administrative processes...52

9 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Confidentiality of Business Information Types of information to be kept confidential Types of information not considered confidential Disclosure of certificate revocation/suspension information Release to law enforcement officials Release as part of civil discovery Disclosure upon owner's request Other information release circumstances Privacy of Personal Information Intellectual Property Rights Representations and Warranties Disclaimers of Warranties Limitations of Liability CA liability RA liability Subscriber liability Indemnities Term and Termination Individual Notices and Communications with Participants Amendments Dispute Resolution Procedures Governing Law Compliance with Applicable Law Miscellaneous Provisions Other Provisions...56

10 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES -

11 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Revision History Version Date Description Author 1.0 Initial Version Mahesh Rengaswamy 2.0 April 23, July 20,2004 Updated to conform with IETF RFC 3647; Updated for new CA implementation; Updated to conform to VeriSign CPS v2.2 Updated to Include SSL (server certificate) practices Darrell Candis Darrell Candis

12 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - 1. Introduction 1.1 Overview JNET is a common secure platform for sharing criminal justice information. Former Governor Tom Ridge of the Commonwealth of Pennsylvania established the JNET Mission as stated below: To enhance public safety through the integration of criminal justice information throughout the Commonwealth of Pennsylvania by adopting business practices which promote cost effectiveness, information sharing and timely and appropriate access to information while recognizing the independence of each agency. The mission statement identified the significance of information sharing and stresses the access to information authorized by an individual s job function. Numerous technology options are present to achieve this goal. Public Key Infrastructure (PKI) refers to the set of security services and processes that enable the use of public key cryptography, X.509 digital certificates and digital signatures. PKI as a business practice addresses the processes of authentication, authorization, data integrity and non-repudiation, each of which speaks directly to the mission statement. JNET comprises 16 Commonwealth agencies and numerous counties, federal and local government agencies that participate in information sharing by making it available to a community of criminal justice workers who use this information as part of their daily job functions. It is critical for this sensitive information to be available to the criminal justice community in a timely and secure manner. JNET users authenticate to the myriad services and systems made available via a common yet secure web infrastructure. In the JNET security framework, a user must present a digital certificate (which identifies the user in much the same way that a drivers license identifies an individual) in order to authenticate to a JNET web server and gain access to JNET resources. Through use of public key technology provided by the PKI, all data transmitted between the browser client and the servers are encrypted, ensuring data confidentiality. Public key technology and digital signatures are also used to digitally sign messages (ensuring non-repudiation) and enable secure transmission of messages (thus providing for data integrity). JNET utilizes the VeriSign Trust Network (VTN) Managed Public Key Infrastructure (MPKI) service for its digital certificate services. Since VeriSign is the manager of the JNET Root CA, VeriSign's own CP and CPS directly affect JNET and its ability to ensure a trust model with VeriSign. Throughout this CPS, the VeriSign CP and CPS will be referenced as well as included as an attachment to this document. It is important to note that JNET uses VeriSign class 3 digital certificates. References to class 1 and 2 certificates in the VeriSign CP and CPS are not applicable. The current version of the VeriSign CPS as of this writing is version 2.2. The VeriSign CPS is still based on the

13 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - obsolete IETF RFC Therefore, there are significant format differences between the JNET CPS and the VeriSign CPS. This Certification Practice Statement (CPS) describes the JNET Certification Authority (CA) and the actual procedures it follows in creating and managing digital certificates under the JNET Certificate Policy. This CPS shall apply to all certificates issued in support of applications, , and news under the Commonwealth of Pennsylvania Justice Network (JNET). Version 1.0 of this CPS has been effective since December 31, 1999 and has since been updated to conform with the Internet Engineering Task Force (IETF) Public Key Infrastructure X.509 (IETF PKIX) RFC 3647, Certificate Policy and Certification Practice Statement Framework, November 2003, which supersedes the obsolete RFC Document Name and Identification The JNET Certificate Policy does not yet posses an OID (Object Identifier) that has been registered with the National Institute of Standards and Technology (NIST). An effort is currently underway to address these issues and this section of the CP will be updated accordingly. 1.3 PKI Participants Certificates issued under JNET will be used for identification and authentication to the JNET applications, web servers, mail servers, and VPN servers. These certificates will also be used to secure communications and transactions (using Secure Sockets Layer (SSL)) between the client and server as well as between the servers, support secure e- mail (using S/MIME), and digitally sign messages. The following sections introduce the JNET CA and roles involved in issuing certificates and managing the certificate life cycle process Certificate Authorities The JNET Certification Authority (CA) will generate, sign, and issue digital certificates to support the JNET transactions described above. The JNET Office will serve as the JNET CA Controller/Administrator and as such is responsible for the management, day-to-day operations, and distribution of the JNET CA responsibilities. In this role, the JNET Office will oversee the issuance and revocation of all JNET certificates, the operation of equipment used in managing certificates, the activities of the JNET Registrars, and the collection and maintenance of records. Specifically, the JNET CA Controller/Administrator shall ensure that the following functions are performed in accordance with the stipulations of this policy: o Certificate generation and revocation Certificates will be generated and revoked in accordance with the VeriSign CP and CPS. The VeriSign KMS manual explains the technical process used to perform this operation.

14 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - o Posting certificates and certificate revocation lists (CRLs) to the JNET directory The JNET PKI Design Document details the process by which certificates and CRLs are written to the JNET directory o Performance of daily and/or weekly backups These procedures are governed by the Standard Operating Procedures of the JNET Operations team. o Administrative functions such as compromise reporting and system and records maintenance The VeriSign KMS manual contains procedures on performing these functions. o Programming and management of any hardware cryptographic modules This work is to be performed by VeriSign. Note that oversight responsibilities should not be confused with control over all of the above functions since separation of duties is required for the trustworthy operation of the JNET CA. Trained and vetted personnel should perform actual operational duties. During system audits and assessments, the CA Controller/Administrator shall be available to external auditors to facilitate their review Registration Authorities The JNET Registrar acts as the Registration Authority and is responsible for the registration/enrollment of users to JNET. The JNET Office acts as the Registration Authority for SSL and IPSec certificate requests. In this role, the Registrar will: o Inspect the information in the JNET User Access Request Form and verify that the requested access level is consistent with the responsibilities of the user, The JNET Registration Policies and Procedures document contains specific information regarding all registrar roles and responsibilities. o Ensure that any collateral authorizations (e.g., CLEAN certification) needed to grant particular access levels to users are available, The JNET Registration Policies and Procedures document contains specific information regarding all registrar roles and responsibilities. o Create and maintain user entries in the JNET Directory, The JNET Registrar Gateway Instructions document contains all information regarding the performance of this function. o Generate and distribute the authentication code (via a secure, out-of-band method) to the end entities so that they may enroll and retrieve the certificates, and

15 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - The JNET Registrar Gateway Instructions document contains all information regarding the performance of this function. o o Maintain records of the registration/enrollment actions and provide the appropriate records and/or reports to the JNET Office upon request for archive and audit purposes. (Placeholder for SSL / IPSec) The Registrar is also responsible for validating and coordinating the certificate revocation and key recovery requests with the JNET Office. The JNET Help Desk performs this function, and may be reached at Registrars are assigned to specific agencies and/or counties according to user population size and resource availability. Registrar responsibilities may be delegated to one or more individuals per agency or county. The business requirements of a particular agency or county determine the number of registrars assigned End Entities a) Users JNET users are individuals affiliated with Commonwealth of Pennsylvania Agencies, Counties and municipalities and Federal bodies recognized and approved by the JNET Steering Committee as needing access to criminal justice information through JNET and such information is required as part of the individuals day-to-day business function. These users are issued digital certificates by JNET and can access JNET resources by presenting this digital credential. Users are required to follow the requirements as outlined in the JNET User Access Request Form. b) Operators Operators are responsible for the day-to-day operations and maintenance of the servers and infrastructure needed to support the JNET CA. Operators include contractor staff supporting the JNET hub as well as agency staff or contractors supporting JNET servers located at the various agencies. The CP requires the individuals in these roles to operate the JNET CA in a lawful and responsible manner to support the JNET operations and mechanisms for safeguarding the information and system resources. c) Applications / Servers Applications and servers operating within JNET shall also hold certificates for the purpose of authenticating to user clients or other servers and applications. The individuals operating these systems shall also follow the CP and ensure their systems operate in a consistent manner. 1.4 Certificate Usage Certificates issued under this policy and the associated public/private key pairs shall only be used for their intended purpose within JNET. This certificate policy applies to all

16 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - certificates issued to JNET end entities. JNET end entities include users, operators, and applications/servers using or supporting JNET. JNET issued certificates may only be used for the following purposes: Authentication to JNET authorized and approved web sites o Subscriber may either install his/her digital certificate in his/her JNET supported browser or JNET approved roaming certificate solution. Authentication and encryption within the JNET secure system. o The authentication/signing certificate will be used for authentication into the mail system. o The encryption certificate will be used to encrypt all messages. Authentication and access to the JNET VPN Service. o The authentication/signing certificate will be used for authentication into the JNET VPN Service. Authentication and encryption between messaging servers. o The authentication/signing certificate will be used for authentication of channels between messaging servers. o The encryption certificate will be used to encrypt all messages. Authentication and access to approved Commonwealth of Pennsylvania computer systems o There is no current stipulation for certificate usage with Commonwealth computer systems. The CPS will be updated at a later date when such a stipulation becomes available. 1.5 Policy Administration Specification administration organization The JNET Office and the JNET Steering Committee will address issues relating to this CPS and will approve modifications and additions as they see fit Contact Person This policy was approved by the JNET Steering Committee and is maintained by the JNET Office. For issues related to this CPS, contact: JNET Office 5 Technology Park

17 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Harrisburg State Hospital Grounds Harrisburg PA Phone: Fax: jnet@state.pa.us Person determining CPS suitability for the policy The JNET Steering Committee and associated Security Subcommittee oversee the provision of this CPS and decide the applicability of the CP. 1.6 Definitions and Acronyms Acronyms Agency A term used to identify all Commonwealth agencies participating in JNET. CA Certification Authority CMA Certificate Manufacturing Authority CP Certificate Policy CPS Certificate Practice Statement CRL Certificate Revocation List DN Distinguished Name DSA Digital Signature Algorithm IETF Internet Engineering Task Force ISO International Organization for Standards ITU International Telecommunications Union LDAP Lightweight Directory Access Protocol MOA Memorandum of Agreement OCSP Online Certificate Status Protocol OID Object Identifier PKI Public Key Infrastructure PKIX Public Key Infrastructure X.509 RA Registration Authority RSA Rivest-Shamir-Adleman (encryption algorithm) SHA-1 Secure Hash Algorithm S/MIME Secure/Multipurpose Internet Mail Extension SSL Secure Sockets Layer URL Uniform Resource Locater WWW World Wide Web Definitions Access Ability to make use of any information system (IS) resource [NS4009]

18 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Access control Accreditation Activation Data Agency Agency CA Applicant Archive Attribute Authority Audit Audit Data Authentication Backup Binding Biometric Certificate Certificate Authority (CA) CA Facility Certificate Management Authority Certificate Authority Software Process of granting access to information system resources only to authorized users, programs, processes, or other systems [NS4009] Formal declaration by a Designated Approving Authority that an Information System is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk. [NS4009] Data values, other than keys, that are required to operate cryptographic modules and that need to be protected (e.g., a PIN, a passphrase, or a manually-held key share). Any department, subordinate element of a department, or independent organizational entity that is statutorily or constitutionally recognized as being part of the Commonwealth of Pennsylvania. A CA that acts on behalf of an Agency, and is under the operational control of an Agency. The subscriber is sometimes also called an "applicant" after applying to a certification authority for a certificate, but before the certificate issuance procedure is completed. [ABA footnote 32] Long-term, physically separate storage. An entity, recognized by the FPKIPA or comparable Agency body as having the authority to verify the association of attributes to an identity. Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. [NS4009] Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event. [NS4009 audit trail ] The process of establishing that individuals, organizations, or things are who or what they claim to be. In the context of a PKI, authentication can be the process of establishing that an individual or organization applying for or seeking access to something under a certain name is, in fact, the proper individual or organization. This corresponds to the second process involved with identification, as shown in the definition of "identification" below. Authentication can also refer to a security service that provides assurances that individuals, organizations, or things are who or what they claim to be or that a message or other data originated from a specific individual, organization, or device. Thus, it is said that a digital signature of a message authenticates the message's sender. Copy of files and programs made to facilitate recovery if necessary. [NS4009] Process of associating two related elements of information. [NS4009] A physical or behavioral characteristic of a human being. A digital representation of information which at least (1) identifies the certification authority issuing it, (2) names or identifies its subscriber, (3) contains the subscriber's public key, (4) identifies its operational period, and (5) is digitally signed by the certification authority issuing it. [ABADSG]. As used in this Policy, the term "Certificate" refers to certificates that expressly reference the OID of this policy in the "Certificate Policies" field of an X.509 v.3 certificate. An authority trusted by one or more users to issue and manage X.509 Public Key Certificates and CRLs. The collection of equipment, personnel, procedures and structures that are used by a Certification Authority to perform certificate issuance and revocation A Certification Authority or a Registration Authority Key Management and cryptographic software used to manage certificates issued to subscribers.

19 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Certificate Policy (CP) Certificate-Related Information Certificate Revocation List (CRL) Certification Practice Statement (CPS) Certification Path Client (application) Common Criteria Component Private Key Compromise Computer Security Objects Registry (CSOR) Confidentiality Cross-Certificate Cryptographic Module Cryptoperiod Data Integrity Digital Signature Duration E-commerce Encrypted Network Encryption Certificate End Entity Firewall A Certificate Policy is a specialized form of administrative policy tuned to electronic transactions performed during certificate management. A CP addresses all aspects associated with the generation, production, distribution, accounting, compromise recovery and administration of digital certificates. Indirectly, a CP can also govern the transactions conducted using a communications system protected by a certificate based security system. By controlling critical certificate extensions, such policies and associated enforcement technology can support provision of the security services required by particular applications. Information, such as a subscriber s postal address, that is not included in a certificate. May be used by a CA managing certificates. A list maintained by a CA of its issued certificates that were revoked prior to the stated expiration dates. A statement of the practices that a CA employs in issuing, suspending, revoking and renewing certificates and providing access to them, in accordance with specific requirements (i.e., requirements specified in this CP, or requirements specified in a contract for services). An ordered sequence of certificates that, together with the public key of the initial object in the path, can be processed to obtain that of the final object in the path. A system entity, usually a computer process acting on behalf of a human user, that makes use of a service provided by a server. A set of internationally accepted semantic tools and constructs for describing the security needs of customers and the security attributes of products. Private Key associated with a function of the certificate issuing equipment, as opposed to being associated with an operator or administrator Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object many have occurred. [NS4009] Computer Security Objects Registry operated by the National Institute of Standards and Technology Assurance that information is not disclosed to unauthorized entities or processes [NS4009] A certificate used to establish a trust relationship between two CAs The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module [FIPS1401]. Time span during which each key setting remains in effect [NS4009] Assurance that the data are unchanged from creation to reception The result of a transformation of a message by means of a cryptographic system using keys such that a Replying Party can determine: (1) whether the transformation was created using the private key that corresponds to the public key in the signer s digital certificate; and (2) whether the message has been altered since the transformation was made. A field within a certificate, which is composed of two subfields; date of issue and date of next issue. The use of network technology (especially the Internet) to buy or sell goods and services. A network that is protected from outside access by NSA approved high-grade (Type I) cryptography. Examples are SIPRNET and TOP SECRET networks. A certificate containing a public key that is used to encrypt electronic messages, files, documents, or data transmissions, or to establish or exchange a session key for these same purposes. Relying Parties and Subscribers Gateway that limits access between networks in accordance with local security policy [NS4009]

20 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - High Assurance Guard (HAG) Identification Information System Security Officer (ISSO) Inside threat Integrity Intellectual Property Intermediate CA Key Escrow Key Exchange Key Generation Material Key Pair Local Registration Authority (LRA) Memorandum of Agreement (MOA) Mission Support Information Mutual Authentication Naming Authority An enclave boundary protection device that controls access between a local area network that an enterprise system has a requirement to protect, and an external network that is outside the control of the enterprise system, with a high degree of assurance. The process of establishing the identity of an individual or organization, i.e., to show that an individual or organization is a specific individual or organization. In the context of a PKI, identification refers to two processes: (1) Establishing that a given name of an individual or organization corresponds to a real-world identity of an individual or organization, and (2) Establishing that an individual or organization applying for or seeking access to something under that name is, in fact, the named individual or organization. A person seeking identification may be a certificate applicant, an applicant for employment in a trusted position within a PKI participant, or a person seeking access to a network or software application, such as a CA administrator seeking access to CA systems. Issuing certification authority (issuing CA) - In the context of a particular certificate, the issuing CA is the CA that issued the certificate (see also Subject certification authority). Person responsible to the designated approving authority for ensuring the security of an information system throughout its life cycle, from design through disposal. [NS4009] An entity with authorized access that has the potential to harm an IS through destruction, disclosure, modification of data, and/or denial of service. Protection against unauthorized modification or destruction of information. [NS4009]. A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination. Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation. A CA that is subordinate to another CA, and has a CA subordinate to itself. A deposit of the private key of a subscriber and other pertinent information pursuant to an escrow agreement or similar contract binding upon the subscriber, the terms of which require one or more agents to hold the subscriber's private key for the benefit of the subscriber, an employer, or other party, upon provisions set forth in the agreement. [adapted from ABADSG, "Commercial key escrow service] The process of exchanging public keys in order to establish secure communication. Random numbers, pseudo-random numbers, and cryptographic parameters used in generating cryptographic keys Two mathematically related keys having the properties that (1) one key can be used to encrypt a message that can only be decrypted using the other key, and (ii) even knowing one key, it is computationally infeasible to discover the other key. A Registration Authority with responsibility for a local community. Agreement between the JNET CA and an Agency allowing interoperability between the JNET and the Agency. Information that is important to the support of deployed and contingency forces. Occurs when parties at both ends of a communication activity authenticate each other (see authentication). An organizational entity responsible for assigning distinguished names (DNs) and for assuring that each DN is meaningful and unique within its domain.

21 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - National Security System Non-repudiation Object Identifier (OID) Out-of-Band Outside Threat Physically Isolated Network Participant PKI Disclosure Statement (PDS) PKI Sponsor Policy Management Authority (PMA) Privacy Private Key Public Key Public Key Infrastructure (PKI) PKI Disclosure Statement (PDS) Registration Authority (RA) Re-key (a certificate) Any telecommunications or information system operated by the United States Government, the function, operation, or use of which involves intelligence activities; involves crypto logic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or is critical to the direct fulfillment of military or intelligence missions, but does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications). [ITMRA] Assurance that the sender is provided with proof of delivery and that the recipient is provided with proof of the sender's identity so that neither can later deny having processed the data. [NS4009] A specialized formatted number that is registered with an internationally recognized standards organization. The unique alphanumeric/numeric identifier registered under the ISO registration standard to reference a specific object or object class. In the federal government PKI they are used to uniquely identify each of the four policies and cryptographic algorithms supported. Communication between parties utilizing a means or method that differs from the current method of communication (e.g., one party uses U.S. Postal mail to communicate with another party where current communication is occurring online). An unauthorized entity from outside the domain perimeter that has the potential to harm an Information System through destruction, disclosure, modification of data, and/or denial of service. A network that is not connected to entities or systems outside a physically controlled space. An individual or organization that plays a role within a given PKI as a subscriber, relying party, CA, RA, certificate manufacturing authority, repository service provider, or similar entity. An instrument that supplements a CP or CPS by disclosing critical information about the policies and practices of a CA/PKI. A PDS is a vehicle for disclosing and emphasizing information normally covered in detail by associated CP and/or CPS documents. Consequently, a PDS is not intended to replace a CP or CPS. Fills the role of a Subscriber for non-human system components that are named as public key certificate subjects, and is responsible for meeting the obligations of Subscribers as defined throughout this CP. Body established to oversee the creation and update of Certificate Policies, review Certification Practice Statements, review the results of CA audits for policy compliance, evaluate non-domain policies for acceptance within the domain, and generally oversee and manage the PKI certificate policies. Restricting access to subscriber or relying party information in accordance with Federal law and agency policy. (1) The signing key pair used to create a digital signature. (2) The key of an encryption key pair that is used to decrypt confidential information. In both cases, this key must be kept secret. (1) The signing key pair used to validate a digital signature. (2) The key of an encryption key pair that is used to encrypt confidential information. In both cases, this key is made publicly available normally in the form of a digital certificate. A set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates. An instrument that supplements a CP or CPS by disclosing critical information about the policies and practices of a CA/PKI. A PDS is a vehicle for disclosing and emphasizing information normally covered in detail by associated CP and/or CPS documents. Consequently, a PDS is not intended to replace a CP or CPS. An entity that is responsible for one or more of the following functions: the identification and authentication of certificate applicants, the approval or rejection of certificate applications, initiating certificate revocations or suspensions under certain circumstances, processing subscriber requests to revoke or suspend their certificates, and approving or rejecting requests by subscribers to renew or re-key their certificates. RAs, however, do not sign or issue certificates (i.e., an RA is delegated certain tasks on behalf of a CA). [Note: The term Local Registration Authority (LRA) is sometimes used in other documents for the same concept.] To change the value of a cryptographic key that is being used in a cryptographic system application.

22 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Relying Party Relying Party Agreement (RPA) Renew (a certificate) Repository Responsible Individual Revoke (a certificate) Risk Risk Tolerance Root CA Secret Key Server Signature Certificate Subordinate CA Subscriber Superior CA System Equipment Configuration System High Technical nonrepudiation Threat Trust List Trusted Agent Trusted Certificate Trusted Timestamp A recipient of a certificate who acts in reliance on that certificate and/or any digital signatures verified using that certificate. In this document, the terms "certificate user" and "relying party" are used interchangeably. An agreement between a certification authority and relying party that typically establishes the rights and responsibilities between those parties regarding the verification of digital signatures or other uses of certificates. The act or process of extending the validity of the data binding asserted by a public key certificate by issuing a new certificate. A database containing information and data relating to certificates as specified in this CP; may also be referred to as a directory. A trustworthy person designated by a sponsoring organization to authenticate individual applicants seeking certificates on the basis of their affiliation with the sponsor. To prematurely end the operational period of a certificate effective at a specific date and time. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. The level of risk an entity is willing to assume in order to achieve a potential desired result. In a hierarchical PKI, the CA whose public key serves as the most trusted datum (i.e., the beginning of trust paths) for a security domain. A shared secret used in symmetric cryptography, wherein users are authenticated based on a password, Personal Identification Number (PIN), or other information shared between the user and the remote host or server. A single key is shared between the two parties: the sender, to encrypt a transmission, and the recipient, to decrypt the transmission, with the shared key being generated with an algorithm agreed to beforehand by the transacting parties. A system entity that provides a service in response to requests from clients. A public key certificate that contains a public key intended for verifying the digital signatures rather than encrypting data or performing any other cryptographic functions. In a hierarchical PKI, a CA whose certificate signature key is certified by another CA, and who activities are constrained by that other CA (See Superior CA). A Subscriber is an entity that (1) is the subject named or identified in a certificate issued to that entity; (2) holds a private key that corresponds to the public key listed in the certificate, and (3) does not itself issue certificates to another party. This includes, but is not limited to, an individual or network device. In a hierarchical PKI, a CA who has certified the certificate signature key of another CA, and who constrains the activities of that CA (See subordinate CA). A comprehensive accounting of all systems hardware and software types and settings. The highest security level supported by an IS. [NS4009] The contribution public key mechanisms to the provision of technical evidence supporting a non-repudiation security service. Any circumstance or event with the potential to cause harm to an IS in the form of destruction, disclosure, adverse modification of data, and/or denial of service. [NS4009] Collection of trusted certificates used by Relying Parties to authenticate other certificates. Entity authorized to act as a representative of an Agency in confirming Subscriber identification during the registration process. Trusted agents do not have automated interfaces with Certification Authorities. A certificate that is trusted by the Relying Party on the basis of secure and authenticated delivery. The public keys included in trusted certificates are used to start certification paths. Also knows an trust anchors. A digitally signed assertion by a trusted authority that a specific digital object existed at a particular time.

23 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES - Trustworthy System Two-person Control Update (a certificate) Validation Zeroize Computer hardware, software and procedures that: (1) are reasonably secure from intrusion and misuse; (2) provide a reasonable level of availability, reliability, and correct operation; (3) are reasonably suited to perform their internal functions; and (4) adhere to generally accepted security procedures. Continuous surveillance and control of positive control material at all times by minimum of two authorized individuals, each capable of detecting incorrect and/or unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements. [NS4009] The act or process by which data items bound in an existing public key certificate, especially authorizations granted to the subject, are changed by issuing a new certificate. The process of identification of certificate applicants. "Validation" is a subset of "identification" and refers to identification in the context of establishing the identity of certificate applicants. A method of erasing electronically stored data by altering the contents of the data storage so as to prevent the recovery of the data. [FIPS140-1]

24 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES Publication and Repository Responsibilities 2.1 Obligations CA obligations The JNET CA will: Issue, post, update, and revoke certificates; Procedures for performing these functions are included in the JNET PKI Design Document, the VeriSign KMS manual and the VeriSign CPS. Implement this CPS and update as appropriate to ensure that it reflects actual CA practices; This CPS will be implemented upon its completion. Monitor and maintain conformance with the JNET Certificate Policy; and Yearly review to and update to be carried out by the JNET Office in conjunction and approval of the JNET Steering Committee. Maintain and enforce access controls and separation of privileges on all JNET CA resources. The JNET Office is charged with ensuring that administrative certificates are kept separate and assigned to two, named JNET management staff, who must be Commonwealth of Pennsylvania employees RA obligations JNET does not currently have a registration authority; a registrar performs this function. The JNET Registrar is responsible for registering users. In addition to registering users, the JNET registrar is responsible for: Completing and signing the JNET Registrar Agreement; Forwarding the JNET Registrar Agreement to the JNET Office; Completing Registrar training;

25 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES -- Maintaining JNET Sponsor Agreements so you can validate the sponsor s signature(s) and contact him/her if there are any registration issues; Acting as the Agency/County point of contact with respect to user registration issues; Assisting users with scheduling appropriate JNET Training; Reporting violations of JNET Policy and Procedures to the Agency/County JTAC, MTAC, or the JNET Office; Managing the digital certificate renewal process in the Agency/County; Initiating key recovery; Deleting a user from the JNET directory in the case of certificate revocation, or when employees retire, transfer out, or separate from the organization; Acting as the Agency/County JNET records keeping repository by; Maintaining a JNET user file that contains the user s JNET Access Request Forms and associated correspondence pertaining to JNET access, Maintaining these user records for three years after the user leaves the organization or relinquishes access to JNET, and Reviewing records on a yearly basis and destroying inactive records that are three years old or older; Forwarding Criminal History Access Request(s) to the JTAC; and Notifying the JNET Office of any circumstance that might affect the user s enrollment status (Arrests, Retirements, Transfers, Separations, etc.) Subscriber obligations JNET users and operators will be responsible for the appropriate handling and safeguarding of their private keys, use of the JNET environment, use and safeguarding of information obtained from JNET resources, and the reliability of the information they provide or communicate through JNET. End entities are obligated to:

26 COMMONWEALTH OF PENNSYLVANIA JNET CERTIFICATE PRACTICE STATEMENT: USER CERTIFICATES -- Accurately represent themselves in all communications with the JNET CA and Registrar; Protect their private keys at all times, in accordance with JNET Certificate Policy, the JNET Security Policy, local procedures, and as stipulated in the certificate acceptance agreements; Notify, in a timely manner, the JNET CA of suspicion that their private keys have been compromised or lost. Such notification will be made directly, or indirectly through mechanisms consistent with this CPS; Abide by all the terms, conditions, and restrictions levied upon the use of their private keys and certificates. Individuals or entities that fail to fulfill their obligations as set forth in this CPS and the JNET Certificate Policy will have their access privileges revoked and may be subject to disciplinary action, termination, or legal action Relying party obligations Parties who rely upon the certificates issued by the JNET CA are obligated to: Use the certificate for lawful work-related activities; and Check each certificate for validity prior to reliance using procedures described in the X.509 standard. The JNET CA will report any unlawful or unauthorized actions it detects related to the use of certificates issued by the JNET CA. Individuals or entities that fail to check the validity of JNET certificates prior to each reliance will have no claim against JNET in the event of a dispute, and may jeopardize any claims against the subject of the certificate Repository obligations The JNET CA will use and maintain a directory (subsequently referred to as the JNET Directory) for the propagation of certificates, CRLs, and other access control information. The Directory will be accessible to all JNET users using the lightweight directory access protocol (LDAP), but will implement enough controls to prevent unauthorized modifications and interception of communications. The Registrars are responsible for the creation and maintenance of user entries in the JNET Directory. These entries will also contain location, identification, access privileges, and group membership information used by servers and other JNET relying parties. The creation of a directory entry with all the required identification and authentication information will be a prerequisite for issuing certificates to new end entities. Revoked certificates will be removed from the Directory so that an application that fails to check the CRL will be unable to grant access based on a revoked certificate. Revoked certificates are still escrowed by VeriSign for recovery purposes.

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY November 2015 Version 4.0 Copyright 2006-2015, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents

More information

Certification Practice Statement

Certification Practice Statement SWIFT SWIFT Qualified Certificates Certification Practice Statement This document applies to SWIFT Qualified Certificates issued by SWIFT. This document is effective from 1 July 2016. 17 June 2016 SWIFT

More information

TeliaSonera Gateway Certificate Policy and Certification Practice Statement

TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway Certificate Policy and Certification Practice Statement v. 1.2 TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway CA v1 OID 1.3.6.1.4.1.271.2.3.1.1.16

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

OpenADR Alliance Certificate Policy. OpenADR-CP-I

OpenADR Alliance Certificate Policy. OpenADR-CP-I Notice This document is a cooperative effort undertaken at the direction of the OpenADR Alliance and NetworkFX, Inc. for the benefit of the OpenADR Alliance. Neither party is responsible for any liability

More information

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Version 1.17 April 7, 2017 1 03/08/2016 Signature Page Jeffrey C. Brown Digitally signed by Jeffrey C. Brown DN: dc=com, dc=raytheon,

More information

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016 National Identity Exchange Federation Trustmark Signing Certificate Policy Version 1.0 Published October 3, 2014 Revised March 30, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents

More information

United States Department of Defense External Certification Authority X.509 Certificate Policy

United States Department of Defense External Certification Authority X.509 Certificate Policy United States Department of Defense External Certification Authority X.509 Certificate Policy Version 4.3 4 January 2012 THIS PAGE INTENTIONALLY LEFT BLANK ii TABLE OF CONTENTS 1 Introduction...1 1.1 Overview...1

More information

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA)

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA) X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) September 10, 2002 Signature Page Chair, Federal Public Key Infrastructure Policy Authority DATE Table of Contents 1. INTRODUCTION...

More information

Afilias DNSSEC Practice Statement (DPS) Version

Afilias DNSSEC Practice Statement (DPS) Version Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.

More information

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance)

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) Version 0.7 Mar-17 Notice to all parties seeking to rely Reliance on a Certificate

More information

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP)

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Version 8.12 May 2017 Copyright, Lockheed Martin, 2017 Questions or comments regarding the Lockheed Martin epki Certification

More information

Unisys Corporation April 28, 2017

Unisys Corporation April 28, 2017 Unisys Internal PKI v1 14.docx Unisys Internal PKI Unisys Corporation April 28, 2017 Page 1 of 79 Content: Name: Version / Last Revision: Classification: Unisys Internal PKI v1 14.docx This document contains

More information

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Version 1.9 March 6, 2017 Copyright, Northrop Grumman, 2006 1-1 Document Change History NG PKI Certificate Policy VER DATE INFORMATION

More information

QUICKSIGN Registration Policy

QUICKSIGN Registration Policy QUICKSIGN Registration Policy Amendment to DOCUSIGN FRANCE s Certificate Policy for using the QUICKSIGN platform as a registration service to identify Subscribers September 27, 2016 QUICKSIGN_Registration_Policy_V1.0

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2 Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone Version 0.2 1 Table of contents 1 INTRODUCTION...6 1.1 Overview... 6 1.2 Document Name and Identification... 6 1.3 Community and Applicability...

More information

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev CERN European Organization for Nuclear Research Category: CP/CPS Status: published Document: CERN Certification Authority CP- CPS.docxpdf Editors: Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev Date

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

thawte Certification Practice Statement Version 3.4

thawte Certification Practice Statement Version 3.4 thawte Certification Practice Statement Version 3.4 Effective Date: July, 2007 thawte Certification Practice Statement 2006 thawte, Inc. All rights reserved. Printed in the United States of America. Revision

More information

Symantec Trust Network (STN) Certificate Policy

Symantec Trust Network (STN) Certificate Policy Symantec Trust Network (STN) Certificate Policy Version 2.8.24 September 8, 2017 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 www.symantec.com - i - - ii - Symantec

More information

R. Sabett Cooley Godward LLP C. Merrill McCarter & English, LLP S. Wu Infoliance, Inc. November 2003

R. Sabett Cooley Godward LLP C. Merrill McCarter & English, LLP S. Wu Infoliance, Inc. November 2003 Network Working Group Request for Comments: 3647 Obsoletes: 2527 Category: Informational S. Chokhani Orion Security Solutions, Inc. W. Ford VeriSign, Inc. R. Sabett Cooley Godward LLP C. Merrill McCarter

More information

X.509 Certificate Policy For The Virginia Polytechnic Institute and State University Certification Authorities

X.509 Certificate Policy For The Virginia Polytechnic Institute and State University Certification Authorities X.509 Certificate Policy For The Virginia Polytechnic Institute and State University Certification Authorities May 13, 2004 Amended March 16, 2011 OBJECT IDENTIFIER 1.3.6.1.4.1.6760.5.2.1.1.1 Release 1.0

More information

AlphaSSL Certification Practice Statement

AlphaSSL Certification Practice Statement AlphaSSL Certification Practice Statement Date: December 16th 2008 Version: v1.2 Table of Contents DOCUMENT HISTORY... 3 ACKNOWLEDGMENTS... 3 1.0 INTRODUCTION... 4 1.1 OVERVIEW... 4 1.2 ALPHASSL CERTIFICATE

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

National Identity Exchange Federation. Certificate Policy. Version 1.1

National Identity Exchange Federation. Certificate Policy. Version 1.1 National Identity Exchange Federation Certificate Policy Version 1.1 September 9, 2014 Table of Contents 1 Introduction...4 1.1 Overview... 6 1.1.1 Certificate Policy...6 1.1.2 References...6 1.2 Document

More information

Symantec Gatekeeper General Category Certificate Policy

Symantec Gatekeeper General Category Certificate Policy Symantec Gatekeeper General Category Certificate Policy General Category Business and Individual Certificates and General Supplementary Device Certificates Version 2.0 25 September 2013 Symantec Gatekeeper

More information

CHEVRON U.S.A. INC. PUBLIC KEY INFRASTRUCTURE Root Certificate Authority Set of Provisions Version 2

CHEVRON U.S.A. INC. PUBLIC KEY INFRASTRUCTURE Root Certificate Authority Set of Provisions Version 2 CHEVRON U.S.A. INC. PUBLIC KEY INFRASTRUCTURE Root Certificate Authority Set of Provisions Version 2 Approved by the Chevron Policy Management Authority on December 20, 2012 LEGAL DISCLAIMER No portion

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Certificate Policy (ETSI EN ) Version 1.1

Certificate Policy (ETSI EN ) Version 1.1 Certificate Policy (ETSI EN 319 411-2) Version 1.1 IDnow GmbH Auenstr. 100 80469 Munich 09.06.2017 IDnow Certificate Policy (ETSI EN 319 411-2) Version 1.1 Date 09.06.2017 Author Armin Bauer, IDnow GmbH

More information

Dark Matter L.L.C. DarkMatter Certification Authority

Dark Matter L.L.C. DarkMatter Certification Authority Dark Matter L.L.C. DarkMatter Certification Authority Certification Practice Statement V1.6 July 2018 1 Signature Page Chair, DarkMatter PKI Policy Authority Date 2 Document History Document Version Document

More information

Volvo Group Certificate Practice Statement

Volvo Group Certificate Practice Statement Volvo Group PKI Documentation Volvo Group Certificate Practice Statement Document name: Volvo Group Certificate Policy Statement Document Owner: Volvo Group AB Corporate Process & IT Issued by: Volvo Group

More information

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited. Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:

More information

VeriSign External Certification Authority Certification Practice Statement

VeriSign External Certification Authority Certification Practice Statement VeriSign External Certification Authority Certification Practice Statement Version 1.2 (Portions of this document have been redacted in accordance with the ECA Certificate Policy) 21 December 2007 1 VeriSign

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

VeriSign Trust Network European Directive Supplemental Policies

VeriSign Trust Network European Directive Supplemental Policies VeriSign Trust Network European Directive Supplemental Policies Version 1.0 Effective Date: September 19, 2001 VeriSign, Inc. 487 East Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

OISTE-WISeKey Global Trust Model

OISTE-WISeKey Global Trust Model OISTE-WISeKey Global Trust Model Certification Practices Statement (CPS) Date: 18/04/2018 Version: 2.10 Status: FINAL No. of Pages: 103 OID: 2.16.756.5.14.7.1 Classification: PUBLIC File: WKPKI.DE001 -

More information

CIRA DNSSEC PRACTICE STATEMENT

CIRA DNSSEC PRACTICE STATEMENT CIRA DNSSEC PRACTICE STATEMENT 1. Introduction This DNSSEC Practice Statement ( DPS ) is a statement of security practices and provisions made by the Canadian Internet Registration Authority (CIRA). These

More information

Smart Meters Programme Schedule 2.1

Smart Meters Programme Schedule 2.1 Smart Meters Programme Schedule 2.1 (DCC Requirements) (SMKI version) V1.2 1 Schedule 2.1 (DCC Requirements) This Schedule 2.1 (DCC Requirements) is formed of the following parts: Part A Introduction...3

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018 Certification Practice Statement certsign SSL EV CA Class 3 for SSL EV Certificates Version 1.0 Date: 31 January 2018 1 Important Notice This document is property of CERTSIGN SA Distribution and reproduction

More information

TELIA MOBILE ID CERTIFICATE

TELIA MOBILE ID CERTIFICATE Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID

More information

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA OID: 2.16.56.1.1.1.7 2.16.56.9.1.1.7 2.16.56.10.1.1.7 2.16.56.12.1.1.7 Company: Certipost Version: 3.0 Status : FINAL

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

ZETES TSP QUALIFIED CA

ZETES TSP QUALIFIED CA ZETES TSP QUALIFIED CA Certification Practice Statement for the ZETES TSP Qualified CA Publication date : 17/05/2017 Effective date : 22/05/2017 Document OID : 1.3.6.1.4.1.47718.2.1.1.2 Version : 1.2 21/04/2017

More information

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1 PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

Version July 21, Waples Mill Road. South Tower, Suite 210. Fairfax, VA Date:

Version July 21, Waples Mill Road. South Tower, Suite 210. Fairfax, VA Date: WidePoint Cyber Security Solutions (formerly Operational Research Consultants, Inc. (ORC)) Non-Federal Issuer (NFI) Certification Practices Statement Summary Version 1.3.7 July 21, 2016 11250 Waples Mill

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Digi-Sign Certification Services Limited Certification Practice Statement (OID: )

Digi-Sign Certification Services Limited Certification Practice Statement (OID: ) Digi-Sign Certification Services Limited Certification Practice Statement (OID: 1.3.6.1.4.1.8420.1.3.6) In support of Digi-Sign CA as a Recognized Certification Authority December 2015 Copyright and Patent

More information

Avira Certification Authority Policy

Avira Certification Authority Policy Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification

More information

September OID: Public Document

September OID: Public Document THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September

More information

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Krajowa Izba Rozliczeniowa S.A. CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Version 1.6 Document history Version number Status Date of issue 1.0 Document approved by

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

SONERA MOBILE ID CERTIFICATE

SONERA MOBILE ID CERTIFICATE Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS)

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) INFORMATION SECURITY POLICY ISSUE SPECIFIC POLICY VERSION: V003 2017-05-11 EFFECTIVE DATE: 2017-05-11 LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) Law Trusted Third Party

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Certification Practice Statement

Certification Practice Statement Contents 1. Outline 1 Certification Practice Statement Ver. 1.6 Dec 2013 1.1 Background & Purpose 1 1.1.1 Electronic Signature Certification System 1 1.1.2 Certification Practice Statement 1 1.1.3 Introduction

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS) Starfield Technologies, LLC Certificate Policy and Certification Practice Statement (CP/CPS) Version 3.0 January 28, 2013 i Starfield CP-CPS V3.0 Table of Contents 1 Introduction...1 1.1 Overview...1 1.2

More information

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.12 September 8, 2017

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.12 September 8, 2017 DigiCert Certificate Policy DigiCert, Inc. Version 4.12 September 8, 2017 2801 N. Thanksgiving Way Suite 500 Lehi, UT 84043 USA Tel: 1 801 877 2100 Fax: 1 801 705 0481 www.digicert.com TABLE OF CONTENTS

More information

Trust Services Practice Statement

Trust Services Practice Statement Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,

More information

Symantec Non-Federal Shared Service Provider PKI. Certification Practice Statement

Symantec Non-Federal Shared Service Provider PKI. Certification Practice Statement Symantec Non-Federal Shared Service Provider PKI Certification Practice Statement A Symantec Trust Network CA Version 2.0 September 15, 2017 (Portions of this document have been redacted.) Symantec Corporation

More information

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5 Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure Version 1.5 Chunghwa Telecom Co., Ltd. December 1, 2017 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 3 1.1.1 Certificate

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

The Information Technology (Certifying Authority) Regulations, 2001

The Information Technology (Certifying Authority) Regulations, 2001 The Information Technology (Certifying Authority) Regulations, 2001 The Information Technology (Certifying Authority) Regulations, 2001 Appendix XXXIV Notification, New Delhi, the 9th July, 2001, G.S.R.

More information

Pittsburgh Supercomputing Center MyProxy Certificate Authority Short Lived Credential Service (PSC MyProxy CA)

Pittsburgh Supercomputing Center MyProxy Certificate Authority Short Lived Credential Service (PSC MyProxy CA) Pittsburgh Supercomputing Center MyProxy Certificate Authority Short Lived Credential Service (PSC MyProxy CA) Certificate Policy and Certification Practice Statement Version 1.6 Pittsburgh Supercomputing

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Electronic Signature Policy

Electronic Signature Policy Electronic Signature Policy Definitions The following terms are used in this policy. Term Definition Electronic Signature An electronic signature is a paperless method used to authorize or approve documents

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.05 May 2, 2013

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.05 May 2, 2013 DigiCert Certificate Policy DigiCert, Inc. Version 4.05 May 2, 2013 2600 West Executive Parkway, Suite 500 Lehi, UT 84043 USA Tel: 1 801 877 2100 Fax: 1 801 705 0481 www.digicert.com TABLE OF CONTENTS

More information

WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT

WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT Version 1.1 Effective Date: 05 December 2008 WISeKey S.A. 2000-2008 WISeKey hereby grants non-exclusive permission

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of

More information

Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS)

Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) Result of C-ITS Platform Phase II Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems (C-ITS) RELEASE 1.1 JUNE 2018 Certificate Policy for Deployment and

More information