On Nov 19, 2:27 am, Eddy Nigg <[EMAIL PROTECTED]> wrote:

> On 11/19/2008 01:59 AM, kgb:
>
> Hi Kevin,
>
> > WISeKey has made some changes to its practices, since the last public
> > discussion period.
>
> I'm glad to hear that! Can you point to what specifically has been
> changed since then?
>

 Probably the most important change in stated practice, is that it is
reflected that every CA is audited at least once annually. This is the
case for all active CAs.

 > > BlackBox Subordinate CAs are restricted to issue
> > certificates for domains that are owned by the company that is
> > responsible for them, quite unlike the typical root signing done by
> > other companies.
>
> How are email certificates validated beyond that? Are they validated -
> or is it a catch-all verification for all email certificates under the
> respective domain name(s)?
>

Email certificates are also restricted to the organisation's domains.
We include a Constraint in the Issuing CA itself, preventing the same
CA software to issue certificates that don’t comply with this Domain
Restriction (web, email, User Principal Name, etc.)

The company database (such as existing HR, or IDM) of organisation,
with details of the organisation's users, including their email
addresses, is the principal source of data for certificates.

Bounce back email verification procedure proving access to the email
account is also accepted, but this is inefficient in the enterprise
context, as the enterprises IT systems are aware of the email address
book.

In addition other identity data in the certificate must come from a
verified source, e.g. HR database of identity data that is well-
maintained and was created based on face to face or direct
verification of the person.

> > BlackBox subordinate CAs are also audited onsite at
> > least once annually.
>
> By whom? I remember from the last discussion that you weren't performing
> on-site visits or only randomly, download of the software and CA keys
> were provided via Internet download.
>

Currently it is WISeKey that audits all our CAs, we review the CAs at
least once annually, or more regularly as we are more often present on
some client sites. In addition to the controls we place on issuance,
we also place monitoring controls and obtain regular reports.

All CA keys are generated within accredited HSMs. No CA private Keys
are provided via Internet download - this has never been the case. CA
keys have, and are always generated within a protected HSM.

>
>
> > There have been changes to the policies and practices. The CIDClassed
> > document is a summary of WK practices and certificate classes.
>
> OK, I will examine this document further then...
>
> > WISekey's products do not circumvent the audit requirement.
> > WISeKey's products conform with the basic requirements of the Mozilla
> > CA policy. WISeKey subordinate CAs in the BlackBox category can only
> > issue certificates containing domain names that have been validated as
> > being owned by the customer. These CAs are audited physically onsite,
> > there are technical controls preventing the issuance of certificates
> > containing any other domain name, and there are additional monitoring
> > controls.
>
> Did your auditor perform random verifications of those visits, verify
> some of these installations and the technical controls? You don't have
> to answer this question, but it would be nevertheless interesting to
> understand the extend of the audit performed.
>

Our auditor has reviewed all of our policies and practices, controls,
and has accepted them as being sufficient.  The auditor reviews audit
information from all CAs, and can request to visit any or all CA sites
at any time. Which ones, how many, they have done for the last year,
audit etc., is and remains confidential.

> What are your requirements and controls concerning physical and logical
> access to the system(s)? (pointer to the CPS section is fine)
>

For systems hosted in our DC, section 4 of the Issuing CA CPSs in the
repository applies (www.wisekey.com/repository).
For TrustCenter (BB) CAs - those CAs on customer sites, the relevant
excerpt is as follows:-
4.            PHYSICAL, PROCEDURAL, AND PERSONNEL SECURITY CONTROLS
4.1.         Physical Controls for the Issuing CA
The hardware and software for the Issuing CA is maintained on-line in
a secured facility with perimeter security and enforced internal
access controls.
4.2.         Procedural Controls
No member of staff is allowed to gain physical access or operate any
component of the Issuing CA without the presence of other designated
members of staff who have the skills required to confirm that no
unauthorized or inappropriate actions are conducted.
Procedures are defined and documented for all operations upon the
Issuing CA. Operating procedures are regularly reviewed in the light
of new operational requirements.
4.3.         Personnel Controls
All ISSUING CA OPERATOR staff involved in the operation of the Issuing
CA is subjected to background checks and vetting according to ISSUING
CA OPERATOR internal security policies.
Personnel involved in the control and operation of the Issuing CA
shall be sufficiently trained to comply with the functions allocated
to their role and shall be provided with ongoing training to ensure
the appropriate levels of awareness of the security policies and
procedures.


> > WISeKey is part of the MS Windows RCA program, and have had extensive
> > discussions with Microsoft's team prior to joining the program. The
> > conformance of MS products with the IETF PKIX standard enable its
> > product to work efficiently and cost effectively. They have supported
> > WISeKey extensively in testing. WISeKey has signed the Microsoft
> > Windows Root Certificate Program - CA agreement.
>
> I think some enterprise scenarios are explicitly disallowed by Microsoft
> which your product however could implement nevertheless, specially since
> it's based on MSCA (as I understood). But this is beyond the scope of
> what we do here, it was only a side note from me.
>
> --

Regards,
Kevin
WISeKey SA

> Regards
>
> Signer: Eddy Nigg, StartCom Ltd.
> Jabber: [EMAIL PROTECTED]
> Blog:  https://blog.startcom.org

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to