• No results found

Version 1.0 Effective Date: Copyright 2013 All rights reserved.

N/A
N/A
Protected

Academic year: 2021

Share "Version 1.0 Effective Date: Copyright 2013 All rights reserved."

Copied!
31
0
0

Loading.... (view fulltext now)

Full text

(1)

SITHS Registration Authority Policy

Version 1.0

Effective Date: 2013-01-25

Copyright

2013

(2)

Copyright Notices

No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), without prior written permission of Inera AB.

Notwithstanding the above, permission is granted to reproduce and distribute this Registration Authority Policy on a nonexclusive, royalty-free basis, provided that:

1. The foregoing copyright notice and the beginning paragraphs are prominently displayed at the beginning of each copy.

2. This document is accurately reproduced in full, complete with attribution of the document to Inera AB.

Requests for any other permission to reproduce this Registration Authority Policy (as well as requests for copies from Inera AB) must be addressed to:

Inera AB

Box 177 03, Östgötagatan 12, 118 93 Stockholm Sweden

Attention: SITHS Policy Authority Or:

(3)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 3/31

Table of contents

1 Introduction ... 6

1.1 Overview ... 7

1.2 Document name and identification ... 8

1.3 PKI participants applicable for the SITHS RA policy ... 9

1.3.1 Certification authority (CA) ... 9

1.3.2 Registration authorities (RA) ... 9

1.3.3 RA obligations ... 9

1.3.4 Certificates issued by SITHS RAs ... 9

1.3.4.1 HCC Person ... 10

1.3.4.2 HCC Function ... 11

1.4 Applicability ... 11

1.5 Policy administration ... 12

1.5.1 Organization administering the document ... 12

2 Terms and obligations ... 13

2.1 Obligations ... 13

2.1.1 RA obligations in relation to CAs ... 13

2.1.1.1 Protection of RA private keys ... 13

2.1.1.2 Restrictions concerning use of RA private keys ... 13

2.1.2 RA obligations in relation to xRAs ... 13

2.1.3 Subscriber obligations ... 14

2.1.4 Relying party obligations ... 14

2.1.5 Rules and routines that shall be part of RAPS ... 14

2.2 Responsibilities ... 14

2.2.1 RA responsibilities within its operating boundaries ... 14

2.2.2 RA responsibility disclaimers ... 15

2.3 Financial responsibilities ... 15

2.4 Governing law ... 15

2.5 Fees ... 15

(4)

2.7 Confidentiality ... 15

2.8 Intellectual property rights ... 16

2.9 Terms and agreements ... 16

2.9.1 Agreement with the SITHS Policy Authority ... 16

2.9.2 Agreement with the organization that RAs belong to ... 16

3 Identification and authentication ... 16

3.1 Requirements for physical presence... 17

3.2 Authentication of functions within organizations ... 17

3.3 Authentication of authorized representative ... 17

3.4 Requests for certificate revocation ... 17

4 Operational requirements ... 17

4.1 Certificate application ... 17

4.1.1 Circumstances for application ... 17

4.1.2 Who can submit a certificate application? ... 18

4.1.3 Enrollment process and responsibilities ... 18

4.1.3.1 End entity certificate subscribers ... 18

4.2 Certificate Application Processing ... 19

4.2.1 Performing identification and authentication functions ... 19

4.2.2 Approval or rejection of certificate applications ... 19

4.2.3 Time to process certificate applications ... 19

4.3 Certificate issuance ... 20

4.3.1 CA Actions during certificate issuance ... 20

4.3.2 Notifications to subscriber by the CA of issuance of certificate ... 20

4.4 Certificate acceptance ... 20

4.4.1 Conduct constituting certificate acceptance ... 20

4.4.2 Publication of the certificate by the CA ... 20

4.4.3 Notification of certificate issuance by the CA to other entities ... 21

4.5 Certificate revokation ... 21

4.5.1 Circumstances for revocation ... 21

4.5.2 Who can submit a revocation request... 21

4.5.3 Procedure for revocation request ... 21

(5)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 5/31

4.6 Smart card applications ... 22

5 Records archival ... 22

6 Compromise and disaster recovery ... 22

7 RA termination ... 22

8 Facility, management, and operational controls ... 23

8.1 Physical controls ... 23

8.2 Procedural controls ... 23

8.3 Personnel controls ... 24

8.3.1 Qualifications, experience, and clearance requirements ... 24

8.3.2 Background check procedures ... 24

8.3.3 Training requirements ... 24

8.3.4 Retraining frequency requirements ... 25

8.3.5 Job rotation frequency and sequence... 25

8.3.6 Sanctions for unauthorized actions ... 25

8.3.7 Independent contractor requirements... 25

8.3.8 Documentation supplied to personnel ... 25

9 Technical security controls ... 25

9.1.1 Private Key delivery to subscribers ... 25

9.2 Private key protection and cryptographic module engineering controls ... 26

9.2.1 Private key archival ... 26

9.3 Computer security controls ... 27

9.3.1 Specific computer security technical requirements ... 27

9.3.2 Computer security rating ... 27

10 Compliance audit and other assessments of RAs ... 28

11 Referenced documents ... 28

Appendix A. Table of acronyms and definitions ... 29

Acronyms ... 29

Definitions ... 29

Version history

Version Author Comment

(6)

1 Introduction

This document is the principal statement of policy governing SITHS RAs procedures and routines. The SITHS Certificate Policy (CP) sets forth the business, legal, and technical requirements for approving, issuing, managing, using, revoking, and renewing, digital certificates within SITHS and providing associated trust services for all participants within SITHS. These requirements protect the security and integrity of SITHS and comprise a single set of rules that apply consistently across SITHS, thereby providing assurances of uniform trust throughout SITHS. The CP is not a legal agreement between Inera AB and organizations with a SITHS membship; rather, contractual obligations between Inera AB and SITHS participants are established by means of agreements with such participants.

This Registration Authority Policy (RAP) is governed by the SITHS CP and all its stipulations. No RA operations within SITHS shall conflict with the regulations of the SITHS CP. Also, all RAs are obligated to ensure that sufficient, monetary and personell, resources are allocated in order to meet the

requirements of this RAP and fulfill all its obligations.

This document is targeted at:

 SITHS RAs who have to operate in terms of their own Registration Authority Practices Statement (RAPS) that complies with the requirements laid down by the RAP.

 SITHS certificate subscribers who need to understand how they are authenticated and what their obligations are as SITHS subscribers and how they are protected under SITHS.  Relying parties who need to understand how much trust to place in a SITHS certificate, or a

digital signature using a SITHS certificate.

This RAP conforms to the Internet Engineering Task Force (IETF):

 RFC 2119 Key words for use in RFCs to Indicate Requirement Levels. This RAP is owned and maintained by the SITHS Policy Authority.

(7)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 7/31

1.1 Overview

An overview of the SITHS policy structure is shown in diagram 1 below. At the top of the hierarchy is the SITHS Policy Authority that owns and maintains and sets out the policies under which SITHS participants must comply with.

Diagram 1 – SITHS policy structure Certification Authorities operate under the SITHS CP, issuing certificates.

Registration Authorities (RAs) are entities that authenticate certificate requests within SITHS. Inera AB and organizations that are members of SITHS can act as RAs for certificates they issue.

Depending on the type of certificate, digital certificates may be used by subscribers in a wide set of services, for example:

 Secure communication to/from websites  Digitally sign code or other content  Digitally sign documents and/or e-mails

The person who ultimately receives a signed document or communication, or accesses a secured website is referred to as a relying party, i.e., he/she is relying on the certificate and has to make a decision on whether to trust it or not. A relying party must rely on a certificate in terms if the relevant relying party agreement included in the certificate.

(8)

This RAP describes the procedures and routines that are applied when issuing certificates within SITHS for:

 Physical persons  Functions/services

Within SITHS, certificates are issued according to different certificate profiles that govern certificate contents and possible subscribers, these profiles are labeled as HCC.

RAs that operate within SITHS must adhere to the SITHS Registration Authority Policy and publish a Registration Authority Practice Statement (RAPS) that is approved by the SITHS Policy Authority. An RA without approved RAPS will not become a part of SITHS.

1.2 Document name and identification

This document is the SITHS Registration Authority Policy (RAP). The SITHS Policy Authority, acting as the policy defining authority, has assigned an object identifier for this RAP.

(9)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 9/31

1.3 PKI participants applicable for the SITHS RA policy

1.3.1 Certification authority (CA)

The term Certification Authority (CA) is an umbrella term that refers to all entities authorized to issue public key certificates within SITHS. The CA term encompasses two subcategories of issuers:

 Root Certification Authorities. The SITHS Root CA acts as root for all subordinate CAs that are part of the SITHS CA hierarchy. A Root CA within SITHS only issue subordinate CA

certificates.

 Subordinate issuing Certification Authorities. The set of SITHS Subordinate Issuing CAs issue end entity certificates based on the approved certificate profiles governed by the SITHS Policy Authority.

Each CA that is part of the SITHS PKI must publish a CPS that is approved by the SITHS Policy Authority. Each CPS must also contain a referece to the SITHS Certificate Policy.

Each CA is responsible for maintaining sufficient resources in the form of monetary means and insurances to be able to fullfill its duties according to the SITHS Certificate Policy. The SITHS Policy Authority prohibits CAs from SITHS that cannot meet this requirement.

Inera AB must have a valid and signed agreement with each organization that certficates are issued to. Each agreement must refer to the SITHS Certificate Policy.

1.3.2 Registration authorities (RA)

A Registration Authority is an entity that performs identification and authentication of certificate applicants for end entity certificates, initiates or passes along revocation requests for certificates for end-entity certificates, and approves applications for renewal or re-keying certificates on behalf of a CA. Inera AB and SITHS member organizations may act as RAs.

Each RA must operate in accordance with the SITHS RA Policy and have a RAPS published and approved by the SITHS Policy Authority. The RAPS of an RA shall describe the RA organization, its procedures and routines for implementing the SITHS RAP. Each RA within SITHS shall operate under its own distinct RAPS.

Each RA is accountable for that all stipulations of the SITHS RA Policy are fulfilled.

1.3.3 RA obligations

1.3.4 Certificates issued by SITHS RAs

RAs within SITHS issues and revokes certificates for the following types of subscribers:

Subject type

Certifikate profile

Certifikate type

Person

HCC Person

Secondary certificate*

System or service

HCC Function

Primary certificate**

All attributes contained within certificates issued by RAs within SITHS must be verified in accordance with the SITHS Certificate Policy. Certificate attributes are specified in the SITHS Certificate Policy and the SITHS HCC certificate profiles.

(10)

1.3.4.1 HCC Person

HCC Person is only issued to physical persons that:

1. Can prove a unique identity whos attributes can be controlled and verified by a trusted third party.

2. Is an employee of, or by a formal agreement is connected to, a SITHS member organization. All attributes of HCC Person issued under the SITHS Certificate Policy must be controlled and verified by a trusted third party. Trusted third parties include the following entities:

 The Swedish tax authority  The HSA directory

HCC Person is issued as secondary certificates, by connection to a primary certificate. Primary certificates must only be issued by a CA that is trusted, validated and approved by the SITHS Policy Authority. For HCC Person primary certificates are issued by:

 Telia e-legitimation EU HW CA v1 o SHA1 thumbprint = 07 cb 51 6e 66 12 bf a5 e2 7e b3 1f 02 10 78 80 57 18 a1 9d  Telia Enterprise CA v2 o SHA1 thumbprint = 5a 43 0d 1e df da 3a c2 bc ca e5 88 a0 81 0d c3 c8 ad 61 aa  Telia Enterprise CA v3 o SHA1 thumbprint = 34 f4 df c8 bf fd ed 15 21 03 74 f2 5e c2 4d 5b 61 43 db e5  Telia Card Identifier CA v2

o SHA1 thumbprint = 6e a8 31 00 aa c9 45 20 ac a7 8b 28 7e 24 f1 d8 ee ed 09 5c

These CAs also issue cryptographic modules, where the private key is stored and protected. This means that no separate keys are generated for HCC Person in accordance with the SITHS Certificate Policy.

The distinguishing factor for HCC Person is that the subject contains the name, which is strongly connected to an organization by means of HSAId***. The HSAId for a person is derived from the HSAId-series of the organization hosting the person in question within the HSA directory.

* - Secondary certificates are issued to a subscriber based on a previously issued primary certificate along with associated assymetric keys. The SITHS Policy Authority approves trusted issuers of primary certificates that can be be tied to secondary certificates.

** - Primary certificates are issued to subscribers along with assymetric keys and are not dependent on previously issued certificates. *** - The HSAId is the unique identifier used within the HSA directory for every object within the directory.

(11)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 11/31

1.3.4.2 HCC Function

HCC Function is only issued to named functions or services that can be: 1. An organizational function

2. A technical service or funtion within an organization

A HCC Function is never issued to a physical person. A function or service in this context is always subordinate to an organization.

All organizations that apply for HCC Function under the SITHS Certificate Policy must be controlled and verified by a trusted third party. Trusted third parties include the following entities:

 The Swedish companies registrations office  The HSA directory

Swedish public organizations that are not registered with the Swedish companies registrations office are verified by a combination of:

 A formal signature from an individual that is authorized to sign agreements for the organization  Verifying that the individual is listed in the organizations list of individuals that are authorized

to sign for the organization, this is verified by contacting the administrative management of the organization.

HCC Function is issued as primary certificates. Before issuance a key pair is generated in accordance with section 6.1 in the SITHS Certificate Policy.

The distinguishing factor for HCC Function is that the subject contains the name of a funtion, which is strongly connected to an organization by means of HSAId, but does not contain any information about any physical person. The HSAId for a function is derived from the HSAId-series of the organization hosting the function in question within the HSA directory.

1.4 Applicability

This RAP is relevant for:

 CAs that operate within SITHS

 RAs approved by the SITHS Policy Authority  ORAs appointed by SITHS RAs

 LRAs appointed by SITHS RAs  CRAs appointed by SITHS RAs  Auditors

 Relying parties  Subscribers

 Contracted vendors and/or suppliers of system components for any part of the technical SITHS infrastructure

(12)

1.5 Policy administration

1.5.1 Organization administering the document

This RAP is administered by the SITHS Policy Authority that can be reached on the following address: Inera AB

Box 177 03, Östgötagatan 12, 118 93 Stockholm

Sweden

The SITHS Policy Authority can also be contacted by email on the following address: sithpolicyauthority@inera.se

(13)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 13/31

2 Terms and obligations

2.1 Obligations

2.1.1 RA obligations in relation to CAs

RAs in accordance with this RAP must:

1. Operate within the obligations stipulated by the SITHS Certificate Policy

2. Conduct audits in accordance with the SITHS Certificate Policy and the SITHS Registration Authority Policy stipulations for internal and external audits

3. Conduct subject identification in accordance with the SITHS Certificate Policy 4. Revoke certificates in accordance with the SITHS Certificate Policy

5. Gather and verify information that are part of certificates 6. Request certificates from the appropriate CA

7. Deliver private keys to the subscriber when applicable in accordance with the SITHS Certificate Policy

8. Archive information in accordance with the SITHS Certificate Policy and this RAP

9. Verify that certificates only contain information as regulated by the SITHS certificate profiles 10. Ensure that rules for certificate applications are enforced as specified in the SITHS Certificate

Policy

11. Meet operational requirements as specified by the SITHS Certificate Policy

2.1.1.1 Protection of RA private keys

RA private keys are stored on smart cards protected by PIN-codes. Each RA is obligated to protect its smart card and PIN-codes in accordance with the SITHS Certificate Policy and the associated assurance level(s) that SITHS implements.

2.1.1.2 Restrictions concerning use of RA private keys

Each RA is bound by an agreement with every CA it interfaces with, by means the SITHS Certificate Policy. This regulates the use of private keys described in the SITHS Certificate Policy.

2.1.2 RA obligations in relation to xRAs

RAs in accordance with this RAP must:

1. Establish and follow routines for xRAs, in accordance with the requirements specified in the SITHS Certificate Policy

2. Designate xRAs within the RA operating boundary. RAs can also delegate designation of CRAs and LRAs to appointed ORAs as needed. ORAs shall always be appointed by RAs. 3. Renew and revoke xRAs as needed.

(14)

5. Conduct personell controls of xRAs, Each RA must have approval by the SITHS Policy Auhtority regarding the actual controls that are used. The SITHS Policy Authority will not accept unauthorized controls.

2.1.3 Subscriber obligations

Subscriber obligations are stipulated by the SITHS Certificate Policy.

2.1.4 Relying party obligations

Relying party obligations are stipulated by the SITHS Certificate Policy.

2.1.5 Rules and routines that shall be part of RAPS

The following rules and routines shall be documented and goverened for each RA by means of its RAPS. Note that each RAPS within SITHS must be approved by the SITHS Policy Authority before an RA is allowed to operate within SITHS.

1. Routines for issuance and subscriber acceptance of certificates, including temporary replacement smart cards and associated certificates

2. Backup routines for PIN codes associated with HCC Function certificates 3. Rules for verification of subscriber information

4. Rules and routines for information management, quality and history within the HSA directory in relation to the entity that is responsible for the enforcement of the HSA Policy.

5. Background checks of xRAs

6. Archiving of information according to the stipulations of the SITHS Certificate Policy 7. Internal compliance audits in accordance with the SITHS Certificate Policy

8. Local disaster recovery plans

2.2 Responsibilities

2.2.1 RA responsibilities within its operating

boundaries

RAs are responsible for the following within its operating boundaries:

1. That the requirements and specifications of the SITHS Certificate Policy are fulfilled

2. That the requirements and specifications of the SITHS Registration Authority Policy are fulfilled

3. That xRAs are available to sufficient extent to allow local knowledge of the persons that act as subscribers within the local RA operational boundary

4. That sufficient economic resources are available for issuance of SITHS certificates

5. That all information security requirements that apply to RA operations within the SITHS Certificate Policy are fulfilled

6. That periodic controls and audits are conducted, regarding proper issuance and usage of issued SITHS certificates

(15)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 15/31

7. That archiving is conducted in accordance with the SITHS Certificate Policy

8. That all information within issued certificates are verified and correct in accordance with the SITHS Certificate Policy

2.2.2 RA responsibility disclaimers

RAs are not responsible for consequenses or damage due to:

1. That keys are used in violation to the SITHS Certificate Policy 2. That keys are changed in violation to the SITHS Certificate Policy

3. That subscribers use certificates in violation to the SITHS Certificate Policy 4. Errors caused by CAs

5. Errors caused by other RAs

2.3 Financial responsibilities

No stipulations.

2.4 Governing law

Subject to any limits appearing in applicable law, the laws of Sweden shall govern the enforceability, construction, interpretation, and validity of this RAP.

2.5 Fees

No stipulations.

2.6 Compliance audit and other assessments

RAs shall continuously conduct audit reviews in order to make sure that this RAP is correctly

implemented. Such audits shall at least occur once on a yearly basis or when suspicios activities are detected within a RA operating boundary.

When flaws or a need for change in the local implementation of the RAP arise, RAs shall take appropriate action in order to remediate such situations by changing routines and or initiate changes to this RAP. Changes to this RAP are managed by the SITHS Policy Authority.

If changes to this RAP affect the security level of SITHS RA operations, a new policy with a new OID is to be established to reflect this change in security level.

2.7 Confidentiality

Confidentiality concerning information for subscribers that are physical persons is stipulated by the following Swedish laws:

 Personuppgiftslagen  Sekretesslagen

All RA operations must meet the requirements of Swedish law and the stipulations within the SITHS Certificate Policy.

(16)

2.8 Intellectual property rights

The allocation of intellectual property rights among SITHS participants other than subscribers and relying parties shall be governed by the applicable agreements between such SITHS participants.

2.9 Terms and agreements

2.9.1 Agreement with the SITHS Policy Authority

All RAs operating within SITHS shall sign a formal agreement, in the form of a SITHS membership agreement, with the SITHS Policy Authority that dictates RA operating responsibilities and

requirements. Such agreements also dictate that RAs shall abide under the stipulations of the SITHS Certificate Policy. To every such agreement a RAPS shall also be appended, that describes the local implementation of this RAP.

2.9.2 Agreement with the organization that RAs

belong to

The following formal and documented agreements shall extist within the organization that RAs and xRAs belong to, in regards to RA operations:

 Agreement regarding requirements and responsibilities for RA  Agreement regarding requirements and responsibilities for ORA  Agreement regarding requirements and responsibilities for LRA  Agreement regarding requirements and responsibilities for CRA

 Agreement with xRAs organizational manager regarding requirements and responsibilities for xRA operations

 Agreement with the responsibles for the directory services used by SITHS within the organization

 Agreement with the archival responsible within the organization

Such organizational agreements shall also define the organizations assignment of:  Register responsibles

 Information security responsibles

3 Identification and authentication

All identification and authentication of subscribers shall adhere to the SITHS Certificate Policy stipulations. Requirements for identification are described in the SITHS Certificate Policy.

RAs shall make sure that there are routines implemented regarding:  Control of auhtorized individuals when applying for certificates  Establishment of formal information regarding certificate applications  Archiving of certificate applications

 Archiving of requests for certificates  Archiving of requests for smart cards  Issuance and revocation of certificates  Archiving of subject validations

 Archiving of results of certificate applications These routines shall be described in the RAPS of RAs.

(17)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 17/31

3.1 Requirements for physical presence

Requirements for physical presence of subscribers shall adhere to the SITHS Certificate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

3.2 Authentication of functions within organizations

Requirements for authentication of functions shall adhere to the SITHS Certificate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

3.3 Authentication of authorized representative

Requirements for authentication of authorized representatives shall adhere to the SITHS Certificate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

3.4 Requests for certificate revocation

Reqests for certificate revoction shall adhere to the SITHS Certificate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

4 Operational requirements

Operational requirements dictate the following:

 Certificate and smart card applications

 Issuance of certificates, smart cards, keys and codes  Revocation of certificates and smart cards

These operational requirements shall adhere to the SITHS Certficate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

4.1 Certificate application

4.1.1 Circumstances for application

A CA or RA shall issue certificates under the following circumstances:

 If a valid subscriber submits a valid certificate application

 If the subscriber information can be validated in accordance with the SITHS Certificate Policy  If not suspecting that a private key associated with a certificate will be compromised or used

by some entity that is not the subscriber

 If the subscriber is in exclusive control of an approved cryptographic module for certificates that require such cryptographic modules

 If not suspecting that the subscriber will violate the SITHS Certificate Policy.

If a CA issues a certificate in accordance with one of the above circumstances under a mistake of fact the CAs responsibilities are determined by the SITHS Policy Authority from case to case.

(18)

4.1.2 Who can submit a certificate application?

Below is a list of entities that may submit certificate applications:

 Individual who is the subject of the certificate and who is an employee of, or by a formal agreement is connected to, a SITHS member organization. Certificate applications from such entities shall be approved by administrative management functions within the SITHS member organization in accordance to local regulations.

 Authorized representatives of an organization  Authorized representatives of a CA

 RAs or authorized representatives of an RA

o RAs or representatives of RAs are not allowed to request certificates that represent their own identities

4.1.3 Enrollment process and responsibilities

4.1.3.1 End entity certificate subscribers

All end entity certificate subscribers shall manifest assent to the relevant subscriber and undergo an enrollment process consisting of:

 Completing a certificate application and providing true and correct information  Generating, or arranging to have generated, a key pair

 Delivering his, her, or its public key, directly or through an RA, to the SITHS processing centers

 Demonstrating possession and/or exclusive control of the private key corresponding to the public key delivered to the SITHS processing centers

(19)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 19/31

4.2 Certificate Application Processing

4.2.1 Performing identification and authentication

functions

An RA, or xRA, shall perform identification and authentication of all required subscriber information according to the requirements in chapter 3 of the SITHS Certificate Policy.

A certificate application must fulfill the following procedures:

1. RA or other authorized representative for RA fills out application forms and signs the application ensuring that all applicable terms and conditions are accepted. In this procedure the subscriber declares all relevant subscriber information according to chapter 3 in the SITHS Certificate Policy.

2. The subscriber is identified and authenticated according to chapter 3 in the SITHS Certificate Policy. All subscriber information is also verified according to chapter 3 in the SITHS Certificate Policy.

3. Application forms are archived according to the SITHS Certificate Policy.

4.2.2 Approval or rejection of certificate applications

An RA will approve an application for a certificate if the following criteria are met:

 Successful identification and authentication of all required subscriber information in terms of chapter 3 in the SITHS Certificate Policy.

An RA will reject a certificate application if:

 Identification and authentication of all required subscriber information in terms of chapter 3 in the SITHS Certificate Policy cannot be completed

 The subscriber fails to furnish supporting documentation upon request  The subscriber fails to respond to notices within a specified time

 The RA believes that issuing a certificate to the subscriber may bring SITHS into disrepute

4.2.3 Time to process certificate applications

CAs and RAs begin processing certificate applications within a reasonable time of receipt. There is no time stipulation to complete the processing of an application unless otherwise indicated in the relevant subscriber agreement, CPS or other agreement between SITHS participants.

(20)

4.3 Certificate issuance

4.3.1 CA Actions during certificate issuance

A certificate is created and issued following the approval of a certificate application by a CA or following receipt of an RA request to issue the certificate. The CA creates and issues to a certificate applicant a certificate based on the information in a certificate application following approval of such certificate application.

The issuance of a certificate means that the issuing CA accepts the subscriber application and the subscriber information that the subscriber has declared.

The electronic registration by RAs is conducted in a system and in an environment that is secured from integrity flaws and follows routines that prevent faulty mixtures of keys and subscriber information.

Certificates are generated when an authorized representative for a CA or RA or other authorized representative for RA has ascertained that all application and control routines have been fulfilled. Every certificate application from an authorized representative for a CA or RA or other authorized representative for RA can be traced back to the individual that signed the certificate application.

4.3.2 Notifications to subscriber by the CA of issuance

of certificate

CAs issuing certificates to end entity subscribers shall, either directly or through an RA, notify subscribers that they have created such certificates, and provide subscribers with access to the certificates by notifying them that their certificates are available and the means for obtaining them. Certificates shall be made available to end entity subscribers, either by means of an RA-operator, allowing them to download them from a web site or via a message sent to the subscriber containing the certificate.

4.4 Certificate acceptance

4.4.1 Conduct constituting certificate acceptance

The following conduct constitutes certificate acceptance:

 Downloading a certificate or installing a certificate from a message attaching it constitutes the subscribers acceptance of the certificate.

 Failure of the subscriber to object to the certificate or its content constitutes certificate acceptance.

4.4.2 Publication of the certificate by the CA

CAs publish the certificates they issue in the HSA directory as an attribute of the directory object that represents the certificate subject.

(21)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 21/31

4.4.3 Notification of certificate issuance by the CA to

other entities

RAs shall receive notification of the issuance of certificates they approve.

4.5 Certificate revokation

4.5.1 Circumstances for revocation

A CA or RA shall revoke issued certificates under the following circumstances:  If any of the information contained within a certficate is changed

 If recieving a revocation request according to section 3.4 in the SITHS Certificate Policy.  If suspecting that a private key associated with a certificate is compromised or used by some

entity that is not the subscriber

 If suspecting that the smart card or equivalent cryptographic module that contains the private key is no longer in use or possessed by the subscriber

 If suspecting that the subscriber violates the SITHS Certificate Policy.  If a used CA-key is suspected of compromise

 If a CA ends its duties as a CA

If an RA, or xRA, ends its duties as RA or xRA their certificates shall only be revoked if the personal smart card will also be revoked. If the smart card is not to be revoked only the RA och xRA

permissions shall be revoked within SITHS.

RAs and xRAs have the ability to revoke smart cards and certificates outside its own RA boundary if: 1 The subscriber have an existing smart card and certificates issued from another SITHS RA

boundary, and

2 The RA or xRA will issued a new smart card with certificates that replace the previously issued smart card and certificates

If a CA revokes a certificate in accordance with one of the above circumstances under a mistake of fact the CAs responsibilities are determined by the SITHS Policy Authority from case to case.

4.5.2 Who can submit a revocation request

Revokation requests can be made by:

 RA

 xRA authorized by RA

 Authorized representative for SITHS member organization  Certificate subscriber

A CA can however decide to revoke a certificate based on information gathered from other part if this is in alignment with section 3.4 of the SITHS Certificate Policy.

4.5.3 Procedure for revocation request

A revocation service connected to every SITHS CA that issue certificates recieve the request for revocation. The request must be signed by an authorized individual according to section 3.4 of the SITHS Certificate Policy.

(22)

 How the request was recieved  When the request was received  The reason for revocation

 The result of successful revocation request  The time of publication in revocation list  A unique log-ID for the revocation request

4.5.4 Revocation request grace period

Revocation requests shall be submitted as promptly as possible within a commercially reasonable time.

4.6 Smart card applications

Routines and procedures for smart card applications shall be described in the RAPS of RAs.

5 Records archival

Records archival shall adhere to the SITHS Certificate Policy stipulations. The implementation of the requirements stated in the SITHS Certificate Policy shall be described in the RAPS of RAs.

The following specific archival requirements apply for each RA boundary:  Smart card and certificate applications that are not archived by CAs  Issuance and revocation of certificates

 Archiving of subject validations

 Archiving of results of certificate applications

RAs have the right to be granted acess to information that is archived by CAs, however only information that correspond to the local RA boundary

6 Compromise and disaster recovery

Compromise of CA keys is handled according to the stipulations of the SITHS Certificate Policy. Every RA within SITHS is responsible for developing and implementing its local compromise and disaster recovery plans in accordance to the requirements of the SITHS Certificate Policy and the local requirements from within the RA boundary. The RAPS of each RA shall contain a reference to such compromise and disaster recovery plans.

7 RA termination

In the event a RA is terminated from SITHS, the RA is obligated to fulfill the following procedures:  Inform subscribers and other parties, that the RA has a relation with, at least 3 months before

termination

 Terminate all permissions that are held by RA operators within the RA operating boundary  Ensure that all archived information and logs are kept for the entire duration of the archival

period

An RA within SITHS must provide gurarantees and insurances that the necessary means are available to fulfill the above requirements in a termination situation.

(23)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 23/31

8 Facility, management, and operational controls

8.1 Physical controls

Physical controls refer to the physical protection of sites, equipment and information that are related to CAs and RAs. The goals of physical controls are to prevent unauthorized physical access, damage and disruptions. These controls must be related to the risks and threats that CAs and RAs within SITHS are subject to.

RAs and associated xRAs shall fulfill the requirements stipulated in chapter 5 of the SITHS Certificate Policy.

Some RA functions can occur outside of the centrally controlled physical environment, these are:

1 Identification of subscribers when applying for a certificate by physical presence 2 Distribution of keys and codes associated with keys

3 Identification of subscribers and its possession of the correct private key when applying for a certificate electronically

4 Electronic registration of subscribers

5 Revokation registration for revoking of certificates

Function 1 and 2 does not provide any access to a CA, these functions does therefore not regulate any specific physical security controls.

Functions 3-5 are only allowed to be executed in a controlled office environment. Keys or codes must never be left unattended. RA operating credentials that give access to a CA are personal and must not be left behind when the RA operator leaves the environment. The controlled office environment must also include lockable storage units for storage of archive materials.

8.2 Procedural controls

RAs are responsible for all procedures and conditions that concern subscriber applications, issuance, revocation and associated administrative functions. RAs can choose to delegate its responsibilities for these procedures by creating an RA organization. An RA organization can consist of:

 One RA

o RAs have the ultimate authority and responsibility of RA operations within its RA operating boundary. RAs can also appoint xRAs to allow for certain delegated RA operations

 One or more ORAs

o ORAs are responsible for delegated RA operations within designated parts of an RA operating boundary. ORAs can also appoint LRAs and CRAs within its part of the RA operating boundary. ORAs can also issue and revoke subscriber certificates within its RA operating boundary.

 One or more LRAs

o LRAs are responsible for issuing HCC Person certificates for subscribers with smart cards, including temporary replacement cards.

 One or more CRAs

o CRAs are responsible for issuing smart cards for subscribers, excluding temporary replacement cards

 One information security responsible

o Informations security responsibles are responsible for evaluating conformance with the RA organizations RAPS

(24)

 One register responsible

o Register responsibles are responsible for archiving smart card subscriber receipts  One or more audit officers

o Have read only acess to smart card and certificate information within the local RA operating boundary

8.3 Personnel controls

The SITHS Policy Authority has documented detailed personnel control and security policies for RAs to adhere to and be audited against. These personell controls contain sensitive information and are only available to SITHS member organizations after explicit agreement with the SITHS Policy Authority. An overview of the requirements is described in the subsections following.

8.3.1 Qualifications, experience, and clearance

requirements

RAs shall require that personnel seeking to become xRAs present proof of the requisite background, qualifications, and experience needed to perform their prospective job responsibilities competently and satisfactorily. A person within an RA organization shall not have other roles that can be in conflict with the assignment in the RA organization, in accordance with the SITHS Certificate Policy. Within SITHS it is not considered as a conflict to be responsible for a directory service used by SITHS while having an xRA assignment.

8.3.2 Background check procedures

RAs shall designate xRAs that meet the requirements of the RAs local background check procedures. These procedures shall be documented in the RAPS of RAs.

The SITHS Policy Authority shall conduct background checks of RAs according to the stipulations of the SITHS Certificate Policy. This includes:

 A confirmation of previous employments  A check of professional references

 A confirmation of the highest or most relevant educational degree obtained  A search of criminal records (local, state or provincial, and national)  Drug tests and/or financial status checks

8.3.3 Training requirements

RAs shall provide their personnel with the requisite training needed for their personnel to perform their job responsibilities relating to RA operations competently and satisfactorily. They shall also periodically review their training programs, and their training shall address the elements relevant to functions performed by their personnel.

Training programs must address the elements relevant to the particular environment of the person being trained, including:

 Security principles and mechanisms of SITHS  Hardware and software versions in use  All duties the person is expected to perform  Incident and compromise reporting and handling  Disaster recovery and business continuity procedures

(25)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 25/31

8.3.4 Retraining frequency requirements

RAs shall provide refresher training and updates to their personnel to the extent and frequency required to ensure that such personnel maintain the required level of proficiency to perform their job responsibilities competently and satisfactorily.

8.3.5 Job rotation frequency and sequence

No stipulations.

8.3.6 Sanctions for unauthorized actions

No stipulations.

8.3.7 Independent contractor requirements

RAs may permit independent contractors or consultants to become trusted persons only to the extent necessary to accommodate clearly defined outsourcing relationships and only under the following conditions:

 The entity using the independent contractors or consultants as xRAs does not have suitable employees available to fill the roles of trusted persons, and

 The contractors or consultants are trusted by the entity to the same extent as if they were employees.

Otherwise, independent contractors and consultants shall have access to secure facilities used by SITHS only to the extent they are escorted and directly supervised by trusted persons.

8.3.8 Documentation supplied to personnel

Inera AB, processing centers and SITHS member organizations shall provide their personnel with the requisite training and access to other documentation needed to perform their job responsibilities competently and satisfactorily.

9 Technical security controls

9.1.1 Private Key delivery to subscribers

For HCC Person subscribers, keys and its associated smart card are delivered by secure postal service to the RA-function that approved the certificate request. Forwarding of such mail is not permitted. To be noted is that internal forwarding such mail is considered as new mail, thereby allowing such forwarding within an RA boundary.

Smart cards that are completed for delivery but are not delivered to its recipient are locked in a controlled storage until it is sent.

PIN/PUK-codes assossicated with smart cards are sent by regular postal service and is delivered to the suject address registered with the Swedish tax authority. In the case of smart cards that are issued to persons without a social security number, PIN/PUK codes can be delivered to addresses specified by the local RA organization.

Keys associated with HCC Function certificates is only distrubuted to authorized representatives that have been identified and authenticated in accordance with chapter 3 in the SITHS Certificate Policy. Keys associated with HCC Function are only delivered to authorized representatives after they have been signed for in a formal recipient form, however codes associated with PKCS#12 objects are

(26)

delivered to authorized representatives when the CA issues the certificate. Recipient forms are archived for at least 10 years plus the certificate lifetime.

9.2 Private key protection and cryptographic module

engineering controls

The procedures dictated by the SITHS Certificate Policy regarding generation, storage and distribution of private keys is intended to provide protection for private keys in a way that minimize the risk that keys are inappropriately or maliciously exposed or used.

It is the responsibility of RAs that sufficient security controls are implemented in the local environments where subscriber certificates are used. However it is the responsibility of individual subscribers that certificates are used in accordance with the SITHS subscriber agreement.

Subscribers are obligated to only use private keys in situations, applications and devices where it cannot be suspected that private keys can be misused or abused.

9.2.1 Private key archival

No centrally generated keys for subscribers or RAs are allowed to be archived by CAs. However, private keys associated with HCC Function certificates can be allowed to be archived for backup purposes. If such private key archiving is implemented within an RA boundary, this shall be documented within the RAPS of such RAs.

(27)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 27/31

9.3 Computer security controls

9.3.1 Specific computer security technical

requirements

RA functions take place on trustworthy systems in accordance with the standards documented in the contractual agreements with processing centers. Processing centers shall ensure that the systems maintaining RA software and data files are secure from unauthorized access, which can be

demonstrated by compliance with the SITHS Certificate Policy. In addition, processing centers limit access to production servers to those individuals with a valid business reason for access. General users shall not have accounts on the production servers.

Processing centers shall have production networks logically separated from other components. This separation prevents network access except through defined application processes. Processing centers shall use firewalls to protect the production network from internal and external intrusion and limit the nature and source of network activities that may access production systems. Processing centers shall require the use of passwords with a minimum character length and a combination of alphanumeric and special characters, and shall require that passwords be changed on a periodic basis and whenever necessary. Direct access to a processing center database maintaining the processing centers

repository shall be limited to trusted persons in the processing centers operations group having a valid business reason for such access.

RAs shall ensure that the systems maintaining RA software and data files are trustworthy systems secure from unauthorized access, which can be demonstrated by compliance with the SITHS Certificate Policy.

RAs shall logically separate access to these systems and this information from other components. This separation prevents access except through defined processes. RAs shall use firewalls to protect the network from internal and external intrusion and limit the nature and source of activities that may access such systems and information. RAs shall require the use of SITHS certificates for all

operations. Direct access to RAs database maintaining subscriber information shall be limited to trusted persons in the RA operations group having a valid business reason for such access. Processing centers shall also have mechanisms and/or policies in place to control and monitor the configuration of RA systems. Upon installation, and at least once a day, processing centers shall validate the integrity of the RA system.

RA functions are performed using networks secured in accordance with the standards documented in the contractual agreements with processing centers to prevent unauthorized access, tampering, and denial-of-service attacks. Communications of sensitive information shall be protected using point-to-point encryption for confidentiality and digital signatures for non-repudiation and authentication. Only communication that is required for appropriate RA operation shall be allowed, other communication is to be blocked at the network layer.

Software and hardware features that are not used by RAs shall be deactivated.

9.3.2 Computer security rating

No stipulations.
(28)

10 Compliance audit and other assessments of RAs

Compliance audit and other assessments of RAs shall adhere to the SITHS Certificate Policy stipulations. Two kinds of RA audits are implemented:

 External audit – Audits the implementation of the requirements stated in the SITHS Certificate Policy and the SITHS Registration Authority Policy and is performed by the SITHS Policy Authority or an entity designated by the SITHS Policy Authority in accordance with the stipulations in the SITHS Certificate Policy.

 Internal audit – The implementation of the RAPS associated with an RA operating boundary and the compliance with the SITHS RAP and is performed by information security

responsibles associated with the RA organization. Each RA shall describe how such audits are handled and conducted within its Ra boundary.

11 Referenced documents

The following documents are referenced in this RAP:

 The SITHS HCC Profile, version 3.0  The HSA Policy, version 3.5

 The SITHS Certificate Policy, version 1.0

(29)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 29/31

Appendix A. Table of acronyms and definitions

Acronyms

Term Definition

CA Certification Authority.

CP Certificate Policy.

CPS Certification Practice Statement.

CRL Certificate Revocation List.

FIPS United State Federal Information Processing Standards.

OCSP Online Certificate Status Protocol.

PIN Personal identification number.

PKCS Public-Key Cryptography Standard.

PKI Public Key Infrastructure.

PA Policy Authority.

RA Registration Authority.

RAPS Reistration Authority Practice Statement

RFC Request for comment.

Definitions

Term Definition

Administrator A Trusted Person within the organization of a Processing

Center.

Administrator Certificate A Certificate issued to an Administrator that may only be used to perform CA or RA functions.

Certificate A message that, at least, states a name or identifies the CA,

identifies the subscriber, contains the subscriber public key, identifies the certificate operational period, contains a certificate serial number, and is digitally signed by the CA. Certificate Applicant An individual or organization that requests the issuance of a

Certificate by a CA.

Certificate Application A request from a certificate Applicant (or authorized representative) to a CA for the issuance of a certificate. Certificate Chain An ordered list of certificates containing an end entity

subscriber certificate and CA certificates, which terminates in a root Certificate.

Certificate Policies (CP) This document, which is the principal statement of policy governing SITHS.

Certificate Revocation List (CRL) A periodically (or exigently) issued list, digitally signed by a CA, of identified certificates that have been revoked prior to their expiration dates. The list generally indicates the CRL issuer name, the date of issue, the date of the next scheduled CRL issue, the revoked certificate serial numbers, and the specific times and reasons for revocation.

Certificate Signing Request A message conveying a request to have a certificate issued. Certification Authority (CA) An entity authorized to issue, manage, revoke, and renew

certificates.

Certification Practice Statement (CPS) A statement of the practices that is employed by a CA under a specific CP.

Compliance Audit A periodic audit that participants within SITHS undergoe to determine its conformance with SITHS standards apply to it.

(30)

Compromise A violation (or suspected violation) of a security policy, in which an unauthorized disclosure of, or loss of control over, sensitive information may have occurred. With respect to private keys, a compromise is a loss, theft, disclosure, modification, unauthorized use, or other compromise of the security of such private key.

Confidential/Private Information Information required to be kept confidential and private pursuant to this CP.

EV Certificate A digital certificate that contains information specified in the EV Guidelines and that has been validated in accordance with the Guidelines

Extended Validation Validation Procedures defined by the Guidelines for Extended Validation Certificates published by a forum consisting of major certification authorities and browser vendors. Intellectual Property Rights Rights under one or more of the following: any copyright,

patent, trade secret, trademark, and any other intellectual property rights.

Key Generation Ceremony A procedure whereby a CA or RA key pair is generated, its private key is transferred into a cryptographic module, its private key is backed up, and/or its public key is certified. Non-verified Subscriber Information Information submitted by a certificate applicant to a CA or RA,

and included within a certificate, that has not been confirmed by the CA or RA and for which the applicable CA and RA provide no assurances other than that the information was submitted by the certificate applicant.

Non-repudiation An attribute of a communication that provides protection against a party to a communication falsely denying its origin, denying that it was submitted, or denying its delivery. Denial of origin includes the denial that a communication originated from the same source as a sequence of one or more prior messages, even if the identity associated with the sender is unknown.

Offline CA CAs that are maintained offline for security reasons in order to protect them from possible attacks by intruders by way of the network.

Online CA CAs that sign end entity subscriber certificates are maintained

online so as to provide continuous signing services.

Online Certificate Status Protocol (OCSP) A protocol for providing relying parties with real-time certificate status information.

Operational Period The period starting with the date and time a certificate is issued (or on a later date and time certain if stated in the certificate) and ending with the date and time on which the certificate expires or is earlier revoked.

PKCS #10 Public-Key Cryptography Standard #10, developed by RSA

Security Inc., which defines a structure for a Certificate Signing Request.

PKCS #12 Public-Key Cryptography Standard #12, developed by RSA

Security Inc., which defines a secure means for the transfer of private keys.

Policy Authority (PA) The organization within SITHS responsible for enforcing this policy throughout SITHS.

Processing Center An organization that creates a secure facility housing, among other things, the cryptographic modules used for the issuance of certificates.

Public Key Infrastructure (PKI) The architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system.

Registration Authority (RA) An entity approved by a CA to assist certificate applicants in applying for certificates, and to approve or reject certificate applications, revoke certificates, or renew certificates. Relying Party An individual or organization that acts in reliance on a

certificate and/or a digital signature.

Relying Party Agreement An agreement used by a CA setting forth the terms and conditions under which an individual or organization acts as a

(31)

Inera AB Box 177 03 Phone 08 452 71 60 Organization number Page 31/31 relying party.

RSA A public key cryptographic algorithm invented by Rivest,

Shamir, and Adelman.

Subject The holder of a private key corresponding to a public key. The

term subjec can, in the case of a HCC Function certificate, refer to the equipment or device that holds a private key. A subject is assigned an unambiguous name, which is bound to the public key contained in the subject certificate.

Subscriber In the case of an individual Certificate, a person who is the

Subject of, and has been issued, a Certificate. In the case of an organizational Certificate, an organization that owns the equipment or device that is the Subject of, and that has been issued, a Certificate. A Subscriber is capable of using, and is authorized to use, the private key that corresponds to the public key listed in the Certificate.

Subscriber Agreement An agreement used by a CA or RA setting forth the terms and conditions under which an individual or organization acts as a subscriber.

Trusted Person An employee, contractor, or consultant of an entity within SITHS responsible for managing infrastructural

trustworthiness of the entity, its products, its services, its facilities, and/or its practices.

Trustworthy System Computer hardware, software, and procedures that are reasonably secure from intrusion and misuse; provide a reasonable level of availability, reliability, and correct operation; are reasonably suited to performing their intended functions; and enforce the applicable security policy.

References

Related documents

For this solution the Hitachi Command Suite was used to create logical devices (LDEVs) and dynamic pools for the SAP Solution Manager Instance and SAP ERP 6.0 Enhancement Pack 5

En la implementaci ´on anterior las condiciones de frontera de Dirichlet permitieron eliminar el error presentado al desconocer los valores de los campos fuera de la red, pero aun

calculate the hazard probabilities for different types of weather caused outages. • The proposed prediction model shows promising results where the average AUC is larger

Also as the node a is waiting for the value from the node b in the above example, care must be taken to not lose the value of a These aspects reflect that the data structure which

In the ideal single-loop E-A system each limit cycle could exist for a fixed value of x only; the average value of the output over a complete limit cycle being equal to a;.. In

Hasil analisis ini menunjukkan bahwa attitude, subjective norm, dan perceived behavioral control memiliki pengaruh yang signifikan terhadap continued use intention

[r]

15.1 All other disputes or litigation between you and any third party (other than us) concerning the Domain Name which are not brought pursuant to the