MyIFAM CA Self-Audit Report APGridPMA F2F Meeting 1/4/2019

Slides:



Advertisements
Similar presentations
Academia Sinica Grid Computing Certification Authority (ASGCCA) Yuan, Tein Horng Academia Sinica Computing Centre 13 June 2003.
Advertisements

CNIC Grid CA/SDG CA Self Audit Kejun (Kevin) Dong Computer Network Information Center (CNIC) Chinese Academy of Sciences APGridPMA F2F.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
DataGrid WP6 CA meeting, CERN, 12 December 2002 IISAS Certification Authority Jan Astalos Department of Parallel and Distributed Computing Institute of.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
User Certificate Application: ASGCCA. Agenda Introduction ASGCCA User Responsibilities Certificate application form RA verify identity of users User generate.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
UNAMgrid Alejandro Núñez Sandoval Rio de Janeiro, Brazil, 03/27/06 F2F meeting, TAGPMA.
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
APGrid PMA face-to-face meeting, 9/16/2008 PRAGMA-UCSD CA Team Pacific Rim Application and Grid Middleware Assembly
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Latin American Catch-all Grid Certification.
Baltic Grid Certification Authority 15th EUGridPMA, January 28th 2009, Nicosia1 Self-audit Hardi Teder EENet.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov IICT-BAS ( 32 nd EUGridPMA Meeting Poznan, 8-10.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
Armenian e-Science Foundation Certification Authority Ara A. Grigoryan 1,2, Artem Harutyunyan 1,2,3, Arsen Hayrapetyan 1,2,4 1 Armenian e-Science Foundation;
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
TNGrid CA 24 th EUGridPMA meeting Ljubljana, Slovenia, January, 2012 Heithem ABBES Mohamed JEMNI
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
© 2007 Open Grid Forum Authentication Service Profile Christos Kanellopoulos 14 th EUGridPMA, Lisbon, PT October 7 th, 2008.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Self-Audit & Status Report for KEK GRID CA Hiroyuki Matsunaga KEK (High Energy Accelerator Research Organization), Computing Research Center APGridPMA.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
IRAN-GRID CA Self Audit IRAN-GRID CA Self Audit Report Shahin Rouhani IRAN-GRID Tehran Iran Shahin Rouhani Grid Computation Group IPM, Tehran, Iran May.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
AEGIS Certification Authority
UGRID CA Sergii Stirenko, Oleg Alienin
Guidelines for auditing Grid CAs
TAG Presentation 18th May 2004 Paul Butler
Public Key Infrastructure (PKI)
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
جايگاه گواهی ديجيتالی در ايران
MaGrid CA Self audit and update
Operationalizing Export Certification and Regionalization Programmes
NATIONAL CENTRE FOR PHYSICS PK-Grid-CA
WEQ-012 PKI Overview March 19, 2019
PKI (Public Key Infrastructure)
Emir Imamagić University Computing Centre (Srce)
Bill Yau HKU Grid Certificate Authority (HKU Grid CA) Self Audit & Status Report Bill Yau
KISTI CA Report Status & Self-Audit
BG.ACAD CA Self-audit report 2018
Presentation transcript:

MyIFAM CA Self-Audit Report APGridPMA F2F Meeting 1/4/2019 Suhaimi Napis suhaimi@upm.my Muhammad Farhan Sjaugi farhan@perdanauniversity.edu.my

MyIFAM Certification Authority MyIFAM CA issue X.509 certificates User Certificates, Host Certificates and Service certificates to people and sites/server participating in e-infrastructure activities (e.g. grid, cloud, eduroam) Public Website: https://myifam.upm.my Issue SHA-256 EECs

Organization CA & RA @ MyIFAM CA One CA Manager : Suhaimi Napis One RA One Technical Assistance MyIFAM CA is hosted at InfoComm Development Centre (iDEC) – Universiti Putra Malaysia (UPM)

System Architecture Dedicated offline machine, which is kept in a locked place, only iDEC staff and CA Manager has access Offline command line interface

CP/CPS Current version: 2.2 Issued: February 2012 Document OID: 1.3.6.1.4.1.36355.2.1.2.2 Conforms to RFC 3647

CA Key 2048 bits RSA with SHA1 Expires 1 Oct 2031 Copy on an offline medium (kept in a safe) Protected with a long passphrase, passphrase kept in a separate location

CA Certificate Published in: MyIFAM public website IGTF repository APGrid PMA repository

Certificate and Key 2048 bits, RSA, SHA2 Lifetime is 400 days Each subscriber must generate his/her own key pair by using web browser and command line but in practice grid admins help with instructions if subscriber is not able to do it by himself.

Issued Certificates Since 2012 Total: Hosts : 267 Users : 264 Valid: 5 Expired&Revoked: 526

Certificate Revocation Lists https://myifam.upm.my/pub/MYIFAM-crl.crl CRL is compliant with RFC 5280

Records Archival All certificate requests are archived

Publication and Repository Responsibilities Repository is available at https://myifam.upm.my Root is published by APGrid PMA and IGTF Unlimited distribution of public data

Support on CRL distribution over IPv6 Currently, MyIFAM CA doesn’t support CRL distribution over IPv6 yet due to the datacenter where the webserver is hosted hasn’t fully support IPv6 yet. Exploring alternative plan which to use CDN as the “proxy” webserver, where all the contents (including the CRL file) is cached and accessible via both IPv4 and IPv6.

Self Audit Report

Versions Guidelines for auditing Grid CAs version 1.0 GFD.169, April 19th 2010 MyIFAM CA CP/CPS version 2.2 February 2012

Summary Total number of items: 67 Marks: A: 55 B: 6 C: 1 X: 5

3.1.1 CP/CPS (1) Every CA must have a CP/CPS https://myifam.upm.my/publication.php (2) Is there a single CA organization per country, large region or international organization? MyIFAM CA is the country-wide CA. (3) Every CA must assign its CP/CPS an O.I.D. OID 1.3.6.1.4.1.36355.2.1.2.2 (4) Whenever there is a change in the CP/CPS the O.I.D. of the document must change… (X) No changed in the CP/CPS has been made since 2012

3.1.1 CP/CPS (5) All the CP/CPS under which valid certificates are issued must be available on the web. YES, all versions of CP/CPS are available on the web https://myifam.upm.my/publication.php (6) The CP/CPS documents should be structured as defined in RFC 3647. YES (7) The CA computer where the signing of the certificates will take place must be a dedicated machine ... The signing machine is a dedicated machine, completely offline and placed in secure/locked room

3.1.2 CA System (7) The CA system must be located in a secure environment ... CA is located in Infocomm Development Centre – Universiti Putra Malaysia. The facility is guarded with local security personnel. The signing machine locked in the safe with controlled access. (8) The CA system must be completely off-line or on-line. On-line CAs must use at least a FIPS 140-2 ... CA is completely offline (9) The secure environment must be documented and approved by the PMA ... YES, stated in CP/CPS

3.1.3 CA Key (10) The CA key must have a minimum length of 2048 bits CA key is 2048 bits (11) The CA key must be configured for long term use 20 years, current Expiration date: 1 Oct 2031 (12) If the private key of the CA is software-based, it must be protected with a pass phrase … Yes, the private key is software-based. Protected with strong pass phrase known only to CA personnel. (13) Copies of the encrypted private key must be kept on offline media in a secure location where access is controlled. A copy of the encrypted private key is kept on offline media in secure location in the sealed box.

3.1.3 CA Key (14) The pass phrase of the encrypted private key must also be kept on offline media, separated from the encrypted private keys … YES (15) The on-line CA architecture should provide for a (preferably tamper-protected) log of issued certificates and signed revocation lists. (X) Not applicable, offline CA (16) When the CA’s cryptographic data needs to be changed, such a transition shall be managed … (A) Documented (17) The overlap of the old and new key must be at least the longest time an end-entity certificate can be valid … (X) We haven’t changed CA crypto data yet

3.1.4 CA Certificate (18) CA must provide and allow distribution of an X.509 certificate to enable validation of end-entity certificates. Yes, published in CA website, APPMA and IGTF repositories, available on the Web (19) Lifetime of the CA certificate must be no longer than 20 years. Lifetime of the CA certificate is 20 years (20) Lifetime of the CA certificate must be no less than two times of the maximum life time of an end entity certificate. YES, maximum lifetime of the end entity certificates is 400 Days (21) The profile of the CA certificates must comply with the Grid Certificate Profile as defined by the Open Grid Forum GFD.125. YES

3.1.5 Certificate Revocation (22) Certificate revocation can be requested by endentities, registration authorities, and the CA. Others can request … Usually, revocation can be requested by end-entity, RA or CA. Others can request revocation if they prove compromise of the private key. (23) The CA must react as soon as possible, but within one working day, to any revocation request received. Revocation requests are processed within four hours in working time and on a best effort basis on holidays. (24) Subscribers must request revocation of its certificate as soon as possible, but within one working day … (B) Our clients are bound to it by our CP/CPS, however in implementation sometime the clients didn’t make immediate request.

3.1.5 Certificate Revocation (25) Revocation requests must be properly authenticated. (B) In most cases we “know”/have knowledge of the users and trust them

3.1.6 Certificate Revocation List (26) Every CA must generate and publish CRLs. YES, https://myifam.upm.my/publication.php (27) The CRL lifetime must be no more than 30 days. YES, 30 days (28) Every CA must issue a new CRL at least 7 days … YES, 10 days before nextUpdate field (29) Every CA must issue a new CRL immediately after a revocation. YES (30) The signed CRL must be published in a repository at least accessible via the World Wide Web, as soon as issued. YES, CRL is published as soon as issued

3.1.7 End Entity Certificates and Keys (32) The user key and the host key must have a minimum length of 1024 bits. YES (33) Lifetime of user certificates and host certificates must be no longer than 13 months. User and host certificated have lifetime not more than 400 days (34) No user certificates may be shared. Users are obliged through the CP/CPS and the document they are signing for each request

3.1.7 End Entity Certificates and Keys (35) The authority shall issue X.509 certificates to end entities based on cryptographic data generated by the applicant … MyIFAM CA issue certificates to end entities based on cryptographic data generated by the applicant (36) Every CA should make a reasonable effort to make sure that subscribers realize the importance of properly protecting… It is clearly stated in the CP/CPS and in the paper certificate request form (37) The end-entity certificates must comply with the Grid Certificate Profile as defined by the Open Grid Forum GFD.125. YES

3.1.7 End Entity Certificates and Keys (38) If a commonName component is used as part of the subject DN, it should contain an appropriate presentation of the actual name of the end-entity. YES, first and last names in case of user certificate, and FQDN in case of host certificate (39) Certificates (and private keys) managed in a software token should only be re-keyed, not renewed. It is stated in the CP/CPS (40) Certificates associated with a private key residing solely on hardware token may be renewed … (X) Not applicable, don’t use hardware tokens

3.1.7 End Entity Certificates and Keys (41) Certificates must not be renewed or re-keyed consecutively for more than 5 years without a form of ... (X) No certificates that has been renewed or re-keyed for more than 5 years yet.

3.1.8 Records Archival (42) Every CA must record and archive all requests for certificates, along with all issued certificates, all requests for revocation, all the issued CRLs and login/logout/reboot information of the issuing machine. (B) all except login/logout/reboot information of the issuing machine (43) These records must be available to external auditors in the course of their work as auditor. (A) The records are available to external auditors (44) These records must be kept for at least three years, where the identity validation records must be kept at least as long as there are valid certificates based on such a validation. YES, all records are kept

3.1.9 Audit (45) Each CA must accept being audited by other accredited CAs to verify its compliance with the rules and procedures specified in its CP/CPS document. YES (46) Every CA should perform operational audits of the CA/RA staff at least once per year. (A) Internal audits are performed at least once per year (47) A list of CA and RA personnel should be maintained and verified at least once per year. (A) the CA and RA personnel are verified, however in the implementation most of the application of certificates were straight to the CA office

3.1.10 Publication and Repository Responsibilities (48) The repository must be run at least on a best-effort basis, with an intended availability of 24x7. Yes (49) The accredited authority must publish their X.509 signing certificate as the root of trust. Yes, our root is published by APGridPMA/IGTF (50) Each authority must publish the following for their subscribers, relying parties and for the benefit of distribution YES, all info published

3.1.10 Publication and Repository Responsibilities (51) The originating authority must grant to the PMA and the Federation the right of unlimited re-distribution … No distribution restrictions (52) The CA should provide a means to validate the integrity of its root of trust. YES, SHA1 fingerprint is published by APGridPMA/IGTF (53) The CA shall provide their trust anchor to a trust anchor repository ... YES, available in the APGridPMA/IGFT repositories

3.1.11 Privacy and Confidentiality (54) Accredited CAs must define a privacy and data release policy compliant with the relevant national legislation. The CA is responsible for recording, at the time of validation, sufficient information regarding the subscribers to identify the subscriber. The CA is not required to release such information unless provided by a valid legal request according to national laws applicable to that CA. (A) MYIFAM CA does not retain any specific private information, however subscribers personal informations are kept securely and not to be distributed to the third party unless for incident investigation purpose.

3.1.11 Compromise and Disaster Recover (55) The CA must have an adequate compromise and disaster recovery procedure, and we willing to discuss this procedure in the PMA. The procedure need not be disclosed in the policy and practice statements. Yes, stated in the CP/CPS

3.2.1 Entity Identification (1) A PKI CA must define the role of a registration authority (RA), and these RAs are responsible for the identity vetting of all end entities. YES, it is in CP/CPS (2) In order for an RA to validate the identity of a person, the subject should contact the RA face-to-face and present photo- id and/or valid official documents showing that the subject is an acceptable end entity as defined in the CP/CPS document of the CA. (B) YES, The initial authentication of a person based on government- issued identification documents, however the physical appearance of the applicant to the RA sometime replaced by video conference due to distance

3.2.1 Entity Identification (3) In case of non-personal certificate requests, an RA should validate the identity and eligibility of the person in charge of the specific entities using a secure method. encrypted and signed emails (4) For host and service certificate requests, an RA should ensure that the requestor is appropriately authorized by the owner of the associated FQDN … Host ownership verified by DNS/WHOIS and personal RA knowledge (5) An RA must validate the association of the certificate signing request. (A) We compare the CN and their personal information

3.2.1 Entity Identification (6) The CA or RA should have documented evidence on retaining the same identity over time. In all cases, the certificate request submitted for certification must be bound to the act of identity vetting. Checks Photo ID

3.2.2 Name Uniqueness (5) Any single subject distinguished name must be linked to one and only one entity. YES (6) Over the entire lifetime of the CA it must not be linked to any other entity.

3.2.3 RA to CA Communications (7) All communications between the CA and the RA regarding certificate issuance or changes in the status of a certificate must be by secure and auditable methods. (C) YES, Encrypted and signed emails (but not always) (8) The CP/CPS should describe how the RA or CA is informed of changes that may affect the status of the certificate. YES, it is in CP/CPS

3.2.4 Records Archival (9) The RA must record and archive all requests and confirmations. (A) only paper personal certificate request forms and photo ID copies (10) The CA is responsible for maintaining an archive of these records in an auditable form. (A) The archive is available for auditing purpose

Thank You