1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.

Slides:



Advertisements
Similar presentations
MODULE B - PROCESS B1.ASME Organizational Structure B2.Standards Development: Staff and Volunteer Roles and Responsibilities B3.Conformity Assessment:
Advertisements

MODULE B - PROCESS B1. ASME Organizational Structure B2. Standards Development: Staff and Volunteer Roles and Responsibilities B3. Conformity Assessment:
Beta Testing: The Contractor’s Perspective Trns·port User Group Meeting October 2005.
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
March 6, 2012 SOC Reporting: What is New in the Audit Guides?
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
National Institute of Advanced Industrial Science and Technology Proposals for auditing Yoshio Tanaka Grid Technology Research.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
The Islamic University of Gaza
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
ISS IT Assessment Framework
The Demand for Audit and Other Assurance Services Chapter 1.
Chapter 11: Active Directory Certificate Services
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Office of Inspector General (OIG) Internal Audit
ISO 9000 Certification ISO 9001 and ISO
Information Asset Classification
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
A Product of Copyright © ANGLER Technologies AURA – Quality Compliance Monitoring & Process Management System.
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
Overview of Systems Audit
Service Organization Control (SOC) Reporting Options and Information
TFTM Interim Trust Mark/Listing Approach Paper Accreditation, Certification, and Trust Mark Program Key Administrative and Operational Responsibilities.
Best Practices Working Group June 19-21, 2001 Munich, Germany.
Basics of OHSAS Occupational Health & Safety Management System
Information Systems Security Computer System Life Cycle Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
WebTrust SM/TM Principles and Criteria for Certification Authorities CA Trust Jeff
Roles and Responsibilities
Copyrights I Global Manager Group | Revision 0.1 Feb 2009 | 1 GMG DEMO OF ISO: ENERGY MANAGEMENT SYSTEM AUDITOR TRAINING PRESENTATION KIT.
1 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Configuring Directory Certificate Services Lesson 13.
Secure e-Business Chartered Accountants of Canada Comptables agréés du Canada Overview of WebTrust TM.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
1 Thank you for visiting our site and welcome to the “Introduction to ISO 22000” Presentation that you requested. For more information.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Company Confidential Registration Management Committee (RMC) AS9104/2A Presentation San Diego, CA January 17, 2013 Tim Lee The Boeing Company 1 Other Party.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Other Party Management Team (OPMT) Status Briefing Americas Aerospace Quality Group (AAQG) Registration Management Committee (RMC) Tim Lee – Chair The.
1 Standard Student Identification Method Jeanne Saunders Session 16.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
The Demand for Audit and Other Assurance Services
Software Configuration Management
Session 11 Other Assurance Services
AMI Security Roadmap April 13, 2007.
Presentation transcript:

1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based on documentation from KPMG

2 Outline WebTrust for CAs – Introduction WebTrust for CAs – Benefits WebTrust for CAs Principles and Criteria Summary of WebTrust for CAs Criteria Topics Typical Audit Process Typical Participants in the Audit Process Recent Developments WebTrust for CAs – Introduction WebTrust for CAs – Benefits WebTrust for CAs Principles and Criteria Summary of WebTrust for CAs Criteria Topics Typical Audit Process Typical Participants in the Audit Process Recent Developments

3 WebTrust for CAs - Introduction AICPA/CICA WebTrust Program for Certification Authorities provides a framework for licensed WebTrust practitioners to assess the adequacy and effectiveness of the controls employed by Certification Authorities (CAs). Typically an annual examination covering 12 months of activity. The initial examination often covers a shorter period such as 3 months. WebTrust for CAs seal of assurance is a symbolic representation of an unqualified report issued to the CA. Versions of WebTrust for CAs v 1.0, released in 2000 and v 2.0, released in WebTrust for Certification Authorities – NAESB Validation is a supplemental audit to assess compliance with specific requirements issued by NAESB WEQ. AICPA/CICA WebTrust Program for Certification Authorities provides a framework for licensed WebTrust practitioners to assess the adequacy and effectiveness of the controls employed by Certification Authorities (CAs). Typically an annual examination covering 12 months of activity. The initial examination often covers a shorter period such as 3 months. WebTrust for CAs seal of assurance is a symbolic representation of an unqualified report issued to the CA. Versions of WebTrust for CAs v 1.0, released in 2000 and v 2.0, released in WebTrust for Certification Authorities – NAESB Validation is a supplemental audit to assess compliance with specific requirements issued by NAESB WEQ.

4 WebTrust for CAs - Benefits Framework allows for communication to auditors, customers, business partners, and potential customers. Provides assurance for Certificate Authorities that the CA’s business practices and controls are in line with AICPA/CICA WebTrust Principles and Criteria for CA’s. Can address the needs of relying parties including enterprise and individual customers, regulatory bodies, communities of trust (e.g., Federal Bridge PKI), technology vendors (e.g., Microsoft, Mozilla, Google), and others. Principles and Criteria for CAs are aligned with the X9.79 PKI Practices and Policy Framework standard. Principles and Criteria for CAs (in version 2.0) are also aligned with the ISO PKI Policy and Practices framework. The framework is based on a baseline set of CA requirements combined with any defined requirements for the community (which can be incorporated into the CA’s CPS or another community requirements document). Framework allows for communication to auditors, customers, business partners, and potential customers. Provides assurance for Certificate Authorities that the CA’s business practices and controls are in line with AICPA/CICA WebTrust Principles and Criteria for CA’s. Can address the needs of relying parties including enterprise and individual customers, regulatory bodies, communities of trust (e.g., Federal Bridge PKI), technology vendors (e.g., Microsoft, Mozilla, Google), and others. Principles and Criteria for CAs are aligned with the X9.79 PKI Practices and Policy Framework standard. Principles and Criteria for CAs (in version 2.0) are also aligned with the ISO PKI Policy and Practices framework. The framework is based on a baseline set of CA requirements combined with any defined requirements for the community (which can be incorporated into the CA’s CPS or another community requirements document).

5 WebTrust for CAs Principles and Criteria The WebTrust for CAs program includes the principles listed below. Underlying each principle, there are a series of supporting criteria to which the CA has to conform. 1.CA Business Practice Disclosure (CP/CPS) The Certification Authority discloses its key and certificate life cycle management business and information privacy practices and provides its services in accordance with its disclosed practices. 2.Service Integrity Subscriber information was properly authenticated (for the registration activities performed by ABC-CA) and The integrity of keys and certificates it manages is established and protected throughout their life cycles. 3.CA Environmental Controls Subscriber and relying party information is restricted and protected Continuity of key and certificate management operations is maintained CA systems development, maintenance and operation are properly authorized and performed to maintain CA systems integrity The WebTrust for CAs program includes the principles listed below. Underlying each principle, there are a series of supporting criteria to which the CA has to conform. 1.CA Business Practice Disclosure (CP/CPS) The Certification Authority discloses its key and certificate life cycle management business and information privacy practices and provides its services in accordance with its disclosed practices. 2.Service Integrity Subscriber information was properly authenticated (for the registration activities performed by ABC-CA) and The integrity of keys and certificates it manages is established and protected throughout their life cycles. 3.CA Environmental Controls Subscriber and relying party information is restricted and protected Continuity of key and certificate management operations is maintained CA systems development, maintenance and operation are properly authorized and performed to maintain CA systems integrity

6 Summary of WebTrust for CAs Criteria Topics CA BUSINESS PRACTICES DISCLOSURE (CP/CPS) CA ENVIRONMENTAL CONTROLS CA KEY MANAGEMENTCERTIFICATE LIFE CYCLE MANAGEMENT CP/CPS Management Security Management Asset Classification and Management Personnel Security Physical and Environmental Security Operations Management System Access Management Systems Development and Maintenance Business Continuity Management Monitoring and Compliance Event Journaling CA Key Generation CA Key Storage Backup and Recovery CA Key Escrow (optional) CA Key Usage CA Key Archival CA Key Destruction CA Cryptographic Device Life Cycle Management CA-Provided Subscriber Key Management Services (optional) Subscriber Registration Certificate Rekey/ Renewal Certificate Issuance Certificate Distribution Certificate Revocation Certificate Suspension (optional) Certificate Status Information Processing Integrated Circuit Card Life Cycle Management (optional)

7 Typical Audit Process The audit process typically includes the following phases: Planning – Define the overall audit schedule, provide documentation request list, provide meeting request list, review CP/CPS and other policies/procedures before onsite fieldwork Fieldwork – Conduct meetings with key individuals, observe processes, inspect configurations, gather audit evidence (refer to Appendix 1 for examples of audit focus areas). Offsite Analysis – Analysis of information gathered during and post fieldwork Reporting – Preparation of the audit report The audit process typically includes the following phases: Planning – Define the overall audit schedule, provide documentation request list, provide meeting request list, review CP/CPS and other policies/procedures before onsite fieldwork Fieldwork – Conduct meetings with key individuals, observe processes, inspect configurations, gather audit evidence (refer to Appendix 1 for examples of audit focus areas). Offsite Analysis – Analysis of information gathered during and post fieldwork Reporting – Preparation of the audit report

8 Typical Audit Process (continued) Other information: Fieldwork generally requires 1 – 4 weeks of effort depending on the size and complexity of the CA infrastructure. For a relatively simple CA environment, the duration of the audit process from planning to final report issuance is approximately 2-4 months. The cost of a WebTrust for CAs examination can range from $50,000 to $250,000 or more depending on the complexity of the environment (i.e., number of CAs, number of CP/CPS documents, etc.). Where the CA has not previously completed a formal audit, it is recommended that they first complete a “readiness review” so that any issues can be identified and corrected before the first formal audit. Other information: Fieldwork generally requires 1 – 4 weeks of effort depending on the size and complexity of the CA infrastructure. For a relatively simple CA environment, the duration of the audit process from planning to final report issuance is approximately 2-4 months. The cost of a WebTrust for CAs examination can range from $50,000 to $250,000 or more depending on the complexity of the environment (i.e., number of CAs, number of CP/CPS documents, etc.). Where the CA has not previously completed a formal audit, it is recommended that they first complete a “readiness review” so that any issues can be identified and corrected before the first formal audit.

9 Typical Participants in the Audit Process Personnel responsible for: Security management Personnel Physical security IT operations (e.g., network and system security, monitoring, change management) CA business continuity management CA key management operations Registration authority activities Personnel responsible for: Security management Personnel Physical security IT operations (e.g., network and system security, monitoring, change management) CA business continuity management CA key management operations Registration authority activities Involvement typically includes: Participation in interviews to discuss CA processes Responding to requests for documented policies/procedures, lists of events occurring during the period, and supporting evidence for a sample of events selected by the auditor Level of involvement: Typically the CA assigns an audit coordinator who spends 25 – 50% of their time coordinating meetings and the gathering of audit evidence during the fieldwork phase of the audit. Other individuals are typically involved for a small portion of focused time.

10 Recent Developments Trust Service Principles and Criteria for Certification Authorities Version 2.0 The AICPA/CICA WebTrust for Certification Authorities task force led the development of an update to the WebTrust for CAs standard which is effective July 1, 2011 Version 2.0 aligned with ISO Public Key Infrastructure policy and practices framework Supersedes WebTrust for CAs Principles, v1.0 Additional reporting templates included for other types of CAs (e.g., Federal Bridge CA) Trust Service Principles and Criteria for Certification Authorities Version 2.0 The AICPA/CICA WebTrust for Certification Authorities task force led the development of an update to the WebTrust for CAs standard which is effective July 1, 2011 Version 2.0 aligned with ISO Public Key Infrastructure policy and practices framework Supersedes WebTrust for CAs Principles, v1.0 Additional reporting templates included for other types of CAs (e.g., Federal Bridge CA)

11 Reference Documents GlobalSign WebTrust Link. WebTrust Principles and Criteria Link Federal Bridge Certificate Policy link pdf pdf GlobalSign WebTrust Link. WebTrust Principles and Criteria Link Federal Bridge Certificate Policy link pdf pdf