Download presentation
Presentation is loading. Please wait.
Published byTyler Briggs Modified over 8 years ago
1
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov vgd@acad.bg IICT-BAS (www.iict.bas.bg) 32 nd EUGridPMA Meeting Poznan, 8-10 Sep 2014 (15 slides)
2
BG.ACAD CA Overview (1) BG.ACAD CA is member since 5.03.2007 Serves academic community in Bulgaria Located in Sofia, IICT-BAS Implementation, very simple: – Online CA repository based on recent FreeBSD and Apache – Offline Signing machine with recent FreeBSD, OpenSSL and some own developed scripts. Issued certificates since 2007: – Personal: 371 – Hosts: 395 – Services: 1 Revoked certificates: 19 Currently valid certificates (total): 96 32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 2
3
3 BG.ACAD CA Overview (2) Current CP/CPS revision: 1.1, OID: 1.3.6.1.4.1.26646.1.3.1.1.1 TACAR member since Jan 2013 Since 1 Jan 2014 all new EE certificates are hashed with SHA-512. No complaints so far. The last SHA-1 certificate will expire in Jan 2015. Ready for issuing CRL hashed with SHA-512. The Online CA machine has full IPv6 support. CA staff members: 3 RAs: 12 people from 3 cities and 9 institutions in Bulgaria.
4
Self-audit The previous self-audit was performed during the 22 nd meeting in Prague, 2011 and was approved in 2013 The current Self-audit was done in accordance with the OGF GFD.169 document. Audit dates: 1-5 Sep 2014 Reviewers: TBD Summary: – A: 62 Good. – B: 0 Recommendation (minor change) – C: 3 Recommendation (major change) – D: 1 Advice (must change) – X: 2 Could not evaluate (N/A) 32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 4
5
5 GFD.169 – 2.3 pre-examination CP/CPS – yes, in repository Relevant IGTF Authentication Profile(s) - yes Manuals for subscribers – yes, in repository Operational manuals – yes, available for the CA members CA Repository (e.g. Web site) - yes, http://ca.acad.bg CA Certificate – yes, in repository CRL – yes, in repository End entity certificates – yes, in repository HSM manual – N/A, offline signing machine. Any other document described as published in the repository in the CP/CPS – yes, EE statement, user guide. Any other document available for the auditors: EE declarations and evidences for user employment – yes, on papers.
6
32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 6 GFD.169 – 2.4 Main examination (1) CA room for Online CA machine: located in IICT-BAS, in the main NOC of Bulgarian NREN (BREN). Restricted access, CCTV, fire alarm system. CA room for Offline CA signing machine: located in IICT-BAS inside the main academic HPC and data center. Access with personal RFID cards and keys, CCTV, 24/7 surveillance, fire alarm system. The removable hard disks of the machine are locked in a dedicated safe box. HSM – not present. Backup media of the CA private key – Yes. Burned on a CD-R and locked in a dedicated safe box on another floor in IICT-BAS. Offline media (sealed envelope) which contains a pass phrase of the CA private key – Yes. In the same safe box as above. May be a bad idea! But we haven’t another dedicated safe box for now.
7
32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 7 GFD.169 – 2.4 Main examination (2) Media storage of archived logs and other documents and their place – Yes, the logs of offline CA are included in the full backups on 2 flash cards in a dedicated safe box. End entity certificates (if not available for the pre-examination), including issuance activities – Yes, in the repository. Logs of the CA/RA servers – No, there are no such servers. Logs of the CA repository (e.g. Web server) - Yes, on the server and included in the regular backups on a dedicated separated storage array. Records of operation of the CA private key (including accesses to the HSM) – No. TBD. Access log to the CA room – Yes. In the central security system. Based on the personal RFID cards usage. Any other documents (e.g. daily report of the CA operators) – No.
8
32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 8 GFD.169 – 3 Auditing Checklist (1) Only the scores above A are described next. The following check has D score, must change: 3.1.7 (34) No user certificates may be shared. It is not clearly stated in CP/CPS. Chapter 4.5.1 and user statement must be expanded.
9
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 9 GFD.169 – 3 Auditing Checklist (2) The following checks have C scores, major change: 3.1.7 (41) Certificates must not be renewed or re-keyed consecutively for more than 5 years without a form of auditable identity and eligibility verification, and this procedure must be described in the CP/CPS. Currently we defined this period as 3 years but we want to be 5 years. Chapters 4.1.2, 4.2.1 and 4.7.3 will be changed and simplified.
10
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 10 GFD.169 – 3 Auditing Checklist (3) The following checks have C scores, major change: 3.1.9 (46) Every CA should perform operational audits of the CA/RA staff at least once per year. Operational audits are not made every year. Some improvement after the previous self-audit. There is no good description of the procedure in our operational manual which consists of CP/CPS mainly. Operational manual will be changed.
11
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 11 GFD.169 – 3 Auditing Checklist (4) The following checks have C scores, major change: 3.1.12. (55) The CA must have an adequate compromise and disaster recovery procedure, and we willing to discuss this procedure in the PMA. The procedure need not be disclosed in the policy and practice statements. This item had C mark in the previous audit. We have a separate draft plan now, but still in progress. We recently received a dreamy opportunity to realize off-site recovery on a remote location through funding from another project. The goal is to start a mirror of the CA repository within one working day. Probably it will be based on IPv6 routing failover capabilities and DNS reservation. We’ll see …
12
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 12 GFD.169 – 3 Auditing Checklist (5) The following checks received X scores, could not evaluate: 3.1.3. (15) The on-line CA architecture should provide for a (preferably tamper-protected) log of issued certificates and signed revocation lists. No, we are offline CA. 3.1.7. (40) Certificates associated with a private key residing solely on hardware token may be … No, our keys are stored in software.
13
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 13 CA root certificate expiration The CA root certificate will expire on Feb 11 2017, 19:00 UTC This means that the latest date for publishing the new certificate is Jan 12 2016 19:00 UTC According to current CP/CPS v1.1, ch. 5.6, a new key pair must be generated and it smells like will be hashed with SHA-512 then. I think it will not be an easy job, so any advices from CAs who already completed such a procedure, are welcome.
14
32 nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 14 Additional changes We plan to do some small additional changes during the long external auditing period which follows now. These changes are outside of the GFD.169 auditing checklist. For example: In CP/CPS, ch.1.1 will be added a statement that IICT-BAS is a full legal successor of IPP-BAS institute on behalf of which the CA was accredited in 2007. End of Self-Audit
15
Questions? Vladimir Dimitrov, vgd@acad.bg 32nd EUGridPMA Meeting, Poznan, 8-10 Sep 2014 15
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.