4. OPERATIONAL REQUIREMENTS

4.1. Certificate Application

In order to apply for a certificate, the following steps need to be undertaken:

  1. A requester generates its own key pair and submits the public key and other required data to the RA. (See Section 6.1.1 and Section 6.1.3).

4.2. Certificate Issuance

In order to issue a certificate, the following steps need to be undertaken:

  1. RA verifies whether the requester qualifies for the certificate.

  2. RA verifies the identity of the requester as indicated in Section 3.1.

  3. RA validates the prove of possession of private key using procedures indicated in Section 3.1.7.

  4. When the certificate request does not contain an email address, RA registers the email address to which the subscriber wants the certificate issuance notification to be sent.

  5. RA sends the digitally signed certificate request to the CA.

  6. On receipt of a certificate request, the CA will verify the RA's signature and issue a certificate.

    The requester is notified via email to the address included in the certificate or to the address registered by the RA.

4.3. Certificate Acceptance

The certificate is assumed to be accepted unless its requester explicitly rejects it in an authenticated communication with the CA.

4.4. Certificate Suspension and Revocation

4.4.1. Circumstances for revocation

A certificate will be revoked when the information in the certificate is known to be suspected or compromised or at the request of the authorized entity. It includes following situations:

  1. The associated private key is known to be compromised or misused.

  2. The associated private key is suspected to be compromised or misused.

  3. The subscriber's information in the certificate has changed.

  4. The subscriber is known to have violated his obligations.

  5. The authenticated requester requested the certificate revocation.

4.4.2. Who can request revocation

The following entities can request the revocation of a certificate:

  1. The entity who originally made the certificate request.

  2. The entity which can prove its current responsibility for a certified machine or service.

  3. Any entity which demonstrates the compromise or misuse of a certificate.

  4. Any entity which demonstrates the change of subscriber's data.

  5. The issuing CA or the associated RA.

4.4.3. Procedure for revocation request

In case where the CA can independently confirm that the certificate has been compromised or misused, the CA SHALL revoke the certificate, even if the request to do so comes from an unauthenticated source and/or the holder of the certificate is unreachable.

In all other cases the CA SHALL authenticate the revocation request and try to contact the subscriber before revoking the certificate. If the subscriber is temporarily unreachable, the certificate SHALL be suspended.

If the revoked certificate is a CA certificate the CA SHALL in addition inform the subscribers and cross-certifying CAs and it SHALL terminate the certificate and CRLs distribution service for certificates/CRLs issued using the compromised private key.

4.4.4. Revocation request grace period

The CESNET CA MUST respond within two days (excluding weekends and public holidays) to revocation requests. It SHALL however handle revocation requests with priority as soon as the request is recognized as such.

4.4.5. Circumstances for suspension

The CESNET CA will suspend a certificate only while there is uncertainty over its current status:

  1. At the request of the subscriber or the CA or RA that requested issuing of the certificate.

  2. If a revocation request for the certificate is on hold pending contact with the holder.

4.4.6. Who can request suspension

A certificate suspension can be requested only by the subscriber or by the CA or RA that requested its issuing.

4.4.7. Procedure for suspension request

Suspension request are accepted only when properly authenticated either by a message digitally signed with a valid certificate or by procedures described in Section 3.1.

4.4.8. Limits on suspension period

There are no limits on suspension period.

4.4.9. CRL issuance frequency

CRLs issued by CESNET CA are renewed whenever any certificate is revoked or when any CRLs is more than 30 days old.

4.4.10. CRL checking requirements

The CRLs are checked at the certificate relying party responsibility. Relying parties SHALL update their local copies of CRLs at least once per day.

4.4.11. On-line revocation/status checking availability

The on-line revocation/status checking service is not currently applicable.

4.4.13. Other forms of revocation advertisements available

The subscriber is notified of the revocation of his certificate by email.

4.5. Security Audit Procedures

4.5.1. Types of event recorded

4.5.1.1. RA

The following types of events are recorded by RAs:

  1. Boots of the equipment.

  2. Login and logouts to the RA system.

  3. Account management.

  4. Use of the RA software.

  5. Unauthorized attempts to access the RA system.

  6. Requests for certificates.

  7. Identity verification procedures.

4.5.1.2. CA

The following types of events are recorded by CAs:

  1. Boots of the equipment.

  2. Login and logouts to the issuing machine.

  3. Account management.

  4. Use of the CA software.

  5. Unauthorized attempts to access the CA system.

  6. Requests for certificates.

  7. Certificate issuing.

  8. Requests for revocation.

  9. CRL issuing.

4.5.2. Frequency of processing log

The log files are analyzed at least once every month.

4.5.3. Retention period for audit log

Audit logs MUST be retained as archive records. The audit logs MUST be kept on CA equipment until moved to the archive.

4.5.4. Protection of audit log

Only authorized CESNET CA personnel is allowed to to view and process audit log files.

Audit log files stored on the CA equipment will not be open for modification by any human, or by any automated process other that those that perform audit and archival.

4.5.5. Audit log backup procedures

A backup of the audit logs on physical removable media SHALL be performed weekly. The backup media are saved in safe storage.

4.5.6. Audit collection system (internal vs external)

The audit collection system SHALL be running separately form the CA software.

The audit collection system is internal to the CESNET CA.

4.5.7. Notification to event-causing subject

The subjects causing an audit event are not notified of the audit action.

4.5.8. Vulnerability assessments

The CESNET CA personnel MUST pay attention to any sign of an attempt to violate the integrity of the PKI system. Any deficiency MUST be followed by a vulnerability assessment revision.

4.6. Records Archival

4.6.1. Types of event recorded

The following type of events are archived:

  1. Certificate requests and related messages exchanged between the subscriber and the RA and CA.

  2. Issued certificates.

  3. Revocation requests and related messages exchanged with the requester and/or the subscriber.

  4. Issued CRLs.

  5. Records on CA rekeying.

  6. Records on cross certification.

  7. All implemented CPs and CPSs.

  8. CA system configuration files.

  9. Audit data as described in Section 4.5.1.

4.6.2. Retention period for archive

Digital signature certificates, encryption private keys stored by the CESNET CA and issued CRLs SHALL be archived for at least two years after key expiration. Private signature keys SHOULD NOT be archived after key expiration.

All other archive records SHALL be archived for at least 10 years.

4.6.3. Protection of archive

Digitally stored archive records are stored encrypted in two copies placed in different locations. The encryption passwords SHALL be known only to the CESNET CA personnel.

4.6.4. Archive backup procedures

Archive records are weekly moved from the CA/RA equipment to the encrypted removable media. The copies are stored in different locations. See Section 4.6.3.

4.6.5. Requirements for time-stamping of records

All archive records are time stamped.

4.6.6. Archive collection system (internal or external)

The archive collection system is internal to the CESNET CA.

4.6.7. Procedures to obtain and verify archive information

All the data published by CESNET CA are publicly available.

Data used to identify subscribers are only for internal CESNET CA's usage and are not available to the public.

4.7. Key changeover

The CESNET CA's keys SHOULD be changed while sufficient validity time remains on the existing keys to allow uninterrupted validity of all subordinate keys. The following steps SHOULD be undertaken when changing the CESNET CA's keys:

  1. A new CESNET CA key is generated and self signed certificate issued.

  2. The old key is signed by the new one.

  3. The new key is signed by the old one.

  4. All the newly issued certificates are published.

4.8. Compromise and Disaster Recovery

4.8.1. Computing resources, software, and/or data are corrupted

In the case where the CESNET CA computing resource, software and/or data have been corrupted, the responsible personnel SHOULD immediately start the recovery procedures:

  1. Backup public repository and services systems are started when needed.

  2. Users are notified.

  3. The cause of the corruption are diagnosed.

  4. When the extent of the corruption cannot be exactly specified, the entire system MUST be rebuilt.

  5. The corrupted parts of the system are repaired or replaced.

  6. The corrupted data are replaced from backups if possible.

  7. The certificates issued after disaster are re-issued.

  8. The system is restarted and the users are notified.

4.8.2. Entity public key is revoked

4.8.2.2. CA public key

  1. The key is revoked.

  2. The CRL is updated and published.

  3. The CA system is brought down.

  4. New CA keys pair is generated as indicated in Section 6.1.

  5. Users are notified.

4.8.3. Entity key is compromised

Whenever the subscriber's key is compromised, the subscriber is obliged to notify CESNET CA as soon as possible. The revocation procedure will follow according to Section 3.3, Section 3.4.

In case that the CA private key is compromised, the following actions will be undertaken:

  1. The key is revoked.

  2. The CRL is updated and published.

  3. The CA system is brought down.

  4. The cause of the compromising is analyzed to minimize the risk in future.

  5. New CA keys pair is generated as indicated in Section 6.1.

  6. Users are notified.

4.8.4. Secure facility after a natural or other type of disaster

In the case of a natural or other type of disaster the CESNET CA MUST start the recovery as soon as possible using off-site stored backups.

4.9. CA Termination

4.9.1. Transfer of CA services

The CESNET CA can decide to transfer the PKI services to another organization. In that case it MUST inform all subscribers, cross certifying CAs, higher level CAs, and relying parties with which the CA has agreements or other form of established relations about the transfer at least 3 months before the transfer date. The new organization MUST comply with this CPS.

4.9.2. Cessation of CA services

The CESNET CA can decide to cease its services. In that case the following steps MUST be undertaken:

  1. The CA MUST inform all subscribers, cross certifying CA s, higher level CAs, and relying parties with which the CA has agreements or other form of established relations about the decision at least one year before the termination date.

  2. Any certificates issued after the announcement of the termination MUST have the expiration date not exceeding the termination date.

  3. At the termination date all the certificates issued by the CA MUST be revoked.

  4. The CA stops distributing certificates and CRLs.