You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NS005: Clarifications to sections 1, 2 and a definition prior to NS003 taking effect (#38)
* Incorporate clarifications to:
- Workstation definition
- 1.2.2
- 2.2.1.2
- 2.2.2
- 2.2.5
* Incorporate community feedback
* Add Fido2 specification
* Latest iteration after subgroup meeting 2024-09-11
* Final (hopefully) tweaks to the language for NS005
* Last amend to clear up OCSP and CRL in 1.2.2
* Reference 1.7 to give more time for adoption
* Update build-draft-docs.yml
---------
Co-authored-by: Clint Wilson <[email protected]>
Copy file name to clipboardExpand all lines: docs/NSR.md
+14-27Lines changed: 14 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
2
title: Network and Certificate System Security Requirements
3
-
subtitle: Version 2.0
3
+
subtitle: Version 2.2
4
4
author:
5
5
- CA/Browser Forum
6
-
date: 05 June, 2024
6
+
date: 27 September, 2024
7
7
copyright: |
8
8
Copyright 2024 CA/Browser Forum
9
9
@@ -103,6 +103,7 @@ The following are outcomes that this document seeks to achieve:
103
103
1. something the user knows (knowledge factor);
104
104
2. something the user has (possession factor); and
105
105
3. something the user is (inherence factor).
106
+
106
107
Each factor is independent of the other(s).
107
108
108
109
**Multi-Party Control**: An access control mechanism which requires two or more separate, authorized users to successfully authenticate with their own unique credentials prior to access being granted.
@@ -172,14 +173,11 @@ Each factor is independent of the other(s).
172
173
173
174
**Vulnerability Scan**: A process that uses manual or automated tools to probe internal and external systems to check and report on the status of operating systems, services, and devices exposed to the network and the presence of vulnerabilities listed in the NVD, OWASP Top Ten, or SANS Top 25.
174
175
175
-
**Workstation**: A device, such as a phone, tablet, or desktop or laptop computer, which is:
176
-
177
-
1. connected to the same network as CA Infrastructure and/or Network Equipment; and
178
-
2. capable of accessing CA Infrastructure and/or Network Equipment.
176
+
**Workstation**: A device, such as a phone, tablet, or desktop or laptop computer, which is capable of accessing CA Infrastructure and/or Network Equipment with elevated privileges compared to any given point on the general internet.
179
177
180
178
## Requirements
181
179
182
-
Prior to 2024-11-12, the CA SHALL adhere to these Requirements or Version 1.7 of the Network and Certificate System Security Requirements. Effective 2024-11-12, the CA SHALL adhere to these Requirements.
180
+
Prior to 2025-03-12, the CA SHALL adhere to these Requirements or Version 1.7 of the Network and Certificate System Security Requirements. Effective 2025-03-12, the CA SHALL adhere to these Requirements.
183
181
184
182
### 1. CA Infrastructure and Network Equipment Configuration
185
183
@@ -220,10 +218,7 @@ CA Infrastructure MUST be in a Physically Secure Environment.
220
218
221
219
##### 1.2.2
222
220
223
-
CA Infrastructure and Network Equipment MUST be implemented and configured to authenticate and encrypt connections:
224
-
225
-
1. between CA Infrastructure components; and
226
-
2. between CA Infrastructure and non-CA Infrastructure.
221
+
Connections to and within the CA Infrastructure MUST be authenticated and encrypted except OCSP and CRL.
227
222
228
223
CA Infrastructure and Network Equipment MUST be implemented and configured in a manner that minimizes unnecessary active components and capabilities such that:
229
224
@@ -301,7 +296,9 @@ The CA MUST ensure personnel assigned to Trusted Roles that are authorized to ac
301
296
302
297
###### 2.2.1.2
303
298
304
-
The CA MUST NOT allow group accounts or shared role credentials to authenticate to or access CA Infrastructure and/or Network Equipment.
299
+
The CA SHOULD NOT allow group accounts or shared role credentials to authenticate to or access CA Infrastructure and/or Network Equipment. If group accounts or shared role credentials are used, the CA MUST be able to attribute each use to
300
+
* an approved activity; and
301
+
* an individual user or service account.
305
302
306
303
###### 2.2.1.3
307
304
@@ -321,11 +318,7 @@ The CA MUST ensure security measures are implemented that minimize the susceptib
321
318
322
319
##### 2.2.2
323
320
324
-
The CA SHOULD ensure Workstations are configured in a manner that prevents continued access to the Workstation after a set period of inactivity, for example by automatically logging off active users. The allowed and configured duration of inactivity MUST be selected based on the CA's assessment of associated risks.
325
-
326
-
The CA MAY allow a Workstation to remain active and unattended if the Workstation is otherwise secured and running administrative tasks that would be interrupted by an inactivity time‐out or system lock.
327
-
328
-
The CA MUST ensure personnel assigned to Trusted Roles log out of or lock their Workstation(s) when not in active use.
321
+
The CA MUST ensure Workstations are configured in a manner that prevents continued access to the Workstation after a set period of inactivity, for example by automatically logging off active users. The allowed and configured duration of inactivity MUST be selected based on the CA's assessment of associated risks.
329
322
330
323
##### 2.2.3
331
324
@@ -334,24 +327,18 @@ The CA MUST enforce the use of Multi-Factor Authentication for:
334
327
1. accounts on CA Infrastructure; and
335
328
2. access to CA Infrastructure.
336
329
337
-
Authentication based on the possession of a certificate can be used as part of Multi-factor Authentication only if the associated Private Key is stored in a key storage device certified as:
338
-
339
-
* meeting at least FIPS 140-2 or 140-3, level 2 overall or level 3 physical; or
340
-
* validated against a Common Criteria Protection Profile for Digital Signatures at EAL 4 augmented with AVA_VAN >=5 and ALC_FLR >= 2.
330
+
Authentication based on the possession of a cryptographic key can be used as part of Multi-factor Authentication only if that key is stored in a key storage device that is designed to prevent extraction.
341
331
342
332
##### 2.2.4
343
333
344
334
The CA MUST enforce the use of Multi-Party Control for physical access to any Root CA System.
345
335
346
336
##### 2.2.5
347
337
348
-
The CA SHOULD ensure passwords used as authentication credentials for accounts on CA Infrastructure, Network Equipment, or Workstations are generated and managed in accordance with NIST 800-63B Appendix A.
349
-
350
-
The CA SHALL NOT require periodic password changes with a period less than two (2) years.
351
-
352
-
The CA MUST ensure passwords used as authentication credentials for accounts on CA Infrastructure have a minimum of twelve (12) characters.
338
+
The CA SHOULD ensure passwords used as authentication credentials for accounts on CA Infrastructure, Network Equipment, or Workstations are generated and managed in accordance with NIST 800-63B Revision 3 Appendix A. Access to shared credentials MUST:
353
339
354
-
The CA MUST ensure passwords used as authentication credentials for accounts on Network Equipment or Workstations have a minimum of eight (8) characters.
340
+
* be limited to personnel based on the Principle of Least Privilege; and
0 commit comments