Skip to content

Commit 6bf3a2f

Browse files
NS005: Clarifications to sections 1, 2 and a definition prior to NS003 taking effect (#38)
* Incorporate clarifications to: - Workstation definition - 1.2.2 - 2.2.1.2 - 2.2.2 - 2.2.5 * Incorporate community feedback * Add Fido2 specification * Latest iteration after subgroup meeting 2024-09-11 * Final (hopefully) tweaks to the language for NS005 * Last amend to clear up OCSP and CRL in 1.2.2 * Reference 1.7 to give more time for adoption * Update build-draft-docs.yml --------- Co-authored-by: Clint Wilson <[email protected]>
1 parent 6bc30f7 commit 6bf3a2f

File tree

2 files changed

+15
-28
lines changed

2 files changed

+15
-28
lines changed

.github/workflows/build-draft-docs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ jobs:
3333
${{ steps.build_doc.outputs.pdf_file }}
3434
${{ steps.build_doc.outputs.docx_file }}
3535
${{ steps.build_doc.outputs.pdf_redline_file }}
36-
if-no-files-found: 'error'
36+
if-no-files-found: 'error'

docs/NSR.md

Lines changed: 14 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Network and Certificate System Security Requirements
3-
subtitle: Version 2.0
3+
subtitle: Version 2.2
44
author:
55
- CA/Browser Forum
6-
date: 05 June, 2024
6+
date: 27 September, 2024
77
copyright: |
88
Copyright 2024 CA/Browser Forum
99
@@ -103,6 +103,7 @@ The following are outcomes that this document seeks to achieve:
103103
1. something the user knows (knowledge factor);
104104
2. something the user has (possession factor); and
105105
3. something the user is (inherence factor).
106+
106107
Each factor is independent of the other(s).
107108

108109
**Multi-Party Control**: An access control mechanism which requires two or more separate, authorized users to successfully authenticate with their own unique credentials prior to access being granted.
@@ -172,14 +173,11 @@ Each factor is independent of the other(s).
172173

173174
**Vulnerability Scan**: A process that uses manual or automated tools to probe internal and external systems to check and report on the status of operating systems, services, and devices exposed to the network and the presence of vulnerabilities listed in the NVD, OWASP Top Ten, or SANS Top 25.
174175

175-
**Workstation**: A device, such as a phone, tablet, or desktop or laptop computer, which is:
176-
177-
1. connected to the same network as CA Infrastructure and/or Network Equipment; and
178-
2. capable of accessing CA Infrastructure and/or Network Equipment.
176+
**Workstation**: A device, such as a phone, tablet, or desktop or laptop computer, which is capable of accessing CA Infrastructure and/or Network Equipment with elevated privileges compared to any given point on the general internet.
179177

180178
## Requirements
181179

182-
Prior to 2024-11-12, the CA SHALL adhere to these Requirements or Version 1.7 of the Network and Certificate System Security Requirements. Effective 2024-11-12, the CA SHALL adhere to these Requirements.
180+
Prior to 2025-03-12, the CA SHALL adhere to these Requirements or Version 1.7 of the Network and Certificate System Security Requirements. Effective 2025-03-12, the CA SHALL adhere to these Requirements.
183181

184182
### 1. CA Infrastructure and Network Equipment Configuration
185183

@@ -220,10 +218,7 @@ CA Infrastructure MUST be in a Physically Secure Environment.
220218

221219
##### 1.2.2
222220

223-
CA Infrastructure and Network Equipment MUST be implemented and configured to authenticate and encrypt connections:
224-
225-
1. between CA Infrastructure components; and
226-
2. between CA Infrastructure and non-CA Infrastructure.
221+
Connections to and within the CA Infrastructure MUST be authenticated and encrypted except OCSP and CRL.
227222

228223
CA Infrastructure and Network Equipment MUST be implemented and configured in a manner that minimizes unnecessary active components and capabilities such that:
229224

@@ -301,7 +296,9 @@ The CA MUST ensure personnel assigned to Trusted Roles that are authorized to ac
301296

302297
###### 2.2.1.2
303298

304-
The CA MUST NOT allow group accounts or shared role credentials to authenticate to or access CA Infrastructure and/or Network Equipment.
299+
The CA SHOULD NOT allow group accounts or shared role credentials to authenticate to or access CA Infrastructure and/or Network Equipment. If group accounts or shared role credentials are used, the CA MUST be able to attribute each use to
300+
* an approved activity; and
301+
* an individual user or service account.
305302

306303
###### 2.2.1.3
307304

@@ -321,11 +318,7 @@ The CA MUST ensure security measures are implemented that minimize the susceptib
321318

322319
##### 2.2.2
323320

324-
The CA SHOULD ensure Workstations are configured in a manner that prevents continued access to the Workstation after a set period of inactivity, for example by automatically logging off active users. The allowed and configured duration of inactivity MUST be selected based on the CA's assessment of associated risks.
325-
326-
The CA MAY allow a Workstation to remain active and unattended if the Workstation is otherwise secured and running administrative tasks that would be interrupted by an inactivity time‐out or system lock.
327-
328-
The CA MUST ensure personnel assigned to Trusted Roles log out of or lock their Workstation(s) when not in active use.
321+
The CA MUST ensure Workstations are configured in a manner that prevents continued access to the Workstation after a set period of inactivity, for example by automatically logging off active users. The allowed and configured duration of inactivity MUST be selected based on the CA's assessment of associated risks.
329322

330323
##### 2.2.3
331324

@@ -334,24 +327,18 @@ The CA MUST enforce the use of Multi-Factor Authentication for:
334327
1. accounts on CA Infrastructure; and
335328
2. access to CA Infrastructure.
336329

337-
Authentication based on the possession of a certificate can be used as part of Multi-factor Authentication only if the associated Private Key is stored in a key storage device certified as:
338-
339-
* meeting at least FIPS 140-2 or 140-3, level 2 overall or level 3 physical; or
340-
* validated against a Common Criteria Protection Profile for Digital Signatures at EAL 4 augmented with AVA_VAN >=5 and ALC_FLR >= 2.
330+
Authentication based on the possession of a cryptographic key can be used as part of Multi-factor Authentication only if that key is stored in a key storage device that is designed to prevent extraction.
341331

342332
##### 2.2.4
343333

344334
The CA MUST enforce the use of Multi-Party Control for physical access to any Root CA System.
345335

346336
##### 2.2.5
347337

348-
The CA SHOULD ensure passwords used as authentication credentials for accounts on CA Infrastructure, Network Equipment, or Workstations are generated and managed in accordance with NIST 800-63B Appendix A.
349-
350-
The CA SHALL NOT require periodic password changes with a period less than two (2) years.
351-
352-
The CA MUST ensure passwords used as authentication credentials for accounts on CA Infrastructure have a minimum of twelve (12) characters.
338+
The CA SHOULD ensure passwords used as authentication credentials for accounts on CA Infrastructure, Network Equipment, or Workstations are generated and managed in accordance with NIST 800-63B Revision 3 Appendix A. Access to shared credentials MUST:
353339

354-
The CA MUST ensure passwords used as authentication credentials for accounts on Network Equipment or Workstations have a minimum of eight (8) characters.
340+
* be limited to personnel based on the Principle of Least Privilege; and
341+
* comply with section 2.2.1.2.
355342

356343
##### 2.2.6
357344

0 commit comments

Comments
 (0)