Cover Page |
---|
X.509 Certification Practice Statement for the Class 1 Server Certification Authority |
X.509 Certification Practice Statement for the Class 1 Server Certification Authority |
RECORD OF CHANGES |
---|
|
Add all changes for Migration Project here! |
1.1.1 Certificate Policy (CP) |
---|
The VTCA Root CA has digitally signed a copy of the VTCA CP, using SHA-1 with RSA encryption and its primary PKC signing key. The digitally signed copy of the C1SCA CPS is available online at http://www.pki.vt.edu/vtc1sca/cps/. |
The C1SCA has a copy of the VTCA CP and CPS which has been digitally signed by the chairman of the VTPKI-PMA who has the primary responsibility for approving policies/standards of the Virginia Tech Public Key Infrastructure (PKI) and the related Certificate Authorities operating within it.
|
1.3 COMMUNITY AND APPLICABILITY |
---|
The primary community served by the C1SCA consists of those DPEs that provide online services to the Virginia Tech community. |
The primary community served by the C1SCA consists of those DPEs that provide online services to the Virginia Tech community. |
1.3.2 Registration Authorities |
---|
Information Resource Management is the Registration Authority for the C1SCA. |
Identity Management Services is the Registration Authority for the C1SCA. |
1.4 CONTACT DETAILS |
---|
Questions about interpretation of this CPS are directed in writing to Information Resource Management. Concerns about possible abuse of this CPS, are directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
Questions about interpretation of this CPS are directed in writing to Identity Management Services. Concerns about possible abuse of this CPS, are directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
2.1.3 Subscriber Obligations |
---|
In addition to the obligations stipulated in the VTCA CP a Subscriber MUST: |
In addition to the obligations stipulated in the VTCA CP a Subscriber MUST: |
2.4 INTERPRETATION AND ENFORCEMENT |
---|
Interpretation of this CPS is the responsibility of the PMA and Information Resource Management. |
Interpretation of this CPS is the responsibility of the PMA and Identity Management Services. |
3.1 INITIAL REGISTRATION |
---|
Interpretation of this CPS is the responsibility of the PMA and Information Resource Management. |
Interpretation of this CPS is the responsibility of the PMA and Identity Management Services. |
3.1.2 Need for Names to be Meaningful |
---|
The CN component of a Subject name in a PKC issued by the C1SCA is directly representative of the digital processing entity or natural person to which the PKC is issued. |
The CN component of a Subject name in a PKC issued by the C1SCA is directly representative of the digital processing entity to which the PKC is issued. |
3.1.3 Rules for Interpreting Various Name Forms |
The Subject names for a digital processing entity PKC are issued using the following format: |
The Subject names for a digital processing entity PKC are issued using the following format: |
3.1.4 Uniqueness of Names |
---|
The Subject name in a PKC refers to a unique and identifiable digital processing entity or person. Including the serial number that is assigned by the CA ensures the uniqueness of the Subject name. A unique Subject name may not be reused. |
The Subject name in a PKC refers to a unique and identifiable digital processing entity. The accuracy of the DN details is checked by the registration authority using identification information provided during the enrollment process. A subscriber's DN must be unique and must not be assigned to different subscribers. Only when a subscriber possesses a number of certificates with different key uses can a DN appear several times, although the respective serial numbers of the issuing CA always remain unique. |
3.1.9 Authentication of Individual Identity |
---|
IRM will verify that the person listed as department head is the head of department, as claimed. IRM confirms any designations with the department head. Once signatures are on file, IRM will verify signatures associated with requests. |
IRM will verify that the person listed as department head is the head of department, as claimed. IMS confirms any designations with the department head. Once signatures are on file, IMS will verify signatures associated with requests. |
4.4 CERTIFICATE SUSPENSION AND REVOCATION |
---|
The C1SCA revokes PKCs after receiving a valid revocation request. IRM initiates revocation when the departmental unit that has requested the certificate is no longer an identifiable university unit. |
The C1SCA revokes PKCs after receiving a valid revocation request. IMS initiates revocation when the departmental unit that has requested the certificate is no longer an identifiable university unit. |
4.4.2 Who Can Request Revocation of a Certificate |
---|
Certificate Revocation Requests are accepted from: |
Certificate Revocation Requests are accepted from: |
4.4.3 Procedure for Revocation Request |
---|
A Certificate Revocation Request (CRR) is initiated through: |
A Certificate Revocation Request is initiated through:
|
Online Revocation/Status Checking (OCSP) is not available.
4.4.11 Online Revocation / Status Checking Availability |
---|
Online Revocation/Status Checking (OCSP) is not available. |
Online Revocation/Status Checking (OCSP) is available. |
4.5.2 Frequency of Processing Data |
---|
The audit logs are consolidated and reviewed on a regular basis by IRM. |
The audit logs are consolidated and reviewed on a regular basis by IMS. |
4.5.4 Protection of Security Audit Data |
---|
Access to audit logs is controlled by IRM, and access is restricted to authorized employees only. |
Access to audit logs is controlled by IMS, and access is restricted to authorized employees only. |
4.5.5 Security Audit Data Backup Procedures |
---|
The C1SCA audit log is backed up on the same schedule as the rest of the data on the C1SCA host using a backup utility (vtBackup) which was developed at Virginia Tech. Backup audit logs of the C1SCA are protected against unauthorized viewing, modification, or deletion by encrypting the backup and storing it in a separate secure physical location offsite from the C1SCA host. |
The C1SCA audit log is backed up on the same schedule as the rest of the data on VTCA servers using VT Information Systems and Computing network backup service providing:
|
4.6.3 Protection of Archive |
---|
Archived records are protected against unauthorized viewing, modification, and deletion by using cryptographic protection and offsite storage in a physically secure and trustworthy location. The cryptographic protection is implemented using a 512 bit DES3 symmetric key that is unique to each backup instance. The DES3 symmetric key is then encrypted using 4096 bit RSA public key encryption. |
Archived records are protected against unauthorized viewing, modification, and deletion by using offsite storage in a physically secure and trustworthy location. The offsite backup location provides the following key features:
|
4.6.4 Archive Backup Procedures |
---|
Daily backups created with vtBackup serve as archives for the C1SCA CA application. The backups created with Legato Networker serve as archives for the C1SCA RA application. |
Daily backups created using the network backup service provided by Information Systems and Computing serve as archives for the C1SCA CA application. |
4.6.7 Procedures to Obtain and Verify Archive Information |
---|
On request by the auditors, IRM will authorize Operations Center personnel to retrieve media containing archived information from the offsite storage location. To view the CA archive, it must be decrypted. The private key needed to decrypt the symmetric key used to encrypt the backups is stored on removable media labeled "Backup Encryption RSA Key Pair" at the offsite storage location. A duplicate copy of the private key is stored on a BIO drive kept in a locked file cabinet in the eProvisioning office area. |
On request by the auditors, IMS will authorize Operations Center personnel to retrieve media containing archived information from the offsite storage location. |
5.1.5 Media Storage |
---|
The encrypted backup media of the C1SCA are stored in an offsite physically secure and trustworthy location. |
The backup media of the C1SCA are stored in an offsite physically secure and trustworthy location. |
5.1.7 Offsite Backup |
---|
In the event of a system failure, there are sufficient backups that can be used to restore the C1SCA system. These backups are made on a daily schedule using the vtBackup utility and maintained for a period of 90 days. The daily backups are incremental with the exception of full backups which are done on the first day of each month, The most recent 14 daily backups are stored at a secure offsite location which can only be accessed by authorized personnel. |
In the event of a system failure there are sufficient backups that can be used to restore the C1SCA system. Full monthly, weekly differential, and daily incremental backups are created durinng normal daily scheduled backups by the Information Systems and Computing network backup service. The backup media of the C1SCA are stored in an offsite physically secure and trustworthy location. |
5.2.1.1 Certification Authority Administrator |
---|
The Certification Authority Administrator (CAA) role is appointed by the Office of the Vice President for Information Technology. The CAE's responsibilities are: |
The Certification Authority Administrator (CAA) role is appointed by the Office of the Vice President forInformation Technology. Primarily, a CAA's responsibilities are: |
5.2.1.2 Registration Authority Administrator (RAA) |
---|
The Registration Authority Administrator (RAA) role is constituted by IRM. The RA's responsibilities are: |
The Registration Authority Administrator (RAA) role is constituted by IMS. The RAA's responsibilities are: |
7.1.2 Certificate Extensions |
---|
Standard extensions, when populated, are described in an appropriate Certificate Profile which is published at http://www.pki.vt.edu/vtc1sca/cps/.\\ PKCs issued from the C1SCA have the following values in their Key Usage field: |
Standard extensions, when populated, are described in Certificate Profiles published at:http://www.pki.vt.edu/vtc1sca/cps |
7.2.3 OCSP Services |
---|
OCSP is supported but not currently implemented. |
An OCSP (Online Certificate Status Protocol)responder service is available. |
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|
|
---|
|
|