SUMMARY OF UPDATES - CPS v 4.0

SUMMARY OF UPDATES - CPS v 4.0 (Amendment from CPS v.3.2)
Main Clause
Sub Clause
CPS v3.2
CPS v4.0
Reason
Important Notice
N/A
This CPS shall not be reproduced, whether in full or in
part, in any form whatsoever or be stored in any
reproducible form whether electronic or otherwise without
the prior consent of DIGICERT. This consent must be
obtained by contacting:
Digicert grants permission to reproduce the DIGICERT
CPS provided that (i) the copyright notice on the first
page of this CPS is retained on any copies of the
DIGICERT CPS, and (ii) the DIGICERT CPS is
reproduced fully and accurately. DIGICERT retains all
rights, title, and interest (including all intellectual
property rights), in, to and under the DIGICERT CPS.
CPS is a public
document which is
accessible via
Digicert’s website.
This CPS can be obtained:
in electronic form via DIGICERT’s website
http://www.digicert.com.my under the Repository
Section.
Change of URL
location in Digicert’s
website.
DIGICERT Sdn Bhd (457608-K)
No. 3-20 & 3-22, Jalan Jalil Perkasa 14, Aked Esplanad,
Bukit Jalil 57000 Kuala Lumpur, Malaysia
Tel: +603 8992 8800
Fax: +603 8992 8810
Email:
[email protected]
Clause 1.0 Preface
Clause 1.4
Publication and
Notification
This CPS can be obtained:
in electronic form via DIGICERT’s Internet servers at
http://www.digicert.com.my
To maintain integrity of this document, the web-based
version of the CPS must be viewed using SSL-enabled
browsers, e.g. Netscape Navigator 4.05 and above, or
Microsoft Internet Explorer 4.73 and above.
in electronic form via email from [email protected]
To maintain integrity of this document, the web-based
version of the CPS must be viewed using SSL-enabled
browsers, e.g. Mozilla Firefox version 3.0 and above, or
Microsoft Internet Explorer 7 and above.
in electronic form via email from [email protected]
Clause 1.0 Preface
Clause 1.5
Amendment of CPS
DIGICERT reserves the right to amend this CPS at any
time (prospectively and not retroactively). Amendments to
the CPS will be made available either as an amended
version of the CPS or retrospectively can be posted in the
Notices section of DIGICERT’s web site at the following
URL http://www.digicert.com.my/CPS/updates.
DIGICERT reserves the right to amend this CPS at any
time (prospectively and not retroactively). Amendments
to the CPS will be made available either as an amended
version of the CPS or retrospectively can be posted in
the Notices section of DIGICERT’s web site at the
following URL http://www.digicert.com.my under the
Repository Section.
Change of URL
location in Digicert’s
website.
Clause 1.6 CPS
Approval Procedures
This CPS and any subsequent changes are approved by
the Director of DIGICERT.
This CPS and any subsequent changes are approved by
the top management of DIGICERT.
CPS has been
reclassified as a
procedure/guideline
instead of policy, so
the approval is at
Digicert level only.
Clause 2.0
DIGICERT
Certification
Infrastructure
Clause 2.1 Trust
Infrastructure
Clause 2.0
DIGICERT
Certification
Infrastructure
Clause 2.1 Trust
Infrastructure
Clause 2.0
DIGICERT
Certification
Infrastructure
Clause 2.1 Trust
Infrastructure
To reflect the actual
scenario / category.
Figure 1
Updated info.
Figure 2
DIGICERT acts as the main naming authority in the PKI
structure. The naming convention for all subjects of
certificates registered through RAs will be determined by
DIGICERT. The naming convention for Enterprise CA will
be determined by DIGICERT on request from the
respective Enterprise CA.
DIGICERT acts as the main naming authority in the PKI
structure. The naming convention for all subjects of
certificates registered through RAs will be determined by
DIGICERT. The naming convention for Sub CA will be
determined by DIGICERT on request from the
respective Sub CA.
Updated Info
Clause 2.0
DIGICERT
Certification
Infrastructure
Clause 2.1 Trust
Infrastructure
Enterprise CA
Sub CA
In a distributed PKI model, organisations may wish to
become the issuer of end-entity certificates. An
Enterprise CA shall be the party who accepts
applications, verifies, issues and revoke end-entity client
certificates, subject to the agreement between Digicert
and the party being the Enterprise CA.
A Sub CA shall be the party who accepts applications,
verifies, and revoke end-entity client certificates, subject
to the agreement between Digicert and the party being
the Sub CA.
Updated Info
Sub CA has the authority to act as its own RA.
Enterprise CA has the authority to act as its own RA.
Clause 2.0
DIGICERT
Certification
Infrastructure
Clause 2.0
DIGICERT
Certification
Infrastructure
2.2.2 Class 2
Certificates
(Individuals)
2.3 Certificate Profile
Assurance: The subscriber is not a falsely created person
insofar as the records of the subscriber’s identity are
maintained by reliable and independent third parties. RAs
and enterprise CA provide that the subscriber is as
portrayed by the information provided by government
agencies (i.e. National Registration Department,
Immigration Department etc).
Assurance: The subscriber is not a falsely created
person insofar as the records of the subscriber’s identity
are maintained by reliable and independent third parties.
RAs and Sub CA provide that the subscriber is as
portrayed by the information provided by government
agencies (i.e. National Registration Department,
Immigration Department etc).
Validation: The reliability of the information is determined
at the sole discretion of the CA, RAs or Enterprise CA or
database owner.
Validation: The reliability of the information is
determined at the sole discretion of the CA, RAs or Sub
CA or database owner.
Certificate serial number : 12345678
Certificate serial number : Unique Value per Issued
Certificate
Updated Info
Updated Info
Clause 2.0
DIGICERT
Certification
Infrastructure
2.3.2 Certificate
Extensions
The ‘Value’ field holds any necessary data that is
appended to the certificate.
As described previously, the IETF RFC 5280 X.509
defines a number of extensions. These extensions can be
categorised into the following four groups:
Key Information Extensions
These extensions define the usage of a public key pair
and certificate.
Policy Information Extensions
These extensions define a means for the CA to specify
the method of interpretation and the use of the certificate.
There are 2 extensions in this group:
•Certificate policy extension (see CPS Part 2.3.6).
•Policy mapping extension serves a similar purpose to the
certificate policies extension. However, it applies only to
cross certificates. This field allows an application to
search and establish a set of consistent policies across
multiple CAs.
User and CA Attribute Extensions
These extensions provide a means of specifying
additional information regarding the subscriber and the
CA that issued the certificate.
Certification Path Extensions
These extensions are used in cross-certified
environments e.g. where two CAs cross-certify each
other. They allow CAs to limit third-party trust in such an
environment. This group can be subdivided into:
•Basic constraint extension specifies whether the subject
of the certificate shall act as a subscriber only or as both
a subscriber and a CA.
•Name constraints extension
•Policy constraints extension
A number of X.509 version 3 certificate extensions are
included in certificates issued by DIGICERT. These are
outlined in CPS Part 2.3.2.1. The X.509 version 3
certificate extensions, which are never present in
certificates issued by DIGICERT, are outlined in CPS Part
2.3.2.2.
Deleted
This part is not
required to be
inserted in the CPS
as per the Webtrust
Trust Principle.
Clause 2.0
DIGICERT
Certification
Infrastructure
2.3.2.1 Supported
Extensions
The following certificate extensions are used in
DIGICERT PKI:
Extension
Criticality Optional Notes
AuthorityKeyIdentifier
No
No
•
contains a 20 byte hash of the
subjectPublicKeyinfo in the CA certificate
•
only element [0] AuthorityKeyIdentifier is filled.
SubjectKeyIdentifier Yes
No
•contains a 20
byte hash of the subjectPublicKeyInfo in the CA certificate
KeyUsage
Yes
No
•elements [5]
keyCertSign and [6] cRLSign are set for CA certificate
PrivateKeyUsagePeriod
No
No
•notafter is always used
•notbefore is always used
SubjectAltName
No
Yes
•GeneralName
– choices [0], [3] and [5] are not implemented.
BasicConstraints
Yes
No
•only the CA
Boolean is used
CertificatePolicies Yes
No
•only
policyIdentifier element is supported with up to 10 OlDs
•policyQualifiers contains URL indicating the location of
DIGICERT CPS
CRLDistributionPoints
No
No
•only
1 distribution point name is included in each certificate
•only element [0] (distribution point) is used and
includes the full DN
Deleted
This part is not
required to be
inserted in the CPS
as per the Webtrust
Trust Principle.
Clause 2.0
DIGICERT
Certification
Infrastructure
2.3.2.2 Unsupported
Extensions
The following X.509 version 3 certificate extensions are
optionally used whenever applicable in this PKI:
Deleted
This part is not
required to be
inserted in the CPS
as per the Webtrust
Trust Principle.






extended key usage;
policy mappings;
name constraints;
policy constraints;
issuer alternative name; and
subject directory attributes.
Clause 2.0
DIGICERT
Certification
Infrastructure
2.3.3 Algorithm Object
Identifiers
RSA-with-MD5
Clause 2.3
Certificate Profile
2.3.5 Processing
Semantics for the
Critical Certificate
Object Identifier
Extension
3.0 DIGICERT
Operational
Requirements
1 2 840 113549 1 1 4
Deleted
Updated Info
Processing Semantics for the Critical Certificate Policy
Extension
Processing Semantics for the Critical Certificate Object
Identifier Extension
CPS has been
reclassified as a
procedure/guideline
instead of policy, so
the approval is at
Digicert level only.
3.1.1 Key Generation
and Protection
Class 2 (Enterprise CA)
generates key pair
Class 2 (Sub CA)
Updated Info
3.0 DIGICERT
Operational
Requirements
3.1.2 Certificate
Application
Class 2 (Digisign ID Basic/Enhanced)
Class 2 (Digisign ID Basic/Enhanced)
For Enterprise CA, requests shall have to come from the
organisation assuming the role of Enterprise CA itself,
subject to prior arrangement between DIGICERT and the
Enterprise CA.
For Sub CA, requests shall have to come from the
organisation assuming the role of Sub CA itself, subject
to prior arrangement between DIGICERT and the Sub
CA.
3.0 DIGICERT
Operational
Requirements
3.1.2 Certificate
Application
The RP of DIGICERT or its RA or the appointed
Authorised Personnel of an Enterprise CA is principally
responsible for ensuring that the required information is
obtained from the subscriber prior to approving the
application for a certificate.
The RP of DIGICERT or its RA or the appointed
Authorised Personnel of aSub CA is principally
responsible for ensuring that the required information is
obtained from the subscriber prior to approving the
application for a certificate.
Updated Info
3.0 DIGICERT
Operational
Requirements
3.1.2 Certificate
Application
Class 2 (Enterprise CA)
Class 2 (Sub CA)
Updated Info
Similar to Individual Class 2 certificates mentioned above.
Any changes in the requirements shall be reflected in the
agreement between Digicert and Enterprise CA.
Similar to Individual Class 2 certificates mentioned
above. Any changes in the requirements shall be
reflected in the agreement between Digicert and Sub
CA.
CA or Enterprise CA
CA or Sub CA generates key pair
Updated Info
3.0 DIGICERT
Operational
Requirements
3.1.3 Validation of
Certificate
Applications
The word “Floppy Disk”
Replaced with “USB token and other applicable media”
Change in technology
3.0 DIGICERT
Operational
Requirements
3.2.1 Certificate
Acceptance
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
3.2.3 Time of
Certificate Issuance
3.0 DIGICERT
Operational
Requirements
3.4 Certificate
Revocation and
Suspension
Suspension or Revocation of certificates can occur due to
the reasons specified in CPS Part 3.4.1 and CPS Part
3.4.2.
Suspension or Revocation of certificates can occur due
to the reasons specified in CPS Part 3.4.1 and CPS Part
3.4.2.
In the event that DIGICERT believes or has reason to
believe, due to reliable evidence or while acting in good
faith, that a certificate should be suspended or revoked,
DIGICERT will take all necessary to do so even if this is
without the consent of the subscriber. In most instances,
the suspension or revocation occurs when there is a
security breach of the private key or the certificate will
materially affect the truth of the information reflected in
the certificate and thus possibly mislead a person relying
on that information.
In the event that DIGICERT believes or has reason to
believe, due to reliable evidence or while acting in good
faith, that a certificate should be revoked, DIGICERT will
take all necessary to do so even if this is without the
consent of the subscriber. In most instances, the
revocation occurs when there is a security breach of the
private key or the certificate will materially affect the
truth of the information reflected in the certificate and
thus possibly mislead a person relying on that
information.
In the event that the subscriber requested for a revocation
or suspension, DIGICERT will take all necessary
precautions to verify the identity of the subscriber.
Suspension and Revocation will not proceed without the
verification that the purported party is indeed the
subscriber.
In the event that the subscriber requested for a
revocation, DIGICERT will take all necessary
precautions to verify the identity of the subscriber.
Revocation will not proceed without the verification that
the purported party is indeed the subscriber.
Upon revocation of the certificate, DIGICERT shall within
24 hours indicate that it is revoked by updating the CRL.
The CRL will be published in at least one recognised
Repository at an interval specified in CPS Part 3.4.3.
Subscribers with revoked certificates are allowed to
reapply for a new certificate at the discretion of
DIGICERT. Under no circumstances can the revoked
certificate be reinstated to its original state after
revocation.
Updated Info
Upon revocation of the certificate, DIGICERT shall
within 24 hours indicate that it is revoked by updating
the CRL. The CRL will be published in at least one
recognised Repository at an interval specified in CPS
Part 3.4.3. Subscribers with revoked certificates are
allowed to reapply for a new certificate at the discretion
of DIGICERT. Under no circumstances can the revoked
certificate be reinstated to its original state after
revocation.
DIGICERT does not offer suspension services of
certificates.
3.0 DIGICERT
Operational
Requirements
3.4.2 Revocation by
Subscriber
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
3.0 DIGICERT
Operational
Requirements
(new addition)
(new addition)
3.4.5 Circumstances for Suspension
DIGICERT does not suspend certificates.
3.4.6 Who Can Request Suspension
DIGICERT does not suspend certificates.
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
3.4.7 Procedure for Suspension Request
DIGICERT does not suspend certificates.
3.4.8 Limits on Suspension Period
DIGICERT does not suspend certificates.
3.0 DIGICERT
Operational
Requirements
3.5.1 Notice of
Expiration
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
3.0 DIGICERT
Operational
Requirements
3.5.3 Renewal /
Rekey of Certificate
Header: Renewal of Certificate
Header: Renewal / Rekey of Certificate
3.5.3 Renewal of Certificate
3.5.3 Renewal / Rekey of Certificate
The certificate renewal process is similar to an application
for a new certificate unless agreed upon the relying
parties between the Certification Authority and the
Enterprise CA subscriber. However, for all classes of
certificates with the exception of Class 1, the subscriber
only needs to provide information that has changed since
the expiration date of the certificate. Class 1 certificates
can only be renewed by re-applying for a new certificate
using the same procedure as described in CPS Part 3.1.
The certificate renewal process is similar to an
application for a new certificate unless agreed upon the
relying parties between the Certification Authority and
the Sub CA subscriber. The certificate renewal is also
technically defined as “rekey” and often used
interchangeably. However, for all classes of certificates
with the exception of Class 1, the subscriber only needs
to provide information that has changed since the
expiration date of the certificate. Class 1 certificates can
only be renewed by re-applying for a new certificate
using the same procedure as described in CPS Part 3.1.
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
3.0 DIGICERT
Operational
Requirements
3.8 Compromise and
Disaster Recovery
DIGICERT has a comprehensive disaster recovery plan
to enable complete recovery of all CA systems in the
event of a disaster.
3.8.1 Compromise CA Key
If a CA s private key is compromised or suspected to be
compromised, the CA shall perform the following
procedures:
•
•
•
•
Inform regulator
inform subscribers, cross-certifying CAs and
relying parties
terminate the certificates and CRLs
distribution service for certificates/CRLs
issued using the compromised private key
request the revocation of the CA's certificate
If a RA s private key is compromised or suspected to be
compromised, the RA SHALL inform the CA and request
the revocation of the RA's certificate
If subscriber’s private key is compromised or suspected
to be compromised, the entity SHALL inform the relying
parties and request the revocation of the entity's
certificate. Subscriber may request to have new key.
3.8.2 Disaster Recovery
DIGICERT has a comprehensive disaster recovery plan
to enable complete recovery of all CA systems in the
event of a disaster.
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
3.0 DIGICERT
Operational
Requirements
(new addition)
(new addition)
3.9 CA / RA Termination
In the event that DIGICERT ceases operation, the
Controller shall appoint another licensed certification
authority to take over the certificates issued by the
certification authority whose licence has been revoked
or surrendered or has expired and such certificates
shall, to the extent that they comply with the
requirements of the appointed licensed certification
authority, be deemed to have been issued by that
licensed certification authority.
DIGICERT shall develop a termination plan accordingly
to minimize disruption to Customers, Subscribers, and
Relying Parties.
Further information on RA termination is detailed out in
the RA Appointment Guideline which is available under
the Repository Section on DIGICERT’s website
www.digicert.com.my.
3.10 Key Changeover
DIGICERT’s key pairs will be retired from service at the
end of their respective lifetimes as defined in Section
4.4.1.10. New Certification Authority key pairs will be
created as required to support the continuation of
Digicert Certification Authority Services. Digicert will
continue to publish CRLs signed with the original key
pair until all certificates issued using that original key
pair have expired. The Certification Authority key
changeover process will be performed such that it
causes minimal disruption to Subscribers and Relying
Parties.
3.11 Certificate Modification
Certificate modification refers to the application for the
issuance of a new certificate due to changes in the
information in an existing certificate (other than the
subscriber’s public key). Certificate modification is
considered a Certificate Application in terms of Section
3.1.
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
4.0 Security Controls
4.4.1.1 Key Pair
Generation
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
4.0 Security Controls
4.4.1.8 Key Usage
Purposes (as per
X.509 v3 key usage
field)
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
4.0 Security Controls
4.4.1.10 Usage
Periods for the Public
and Private Keys
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
4.0 Security Controls
(new addition)
(new addition)
4.8 Life Cycle Security Controls
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
4.8.1 System Development Controls
Applications are developed and implemented in line with
DIGICERT systems development and change
management standards. DIGICERT provides client
software to its Managed PKI for performing RA and
certain CA functions. Such software is developed in
accordance with DIGICERT system development
standards.
4.8.2 Security Management Controls
DIGICERT has mechanisms and/or policies in place to
control and monitor the configuration of its CA systems.
Upon installation and periodically thereafter, DIGICERT
validates the integrity of its CA systems.
4.8.3 Life Cycle Security Ratings
No stipulation.
4.0 Security Controls
(new addition)
(new addition)
4.9 Network Security Controls
DIGICERT performs all its CA and RA functions using
secured networks in compliance with Audit
Requirements Guide to prevent unauthorized access
and malicious activity. DIGICERT protects its
communications of sensitive information through the use
of encryption and digital signatures
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle.
4.10 Security Considerations
DIGICERT applies high level security standards to
ensure the trustworthiness of the CA system.
5.0 General
Provisions
5.1.1 CA Obligations
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
5.0 General
Provisions
5.1.3 Relying Party
Obligations
restrict reliance on the certificates issued by DIGICERT to
the appropriate usage for those certificates in accordance
with this CPS and with the certificate policy under which
the certificate was issued;
restrict reliance on the certificates issued by DIGICERT
to the appropriate usage for those certificates in
accordance with this CPS and with the certificate
procedure under which the certificate was issued;
CPS has been
reclassified as a
procedure/guideline
instead of policy, so
the approval is at
Digicert level only.
5.0 General
Provisions
5.2.1 CA Liability
The word “Enterprise CA“
Replaced with the word “Sub CA”
Updated Info
5.0 General
Provisions
5.14 Exceptions
With regards to certification issued to Jabatan Imigresen
Malaysia (JIM) under the Root CA of Malaysia Country
Signer and prescribed to ICAO 9303 document (Part 1
Vol 2), some exceptions are given as below:
Deleted
This part is not
required to be
inserted in the CPS
as per the Webtrust
Trust Principle.
5.14.1 Key length is at 3072 bits.
5.14.2 The Malaysia Country Signer key pairs are
generated as and when necessary through proper
documented procedures on Hardware Security Module
(HSM).
5.14.3 The requirement for the Document Signer
Certificates issuance is bound by the agreed procedure
between DIGICERT and Jabatan Imigresen Malaysia
(please see Appendices 6.3).
5.14.4 Algorithm used for subscriber (Document Signer
Certificate) is SHA256 with the corresponding identifier.
5.0 General
Provisions
5.8.1 Types of
Information to be Kept
Confidential
DIGICERT, other than that which is explicitly published as
part of a certificate, CRL, ARL, certificate policy or this
CPS is considered confidential and shall not be released
unless required by law (see CPS Part 5.8.4).
DIGICERT, other than that which is explicitly published
as part of a certificate, CRL, ARL, certificate Object
Identifier or this CPS is considered confidential and shall
not be released unless required by law (see CPS Part
5.8.4).
CPS has been
reclassified as a
procedure/guideline
instead of policy, so
the approval is at
Digicert level only.
5.0 General
Provisions
5.8.2 Types of
Information Not
Considered
Confidential
Information included in certificates, CRLs and issued by
DIGICERT and DIGICERT’s certificate policies are not
considered confidential.
Information included in certificates, CRLs and issued by
DIGICERT and DIGICERT’s certificate structure are not
considered confidential.
Information in this CPS itself is not considered
confidential. However DIGICERT policy requires that it
only be made available to subscribers of its certification
services, including those in cross certified CA domains.
Information in this CPS itself is not considered
confidential. However DIGICERT requires that it only be
made available to subscribers of its certification
services, including those in cross certified CA domains.
CPS has been
reclassified as a
procedure/guideline
instead of policy, so
the approval is at
Digicert level only.
6.0 Appendices
6.1 Glossary of Terms
(new addition)
Sub-CA: Sub-CAs are allowed to be created for
different organizations and agencies, for ease of
operations and management. However, Sub-CAs shall
be created purely in a technical context, to be part of the
DIGICERT’s technical infrastructure. The keys created
for Sub-CA shall be located only on DIGICERT’s
technical infrastructure. The certificate issuing authority
for the Sub-CA shall remain only with DIGICERT.
This part is required
to be inserted in the
CPS as per the
Webtrust Trust
Principle
6.0 Appendices
6.2 List of Certificates
for Enterprise CA
List of certificates for Enterprise CA
1.
Digisign iVest CA
2.
Digisign iVest CA Enhanced
3.
MyKad Online
4.
CIMB Investment Bank Bhd Enterprise CA
5.
Bumiputra Commerce Bank Bhd Enterprise CA
6.
Bank Negara Malaysia Sub CA
7.
Alliance Bank Sub CA
List of Certificates for Sub CA
1.
Digisign iVest CA
2.
Digisign iVest CA Enhanced
3.
CIMB Investment Bank Bhd Enterprise CA
4.
Bank Negara Malaysia Sub CA
Updated info
6.0 Appendices
6.3 Document Signer
Certificates Issuance Process Flow
Deleted
This part is not
required to be
inserted in the CPS
as per the Webtrust
Trust Principle