DigiCert Certification Practices Statement v. 4.07 Oct-7-2014

DigiCert
CertificationPractices
Statement
DigiCert,Inc.
Version4.07
October7,2014
2600WestExecutiveParkway
Suite500
Lehi,UT84043
USA
Tel:1‐801‐877‐2100
Fax:1‐801‐705‐0481
www.digicert.com
TABLEOFCONTENTS
1. INTRODUCTION ................................................................................................................................... 1 1.1. Overview ...................................................................................................................................... 1 1.2. Document name and Identification............................................................................................... 1 1.3. PKI Participants ........................................................................................................................... 3 1.3.1. Certification Authorities ........................................................................................................... 3 1.3.2. Registration Authorities and Other Delegated Third Parties .................................................... 4 1.3.3. Subscribers ............................................................................................................................. 4 1.3.4. Relying Parties ........................................................................................................................ 4 1.3.5. Other Participants ................................................................................................................... 4 1.4. Certificate Usage ......................................................................................................................... 4 1.4.1. Appropriate Certificate Uses ................................................................................................... 5 1.4.2. Prohibited Certificate Uses ...................................................................................................... 6 1.5. Policy administration .................................................................................................................... 6 1.5.1. Organization Administering the Document .............................................................................. 6 1.5.2. Contact Person ....................................................................................................................... 6 1.5.3. Person Determining CPS Suitability for the Policy .................................................................. 7 1.5.4. CPS Approval Procedures ...................................................................................................... 7 1.6. Definitions and acronyms ............................................................................................................. 7 2. PUBLICATION AND REPOSITORY RESPONSIBILITIES .................................................................... 9 2.1. Repositories ................................................................................................................................. 9 2.2. Publication of certification information .......................................................................................... 9 2.3. Time or frequency of publication .................................................................................................. 9 2.4. Access controls on repositories ................................................................................................. 10 3. IDENTIFICATION AND AUTHENTICATION ....................................................................................... 10 3.1. Naming ...................................................................................................................................... 10 3.1.1. Types of Names .................................................................................................................... 10 3.1.2. Need for Names to be Meaningful......................................................................................... 11 3.1.3. Anonymity or Pseudonymity of Subscribers .......................................................................... 11 3.1.4. Rules for Interpreting Various Name Forms .......................................................................... 11 3.1.5. Uniqueness of Names ........................................................................................................... 11 3.1.6. Recognition, Authentication, and Role of Trademarks .......................................................... 11 3.2. Initial identity validation .............................................................................................................. 11 3.2.1. Method to Prove Possession of Private Key ......................................................................... 11 3.2.2. Authentication of Organization Identity .................................................................................. 11 3.2.3. Authentication of Individual Identity ....................................................................................... 13 3.2.4. Non-verified Subscriber Information ...................................................................................... 18 3.2.5. Validation of Authority ........................................................................................................... 18 3.3. Identification and authentication for re-key requests .................................................................. 19 3.3.1. Identification and Authentication for Routine Re-key............................................................. 19 3.3.2. Identification and Authentication for Re-key After Revocation............................................... 20 3.4. Identification and authentication for revocation request ............................................................. 20 4. CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS ....................................................... 20 4.1. Certificate Application ................................................................................................................ 20 4.1.1. Who Can Submit a Certificate Application ............................................................................ 20 4.1.2. Enrollment Process and Responsibilities .............................................................................. 20 4.2. Certificate application processing .............................................................................................. 21 4.2.1. Performing Identification and Authentication Functions ........................................................ 21 4.2.2. Approval or Rejection of Certificate Applications................................................................... 21 4.2.3. Time to Process Certificate Applications ............................................................................... 21 4.3. Certificate issuance.................................................................................................................... 22 4.3.1. CA Actions during Certificate Issuance ................................................................................. 22 4.3.2. Notification to Subscriber by the CA of Issuance of Certificate ............................................. 22 4.4. Certificate acceptance ............................................................................................................... 22 4.4.1. Conduct Constituting Certificate Acceptance ........................................................................ 22 4.4.2. Publication of the Certificate by the CA ................................................................................. 22 4.4.3. Notification of Certificate Issuance by the CA to Other Entities ............................................. 22 4.5. Key pair and certificate usage .................................................................................................... 22 4.5.1. Subscriber Private Key and Certificate Usage ...................................................................... 22 ii
4.5.2. Relying Party Public Key and Certificate Usage.................................................................... 22 4.6. Certificate renewal ..................................................................................................................... 23 4.6.1. Circumstance for Certificate Renewal ................................................................................... 23 4.6.2. Who May Request Renewal .................................................................................................. 23 4.6.3. Processing Certificate Renewal Requests ............................................................................ 23 4.6.4. Notification of New Certificate Issuance to Subscriber .......................................................... 23 4.6.5. Conduct Constituting Acceptance of a Renewal Certificate .................................................. 23 4.6.6. Publication of the Renewal Certificate by the CA .................................................................. 23 4.6.7. Notification of Certificate Issuance by the CA to Other Entities ............................................. 23 4.7. Certificate re-key ........................................................................................................................ 24 4.7.1. Circumstance for Certificate Rekey ....................................................................................... 24 4.7.2. Who May Request Certificate Rekey .................................................................................... 24 4.7.3. Processing Certificate Rekey Requests ................................................................................ 24 4.7.4. Notification of Certificate Rekey to Subscriber ...................................................................... 24 4.7.5. Conduct Constituting Acceptance of a Rekeyed Certificate .................................................. 24 4.7.6. Publication of the Issued Certificate by the CA ..................................................................... 24 4.7.7. Notification of Certificate Issuance by the CA to Other Entities ............................................. 24 4.8. Certificate modification ............................................................................................................... 24 4.8.1. Circumstances for Certificate Modification ............................................................................ 24 4.8.2. Who May Request Certificate Modification............................................................................ 24 4.8.3. Processing Certificate Modification Requests ....................................................................... 24 4.8.4. Notification of Certificate Modification to Subscriber ............................................................. 25 4.8.5. Conduct Constituting Acceptance of a Modified Certificate ................................................... 25 4.8.6. Publication of the Modified Certificate by the CA .................................................................. 25 4.8.7. Notification of Certificate Modification by the CA to Other Entities ........................................ 25 4.9. Certificate revocation and suspension ....................................................................................... 25 4.9.1. Circumstances for Revocation .............................................................................................. 25 4.9.2. Who Can Request Revocation .............................................................................................. 26 4.9.3. Procedure for Revocation Request ....................................................................................... 26 4.9.4. Revocation Request Grace Period ........................................................................................ 26 4.9.5. Time within which CA Must Process the Revocation Request .............................................. 26 4.9.6. Revocation Checking Requirement for Relying Parties......................................................... 27 4.9.7. CRL Issuance Frequency ...................................................................................................... 27 4.9.8. Maximum Latency for CRLs .................................................................................................. 27 4.9.9. On-line Revocation/Status Checking Availability ................................................................... 27 4.9.10. On-line Revocation Checking Requirements .................................................................... 27 4.9.11. Other Forms of Revocation Advertisements Available ..................................................... 27 4.9.12. Special Requirements Related to Key Compromise ......................................................... 27 4.9.13. Circumstances for Suspension ......................................................................................... 27 4.9.14. Who Can Request Suspension ........................................................................................ 27 4.9.15. Procedure for Suspension Request .................................................................................. 27 4.9.16. Limits on Suspension Period ............................................................................................ 27 4.10. Certificate status services .......................................................................................................... 28 4.10.1. Operational Characteristics .............................................................................................. 28 4.10.2. Service Availability ........................................................................................................... 28 4.10.3. Optional Features ............................................................................................................. 28 4.11. End of subscription .................................................................................................................... 28 4.12. Key escrow and recovery ........................................................................................................... 28 4.12.1. Key Escrow and Recovery Policy Practices ..................................................................... 28 4.12.2. Session Key Encapsulation and Recovery Policy and Practices ...................................... 29 5. FACILITY, MANAGEMENT, AND OPERATIONAL CONTROLS ........................................................ 29 5.1. Physical Controls ....................................................................................................................... 29 5.1.1. Site Location and Construction ............................................................................................. 29 5.1.2. Physical Access .................................................................................................................... 29 5.1.3. Power and Air Conditioning ................................................................................................... 30 5.1.4. Water Exposures................................................................................................................... 30 5.1.5. Fire Prevention and Protection .............................................................................................. 30 5.1.6. Media Storage ....................................................................................................................... 30 5.1.7. Waste Disposal ..................................................................................................................... 30 5.1.8. Off-site Backup...................................................................................................................... 30 5.1.9. Certificate Status Hosting, CMS and External RA Systems .................................................. 30 5.2. Procedural controls .................................................................................................................... 30 iii
5.2.1. Trusted Roles ........................................................................................................................ 30 5.2.2. Number of Persons Required per Task ................................................................................. 31 5.2.3. Identification and Authentication for each Role ..................................................................... 31 5.2.4. Roles Requiring Separation of Duties ................................................................................... 31 5.3. Personnel controls ..................................................................................................................... 31 5.3.1. Qualifications, Experience, and Clearance Requirements .................................................... 31 5.3.2. Background Check Procedures............................................................................................. 32 5.3.3. Training Requirements .......................................................................................................... 32 5.3.4. Retraining Frequency and Requirements .............................................................................. 32 5.3.5. Job Rotation Frequency and Sequence ................................................................................ 32 5.3.6. Sanctions for Unauthorized Actions ...................................................................................... 33 5.3.7. Independent Contractor Requirements ................................................................................. 33 5.3.8. Documentation Supplied to Personnel .................................................................................. 33 5.4. Audit logging procedures ........................................................................................................... 33 5.4.1. Types of Events Recorded .................................................................................................... 33 5.4.2. Frequency of Processing Log................................................................................................ 35 5.4.3. Retention Period for Audit Log .............................................................................................. 35 5.4.4. Protection of Audit Log .......................................................................................................... 35 5.4.5. Audit Log Backup Procedures ............................................................................................... 35 5.4.6. Audit Collection System (internal vs. external) ...................................................................... 36 5.4.7. Notification to Event-causing Subject .................................................................................... 36 5.4.8. Vulnerability Assessments .................................................................................................... 36 5.5. Records archival ........................................................................................................................ 36 5.5.1. Types of Records Archived ................................................................................................... 36 5.5.2. Retention Period for Archive ................................................................................................. 37 5.5.3. Protection of Archive ............................................................................................................. 37 5.5.4. Archive Backup Procedures .................................................................................................. 37 5.5.5. Requirements for Time-stamping of Records ........................................................................ 37 5.5.6. Archive Collection System (internal or external).................................................................... 37 5.5.7. Procedures to Obtain and Verify Archive Information ........................................................... 37 5.6. Key changeover ......................................................................................................................... 37 5.7. Compromise and disaster recovery ........................................................................................... 38 5.7.1. Incident and Compromise Handling Procedures ................................................................... 38 5.7.2. Computing Resources, Software, and/or Data Are Corrupted .............................................. 38 5.7.3. Entity Private Key Compromise Procedures ......................................................................... 38 5.7.4. Business Continuity Capabilities after a Disaster .................................................................. 38 5.8. CA or RA termination ................................................................................................................. 39 6. TECHNICAL SECURITY CONTROLS ................................................................................................ 39 6.1. Key pair generation and installation ........................................................................................... 39 6.1.1. Key Pair Generation .............................................................................................................. 39 6.1.2. Private Key Delivery to Subscriber ........................................................................................ 39 6.1.3. Public Key Delivery to Certificate Issuer ............................................................................... 40 6.1.4. CA Public Key Delivery to Relying Parties ............................................................................ 40 6.1.5. Key Sizes .............................................................................................................................. 40 6.1.6. Public Key Parameters Generation and Quality Checking .................................................... 41 6.1.7. Key Usage Purposes (as per X.509 v3 key usage field) ....................................................... 41 6.2. Private Key Protection and Cryptographic Module Engineering Controls .................................. 41 6.2.1. Cryptographic Module Standards and Controls..................................................................... 41 6.2.2. Private Key (n out of m) Multi-person Control ....................................................................... 42 6.2.3. Private Key Escrow ............................................................................................................... 42 6.2.4. Private Key Backup ............................................................................................................... 42 6.2.5. Private Key Archival .............................................................................................................. 43 6.2.6. Private Key Transfer into or from a Cryptographic Module ................................................... 43 6.2.7. Private Key Storage on Cryptographic Module ..................................................................... 43 6.2.8. Method of Activating Private Keys ......................................................................................... 43 6.2.9. Method of Deactivating Private Keys .................................................................................... 43 6.2.10. Method of Destroying Private Keys .................................................................................. 43 6.2.11. Cryptographic Module Rating ........................................................................................... 43 6.3. Other aspects of key pair management ..................................................................................... 44 6.3.1. Public Key Archival ............................................................................................................... 44 6.3.2. Certificate Operational Periods and Key Pair Usage Periods................................................ 44 6.4. Activation data ........................................................................................................................... 45 iv
6.4.1. Activation Data Generation and Installation .......................................................................... 45 6.4.2. Activation Data Protection ..................................................................................................... 45 6.4.3. Other Aspects of Activation Data .......................................................................................... 45 6.5. Computer security controls ........................................................................................................ 45 6.5.1. Specific Computer Security Technical Requirements ........................................................... 45 6.5.2. Computer Security Rating ..................................................................................................... 45 6.6. Life cycle technical controls ....................................................................................................... 45 6.6.1. System Development Controls .............................................................................................. 45 6.6.2. Security Management Controls ............................................................................................. 46 6.6.3. Life Cycle Security Controls .................................................................................................. 46 6.7. Network security controls ........................................................................................................... 46 6.8. Time-stamping ........................................................................................................................... 46 6.9. PIV-I Cards ................................................................................................................................ 47 7. CERTIFICATE, CRL, AND OCSP PROFILES .................................................................................... 48 7.1. Certificate profile ........................................................................................................................ 48 7.1.1. Version Number(s) ................................................................................................................ 48 7.1.2. Certificate Extensions ........................................................................................................... 48 7.1.3. Algorithm Object Identifiers ................................................................................................... 48 7.1.4. Name Forms ......................................................................................................................... 49 7.1.5. Name Constraints ................................................................................................................. 49 7.1.6. Certificate Policy Object Identifier ......................................................................................... 49 7.1.7. Usage of Policy Constraints Extension ................................................................................. 49 7.1.8. Policy Qualifiers Syntax and Semantics ................................................................................ 49 7.1.9. Processing Semantics for the Critical Certificate Policies Extension..................................... 49 7.2. CRL profile ................................................................................................................................. 49 7.2.1. Version number(s)................................................................................................................. 49 7.2.2. CRL and CRL Entry Extensions ............................................................................................ 49 7.3. OCSP profile .............................................................................................................................. 50 7.3.1. Version Number(s) ................................................................................................................ 50 7.3.2. OCSP Extensions ................................................................................................................. 50 8. COMPLIANCE AUDIT AND OTHER ASSESSMENTS ....................................................................... 50 8.1. Frequency or circumstances of assessment .............................................................................. 50 8.2. Identity/qualifications of assessor .............................................................................................. 50 8.3. Assessor's relationship to assessed entity ................................................................................. 51 8.4. Topics covered by assessment .................................................................................................. 51 8.5. Actions taken as a result of deficiency ....................................................................................... 51 8.6. Communication of results .......................................................................................................... 51 8.7. Self-Audits ................................................................................................................................. 51 9. OTHER BUSINESS AND LEGAL MATTERS ...................................................................................... 51 9.1. Fees ........................................................................................................................................... 51 9.1.1. Certificate Issuance or Renewal Fees ................................................................................... 51 9.1.2. Certificate Access Fees ........................................................................................................ 51 9.1.3. Revocation or Status Information Access Fees..................................................................... 51 9.1.4. Fees for Other Services ........................................................................................................ 51 9.1.5. Refund Policy ........................................................................................................................ 51 9.2. Financial responsibility ............................................................................................................... 52 9.2.1. Insurance Coverage .............................................................................................................. 52 9.2.2. Other Assets ......................................................................................................................... 52 9.2.3. Insurance or Warranty Coverage for End-Entities ................................................................. 52 9.3. Confidentiality of business information ....................................................................................... 52 9.3.1. Scope of Confidential Information ......................................................................................... 52 9.3.2. Information Not Within the Scope of Confidential Information ............................................... 52 9.3.3. Responsibility to Protect Confidential Information ................................................................. 52 9.4. Privacy of personal information .................................................................................................. 52 9.4.1. Privacy Plan .......................................................................................................................... 52 9.4.2. Information Treated as Private .............................................................................................. 52 9.4.3. Information Not Deemed Private ........................................................................................... 52 9.4.4. Responsibility to Protect Private Information ......................................................................... 53 9.4.5. Notice and Consent to Use Private Information .................................................................... 53 9.4.6. Disclosure Pursuant to Judicial or Administrative Process .................................................... 53 9.4.7. Other Information Disclosure Circumstances ........................................................................ 53 9.5. Intellectual property rights .......................................................................................................... 53 v
9.6. Representations and warranties ................................................................................................ 53 9.6.1. CA Representations and Warranties ..................................................................................... 53 9.6.2. RA Representations and Warranties ..................................................................................... 54 9.6.3. Subscriber Representations and Warranties ......................................................................... 54 9.6.4. Relying Party Representations and Warranties..................................................................... 54 9.6.5. Representations and Warranties of Other Participants ......................................................... 55 9.7. Disclaimers of warranties ........................................................................................................... 55 9.8. Limitations of liability .................................................................................................................. 55 9.9. Indemnities ................................................................................................................................ 56 9.9.1. Indemnification by DigiCert ................................................................................................... 56 9.9.2. Indemnification by Subscribers ............................................................................................. 56 9.9.3. Indemnification by Relying Parties ........................................................................................ 56 9.10. Term and termination ................................................................................................................. 56 9.10.1. Term ................................................................................................................................. 56 9.10.2. Termination ...................................................................................................................... 56 9.10.3. Effect of Termination and Survival .................................................................................... 56 9.11. Individual notices and communications with participants ........................................................... 56 9.12. Amendments .............................................................................................................................. 57 9.12.1. Procedure for Amendment ............................................................................................... 57 9.12.2. Notification Mechanism and Period .................................................................................. 57 9.12.3. Circumstances under which OID Must Be Changed ........................................................ 57 9.13. Dispute resolution provisions ..................................................................................................... 57 9.14. Governing law ............................................................................................................................ 57 9.15. Compliance with applicable law ................................................................................................. 57 9.16. Miscellaneous provisions ........................................................................................................... 57 9.16.1. Entire Agreement ............................................................................................................. 57 9.16.2. Assignment....................................................................................................................... 57 9.16.3. Severability ....................................................................................................................... 58 9.16.4. Enforcement (attorneys' fees and waiver of rights)........................................................... 58 9.16.5. Force Majeure .................................................................................................................. 58 9.17. Other provisions ......................................................................................................................... 58 Appendix A: Sample Opinion LETTER ......................................................................................................... 59 vi
1. INTRODUCTION
1.1.
OVERVIEW
ThisdocumentistheDigiCert,Inc.(“DigiCert”)CertificationPracticesStatement(CPS)thatoutlinesthe
principlesandpracticesrelatedtoDigiCert’scertificationandtime‐stampingservices.ThisCPSappliestoall
entitiesparticipatinginorusingDigiCert’scertificateandtime‐stampingservices,excludingparticipantsin
DigiCert’sPrivatePKIservices,whicharenotcross‐certifiedorpubliclytrusted.Specificrequirements
regardingthosecertificatesaresetforthintheindividualagreementswiththeappropriateDigiCert
customer.
ThisCPSdescribesthepracticesusedtocomplywiththeDigiCertCertificatePolicy(the“CP”),theAdobe
SystemsInc.(“Adobe”)AATLCertificatePolicy,theFederalBridgeCertificationAuthority(“FBCA”)Certificate
Policy,andotherapplicablepolicies.DigiCertconformstothecurrentversionoftheguidelinesadoptedby
theCertificationAuthority/BrowserForum(“CABForum”)whenissuingpubliclytrustedcertificates,
includingtheBaselineRequirementsfortheIssuanceandManagementofPublicly‐TrustedCertificates
(“BaselineRequirements”)andtheGuidelinesforExtendedValidationCertificates(“EVGuidelines”)bothof
whicharepublishedathttps://www.cabforum.org.IfanyinconsistencyexistsbetweenthisCPSandthe
BaselineRequirementsortheEVGuidelines,thentheEVGuidelinestakeprecedenceforEVCertificatesand
theBaselineRequirementstakeprecedenceforpubliclytrustedSSLcertificates.Time‐stampingservicesare
providedaccordingtoIETFRFC3161andothertechnicalstandards.
ThisCPSisonlyoneofseveraldocumentsthatcontrolDigiCert’scertificationservices.Otherimportant
documentsincludebothprivateandpublicdocuments,suchastheCP,DigiCert’sagreementswithits
customers,RelyingPartyagreements,andDigiCert’sprivacypolicy.DigiCertmayprovideadditional
certificatepoliciesorcertificationpracticestatements.Thesesupplementalpoliciesandstatementsare
availabletoapplicableusersorrelyingparties.
PursuanttotheIETFPKIXRFC3647CP/CPSframework,thisCPSisdividedintoninepartsthatcoverthe
securitycontrolsandpracticesandproceduresforcertificateandtime‐stampingserviceswithintheDigiCert
PKI.TopreservetheoutlinespecifiedbyRFC3647,sectionheadingsthatdonotapplyhavethestatement
"Notapplicable"or"Nostipulation."
1.2.
DOCUMENTNAMEANDIDENTIFICATION
ThisdocumentistheDigiCertCertificationPracticesStatementandwasapprovedforpublicationon9August
2010bytheDigiCertPolicyAuthority(DCPA).Thefollowingrevisionsweremadetotheoriginaldocument:
Date
Changes
Version
7‐October‐2014
UpdatedforconsistencywithDigiCertCPv.2.27
4.07
14‐May‐2014
Updatedpracticestocomplywithnewpolicyrequirementsand
4.06
changestotheDirectTrustCP,BaselineRequirements,EV
Guidelines,andEVCodeSigningGuidelines.
2‐May‐2013
Updatedmailingaddress.Alsoupdatedpracticestocomplywith 4.05
newpolicyrequirements,theDirectTrustCP,changestothe
Adobeprogram,andCABForumguidelines.
10‐May‐2012
UpdatedtoincludepracticessetforthintheBaseline
4.04
Requirements,thecurrentMozillaCAPolicy,EVCodeSigning,the
IGTF,andotherpolicybodies.
3‐May‐2011
IGTFCertificatesaddedandminorupdatesmadetoseveral
4.03
sections.
29‐October‐2010 ChangesmadeinresponsetocommentsfromtheFPKICPWG
4.02
regardingcertificatestatusservices,trustedroles,andoff‐site
backupofarchive.
26‐August‐2010
Updatedtheprocessusedtoauthenticatethecertificate
4.01
1
Date
9‐August‐2010
Changes
requester’sauthorityundersection3.2.5forcodesigning
certificatesissuedtoorganizations
Thisversion4.0replacestheDigiCertCertificatePolicyand
CertificationPracticesStatement,Version3.08,dated
May29,2009,andtheDigiCertCertificationPracticeStatement
forExtendedValidationCertificates,Version1.0.4,May29,2009.
Version
4.0
TheOIDforDigiCertisjoint‐iso‐ccitt(2)country(16)USA(840)US‐company(1)DigiCert(114412).
TheOID‐arcforthisversion4oftheCPSis2.16.840.1.114412.0.2.4.SubsequentrevisionstothisCPS
mighthavenewOIDassignments.DigiCertissuescertificatesandtime‐stamptokenscontainingthefollowing
OIDs/OIDarcs:
DigitallySignedObject
ObjectIdentifier(OID)
DomainVettedSSLCertificatesand
2.16.840.1.114412.1.2and/or
pertheBaselineRequirements
2.23.140.1.2.1(CABForumBaselineReqs.)
OrganizationVettedSSLCertificatesand
2.16.840.1.114412.1.1and/or
pertheBaselineRequirements
2.23.140.1.2.2(CABForumBaselineReqs.)
FederatedDeviceCertificate
2.16.840.1.114412.1.11
FederatedDeviceHardwareCertificate
2.16.840.1.114412.1.12
IssuerCA(whereallowedbypolicy)
2.5.29.32.0 (anyPolicy)
ExtendedValidationSSLCertificates
2.16.840.1.114412.2 and/or
2.23.140.1.1.X(CABForumEVGuidelines)
ObjectSigningCertificates
2.16.840.1.114412.3
CodeSigningCertificates
2.16.840.1.114412.3.1
ExtendedValidationCodeSigning
2.16.840.1.114412.3.2
WindowsKernelDriverSigning
2.16.840.1.114412.3.11
AdobeSigningCertificate
2.16.840.1.114412.3.21
ClientCertificateOIDArc
2.16.840.1.114412.4
Level1Certificates‐Personal
2.16.840.1.114412.4.1.1
Level1Certificates‐Enterprise
2.16.840.1.114412.4.1.2
Level2Certificates
2.16.840.1.114412.4.2
Level3Certificates‐US
2.16.840.1.114412.4.3.1
Level3Certificates‐CBP
2.16.840.1.114412.4.3.2
Level4Certificates‐US
2.16.840.1.114412.4.4.1
Level4Certificates‐CBP
2.16.840.1.114412.4.4.2
PIV‐IOIDArc
2.16.840.1.114412.4.5
PIV‐IHardware‐keysrequireactivationbythe 2.16.840.1.114412.4.5.1
PIV‐ICardholder(PIVAuth,DigSigandKey
Management)
PIV‐ICardAuthentication‐keysdonotrequire 2.16.840.1.114412.4.5.2
PIV‐ICardholderactivation
PIV‐IContentSigning–usebyPIV‐I‐compliant 2.16.840.1.114412.4.5.3
CMS
GridCertificateOIDArcs
2.16.840.1.114412.4.31 or
2.16.840.1.114412.31(Grid‐onlyarc)
IGTFClassicX.509Authoritieswithsecured
2.16.840.1.114412.4.31.1(Clientw/Public),
infrastructure
2.16.840.1.114412.31.4.1.1(ClientGridOnly),
and/or
1.2.840.113612.5.2.2.1.x(IGTF)
IGTFMemberIntegratedX.509Credential
2.16.840.1.114412.4.31.5and/or
ServiceswithSecuredInfrastructure
1.2.840.113612.5.2.2.5.x(IGTF)
Certificates
2
IGTFGridHost‐PublicTrust
IGTFGrid‐OnlyHostCertificate
2.16.840.1.114412.1.31.1
2.16.840.1.114412.31.1.1.1,
1.2.840.113612.5.2.2.1.x(IGTF),and/or
1.2.840.113612.5.2.2.5.x(IGTF)
2.16.840.1.114412.6
2.16.840.1.114412.7.1
2.16.840.1.114412.81
2.16.840.1.114412.99
Authentication‐OnlyCertificates
TrustedTime‐stamping
Legacyarc
Testarc
EUOIDs
EUQualifiedCertificates
ETSITS101456
EUQConSecureSignatureCreationDevice
ETSITS101456
ETSITS101862‐QualifiedCertificate
Statements
EUQualifiedTime‐stamping
ETSITS102023
0.4.0.1456.1.2
0.4.0.1456.1.1
0.4.0.1862.1.x
0.4.0.2023.1.x
AllOIDsmentionedabovebelongtotheirrespectiveowners.ThespecificOIDsusedwhenobjectsare
signedpursuanttothisCPSareindicatedintheapplicableCertificateProfilesdocument.WhenDigiCert
issuesanSSLcertificatecontainingoneoftheabove‐specifiedpolicyidentifiersfor“Baseline
Requirements”,itassertsthatthecertificateismanagedinaccordancewiththeBaselineRequirements.
CommercialBestPractices(“CBP”)differsfrom“US”inthattherearenotrustedrolecitizenshiprequirements
foranIssuerCAissuingunderaCBPpolicy,whereaspoliciesdesignated“US”mustfollowthecitizenship
practicessetforthinSection5.3.1.
TheLegacyarcexiststoidentifycertificatesissuedforpurposeofachievingcompatibilitywithlegacysystems
thatareincapableofprocessingneweralgorithmsthatmightberequiredbycomparableindustrybest
practices,e.g.,toidentifycertificatessignedusingtheSHA‐1algorithmwhenSHA‐256wouldberequired
underaCPthatDigiCerthascross‐certified.
1.3.
PKIPARTICIPANTS
1.3.1. CertificationAuthorities
DigiCertisacertificationauthority(CA)thatissuesdigitalcertificates.AsaCA,DigiCertperformsfunctions
associatedwithPublicKeyoperations,includingreceivingcertificaterequests,issuing,revokingand
renewingadigitalcertificate,andmaintaining,issuing,andpublishingCRLsandOCSPresponses.General
informationaboutDigiCert’sproductsandservicesareavailableatwww.digicert.com.
DigiCert’sofflineself‐signedRootCAsissueCAcertificatestosubordinateCAsandcrosscertificatestoother
RootCAsinaccordancewiththisCPS,applicablecross‐certification/federationpolicies,andDigiCert’s
memorandaofagreementwiththoseexternallyoperatedCAs.An“externalsubordinateCA”isanunaffiliated
thirdpartythatisissuedaCACertificatebyDigiCertwherethePrivateKeyassociatedwiththatCACertificate
isnotmaintainedunderthephysicalcontrolofDigiCert.InaccordancewithEUDirective99/93,DigiCert
doesnotallowexternalsubordinateCAstoissueEUQualifiedCertificates.Inaccordancewithrequirements
oftheU.S.FederalPKIPolicyAuthority(FPKIPA),DigiCertnotifiestheFPKIPApriortoissuingaCAcertificate
chainingtotheFederalBridgeCAtoanexternalsubordinateCA.AllexternalsubordinateCAsareprohibited,
eithertechnicallyorcontractually,fromissuingcertificatestodomainnamesorIPaddressesthata
Subscriberdoesnotlegitimatelyownorcontrol(i.e.issuanceforpurposesof“trafficmanagement”is
prohibited),andexternalsubordinateCAsarerequiredtoimplementproceduresthatareatleastas
restrictiveasthosefoundherein.
DigiCertisalsoatimestampingauthority(TSA)andprovidesproof‐of‐existencefordataataninstantintime
asdescribedherein.
3
1.3.2. RegistrationAuthoritiesandOtherDelegatedThirdParties
DigiCertmaydelegatetheperformanceofcertainfunctionstoRegistrationAuthorities(RA)andotherthird
partiestorequestcertificatesand/orperformidentificationandauthenticationforend‐usercertificates.The
specificroleofanRAorDelegatedThirdPartyvariesgreatlybetweenentities,rangingfromsimple
translationservicestoactualassistanceingatheringandverifyingApplicantinformation.SomeRAsoperate
identitymanagementsystems(IdMs)andmaymanagethecertificatelifecycleforend‐users.ForIGTF
certificates,designatedRAsareresponsibleforvettingtheidentityofeachcertificateapplicant.DigiCert
contractuallyobligateseachDelegatedThirdPartytoabidebythepoliciesandindustrystandardsthatare
applicabletothatDelegatedThirdParty’sroleincertificateissuance,management,revocationorother
relatedtaskthattheDelegatedThirdPartyperforms.
RApersonnelinvolvedintheissuanceofpublicly‐trustedSSLCertificatesmustundergotheskillsand
trainingrequiredunderSection5.3.AnRAoridentitymanagement(IdM)systemsupportingaparticular
communityofinterestwithcustomidentity‐vettingpracticesthatdifferfromthosefoundhereinmaysubmit
documentationtotheDCPAforreviewandapproval.Thedocumentationmustcontainsufficientdetailto
ensurethatalltasksrequiredbytheCPwillbeperformed.
1.3.3. Subscribers
SubscribersuseDigiCert’sservicesandPKItosupporttransactionsandcommunications.Subscribersarenot
alwaysthepartyidentifiedinacertificate,suchaswhencertificatesareissuedtoanorganization’s
employees.TheSubjectofacertificateisthepartynamedinthecertificate.ASubscriber,asusedherein,
referstoboththeSubjectofthecertificateandtheentitythatcontractedwithDigiCertforthecertificate’s
issuance.Priortoverificationofidentityandissuanceofacertificate,aSubscriberisanApplicant.
1.3.4. RelyingParties
RelyingPartiesareentitiesthatactinrelianceonacertificateand/ordigitalsignatureissuedbyDigiCert.
RelyingpartiesmustchecktheappropriateCRLorOCSPresponsepriortorelyingoninformationfeaturedin
acertificate.ThelocationoftheCRLdistributionpointisdetailedwithinthecertificate.
1.3.5. OtherParticipants
OtherparticipantsincludeAccreditationAuthorities(suchasPolicyManagementAuthorities,Federation
Operators,ApplicationSoftwareVendors,andapplicableCommunity‐of‐Interestsponsors);BridgeCAsand
CAsthatcross‐certifyDigiCertCAsastrustanchorsinotherPKIcommunities;CardManagementSystemsand
integrators(CMSs)thatensureproperoperationandprovisioningofPIV‐Icards;andTimeSourceEntities,
TimeStampTokenRequesters,andTimeStampVerifiersinvolvedintrustedtimestamping.Accreditation
Authoritiesaregrantedanunlimitedrighttore‐distributeDigiCert’srootcertificatesandrelatedinformation
inconnectionwiththeaccreditation.
WhenissuingPIV‐Icards,DigiCertusesaCardManagementSystems(CMS)thatmeetstherequirements
hereinresponsibleformanagingsmartcardtokencontent.DigiCertdoesnotissuecertificatestoaCMSthat
includeaPIV‐IHardwareorPIV‐ICardAuthenticationpolicyOID.
DigiCerthascross‐certifiedwiththeFederalBridgeCertificationAuthority(FBCA)andhasbeenissuedcross
certificatesbyEntrustandCybertrust.
1.4.
CERTIFICATEUSAGE
Adigitalcertificate(orcertificate)isformatteddatathatcryptographicallybindsanidentifiedsubscriber
withaPublicKey.Adigitalcertificateallowsanentitytakingpartinanelectronictransactiontoproveits
identitytootherparticipantsinsuchtransaction.Digitalcertificatesareusedincommercialenvironments
asadigitalequivalentofanidentificationcard.Atime‐stamptoken(TST)cryptographicallybindsa
representationofdatatoaparticulartimestamp,thusestablishingevidencethatthedataexistedatacertain
pointintime.
4
1.4.1. AppropriateCertificateUses
CertificatesissuedpursuanttothisCPSmaybeusedforalllegalauthentication,encryption,accesscontrol,
anddigitalsignaturepurposes,asdesignatedbythekeyusageandextendedkeyusagefieldsfoundwithinthe
certificate.However,thesensitivityoftheinformationprocessedorprotectedbyacertificatevariesgreatly,
andeachRelyingPartymustevaluatetheapplicationenvironmentandassociatedrisksbeforedecidingon
whethertouseacertificateissuedunderthisCPS.
ThisCPScoversseveraldifferenttypesofendentitycertificates/tokenswithvaryinglevelsofassurance.The
followingtableprovidesabriefdescriptionoftheappropriateusesofeach.Thedescriptionsareforguidance
onlyandarenotbinding.
Certificate
AppropriateUse
DVSSLCertificates
Usedtosecure onlinecommunicationwheretherisksand
consequencesofdatacompromisearelow,includingnon‐monetary
transactionsortransactionswithlittleriskoffraudormalicious
access.
OVSSLCertificates
Usedtosecureonlinecommunicationwheretherisksand
consequencesofdatacompromisearemoderate,including
transactionshavingsubstantialmonetaryvalueorriskoffraudor
involvingaccesstoprivateinformationwherethelikelihoodof
maliciousaccessissubstantial.
EVSSLCertificates
Usedtosecureonlinecommunicationwhererisksandconsequences
ofdatacompromisearehigh,includingtransactionshavinghigh
monetaryvalue,riskoffraud,orwhereinvolvingaccesstoprivate
informationwherethelikelihoodofmaliciousaccessishigh.
FederatedDevice
SimilartoSSLCertificates abovebutforuseasnecessaryin
Certificates
connectionwithcross‐certifiedPKIs
CodeSigningCertificates,
EstablishestheidentityoftheSubscribernamedinthecertificateand
includingEVCodeSigning thatthesignedcodehasnotbeenmodifiedsincesigning.
RudimentaryLevel1
Providesthelowestdegreeofassuranceconcerningidentityofthe
ClientCertificates‐
individualandisgenerallyusedonlytoprovidedataintegritytothe
Personal
informationbeingsigned.Thesecertificatesshouldonlybeused
wheretheriskofmaliciousactivityislowandifanauthenticated
transactionisnotrequired.
Level1ClientCertificates‐ Usedinenvironmentswheretherearerisksandconsequencesofdata
Enterprise
compromise,butsuchrisksarenotofmajorsignificance.Usersare
assumednotlikelytobemalicious.
Level2ClientCertificates
Issuedtoidentity‐vettedindividuals.Certificatesspecifyifthenameis
(FBCAbasicassurance
apseudonym.Usedinenvironmentswheretherearerisksand
certificates)
consequencesofdatacompromise,butsuchrisksarenotofmajor
significance.Usersareassumednotlikelytobemalicious.
Level3ClientCertificates
Usedinenvironmentswhererisksandconsequencesofdata
(FBCAmedium
compromisearemoderate,includingtransactionshavingsubstantial
certificates)
monetaryvalueorriskoffraudorinvolvingaccesstoprivate
informationwherethelikelihoodofmaliciousaccessissubstantial.
Level4ClientCertificates
Usedinenvironmentswhererisksandconsequencesofdata
(FBCAmediumhardware
compromisearehigh,includingtransactionshavinghighmonetary
certificates)
valueorriskoffraudorinvolvingaccesstoprivateinformationwhere
thelikelihoodofmaliciousaccessishigh.
DirectCertificates
UsedtotransferhealthcareinformationinaccordancewiththeDirect
ProtocoladoptedbytheONC.DirectCertificatesareissuedasLevel2
orLevel3Certificates.
AuthenticationOnly
Usedwheretheidentityofthecertificateholderisirrelevantand
wheretheriskofunauthorizedaccesstoasecuresiteislow.
5
IGTFandGrid‐only
Certificates
PIV‐IHardware
PIV‐ICardAuthentication
PIV‐IContentSigning
PIV‐IDigitalSignature
PIV‐IKeyManagement
EUQualifiedCertificate
andEUQConSecure
SignatureCreationDevice
AdobeSigningCertificates
TimeStampToken
Supportidentityassertionsandsystemauthenticationamongst
participantsintheInternationalGridTrustFederation.IGTF
Certificatesincludethoseissuedaspublicly‐trustedclientcertificates
andthoseissuedundertheGrid‐onlyarc.
Thislevelisrelevanttoenvironmentswhererisksandconsequences
ofdatacompromisearemoderate.Thismayincludecontactlesssmart
cardreaderswhereuseofanactivationPINisnotpractical.
PersonalIdentityVerification–Interoperable(PIV‐I)cardsare
intendedtotechnicallyinteroperatewithFederalPIVCardreaders
andapplications.TherequirementsassociatedwithPIV‐IHardware
andPIV‐IContentSigningareidenticaltoLevel4Certificatesexcept
wherespecificallynotedherein.PIV‐IContentSigningpolicyis
reservedforcertificatesusedbytheCardManagementSystem(CMS)
tosignthePIV‐Icardsecurityobjects
EUQualifiedCertificatesmayonlybeusedforsigning
(ETSITS101456)
UsedtosignAdobedocumentsandshowthattheportionofthe
documentsignedbytheauthorhasnotbeenmodifiedsincesigning.
Usedtoidentifytheexistenceofdataatasetperiodoftime.
1.4.2. ProhibitedCertificateUses
CertificatesdonotguaranteethattheSubjectistrustworthy,honest,reputableinitsbusinessdealings,
compliantwithanylaws,orsafetodobusinesswith.Acertificateonlyestablishesthattheinformationinthe
certificatewasverifiedasreasonablycorrectwhenthecertificateissued.Codesigningcertificatesdonot
indicatethatthesignedcodeissafetoinstallorfreefrommalware,bugs,orvulnerabilities.
CertificatesissuedunderthisCPSmaynotbeused(i)foranyapplicationrequiringfail‐safeperformancesuch
as(a)theoperationofnuclearpowerfacilities,(b)airtrafficcontrolsystems,(c)aircraftnavigationsystems,
(d)weaponscontrolsystems,or(e)anyothersystemwhosefailurecouldleadtoinjury,deathor
environmentaldamage;or(ii)whereprohibitedbylaw.CertificatesissuedundertheGrid‐onlyarccannotbe
usedtoestablishtrustoutsideoftherelevantgridnetwork.
1.5.
POLICYADMINISTRATION
1.5.1. OrganizationAdministeringtheDocument
ThisCPSandthedocumentsreferencedhereinaremaintainedbytheDCPA,whichcanbecontactedat:
DigiCertPolicyAuthority
Suite500
2600WestExecutiveParkway
Lehi,UT84043USA
Tel:1‐801‐877‐2100
Fax:1‐801‐705‐0481
1.5.2. ContactPerson
Attn:LegalCounsel
DigiCertPolicyAuthority
Suite500
2600WestExecutiveParkway
Lehi,UT84043USA
6
1.5.3. PersonDeterminingCPSSuitabilityforthePolicy
TheDCPAdeterminesthesuitabilityandapplicabilityofthisCPSbasedontheresultsandrecommendations
receivedfromanindependentauditor(seeSection8).TheDCPAisalsoresponsibleforevaluatingandacting
upontheresultsofcomplianceaudits.
1.5.4. CPSApprovalProcedures
TheDCPAapprovestheCPSandanyamendments.AmendmentsaremadeaftertheDCPAhasreviewedthe
amendments’consistencywiththeCP,byeitherupdatingtheentireCPSorbypublishinganaddendum.The
DCPAdetermineswhetheranamendmenttothisCPSisconsistentwiththeCP,requiresnotice,oranOID
change.SeealsoSection9.10andSection9.12below.
1.6.
DEFINITIONSANDACRONYMS
“AffiliatedOrganization”meansanorganizationthathasanorganizationalaffiliationwithaSubscriberand
thatapprovesorotherwiseallowssuchaffiliationtoberepresentedinacertificate.
“Applicant”meansanentityapplyingforacertificate.
“ApplicationSoftwareVendor”meansasoftwaredeveloperwhosesoftwaredisplaysorusesDigiCert
certificatesanddistributesDigiCert’srootcertificates.
“CABForum”isdefinedinsection1.1.
“CertificateApprover”isdefinedintheEVGuidelines.
“CertificateRequester”isdefinedintheEVGuidelines.
“ContractSigner”isdefinedintheEVGuidelines.
“DirectAddress”meansanemailaddressconformingtotheApplicabilityStatementforSecureHealth
Transport.
“DirectAddressCertificate”meansacertificatecontaininganentireDirectAddress.
“DirectDeviceCertificate”meansacertificatecontainingtheFQDNorIPaddressofahostmachine.
“DirectOrganizationalCertificate”meansacertificatecontainingonlythedomainnameportionofaDirect
Address.
“EUDirective99/93”meanstheEUCouncilDirective1999/93/ECoftheEuropeanParliamentandofthe
Councilof13December1999onaCommunityframeworkforElectronicSignatures,OJL13,19.01.2000,pp.
12‐20.
“EVGuidelines”isdefinedinsection1.1.
“KeyPair”meansaPrivateKeyandassociatedPublicKey.
“OCSPResponder”meansanonlinesoftwareapplicationoperatedundertheauthorityofDigiCertand
connectedtoitsrepositoryforprocessingcertificatestatusrequests.
“PIV‐IProfile”meanstheX.509CertificateandCertificateRevocationList(CRL)ExtensionsProfilefor
PersonalIdentityVerificationInteroperable(PIV‐I)Cards,Ver.1.0,Date:April232010.
7
“PrivateKey”meansthekeyofakeypairthatiskeptsecretbytheholderofthekeypair,andthatisusedto
createdigitalsignaturesand/ortodecryptelectronicrecordsorfilesthatwereencryptedwiththe
correspondingPublicKey.
“PublicKey”meansthekeyofakeypairthatmaybepubliclydisclosedbytheholderofthecorresponding
PrivateKeyandthatisusedbyaRelyingPartytoverifydigitalsignaturescreatedwiththeholder's
correspondingPrivateKeyand/ortoencryptmessagessothattheycanbedecryptedonlywiththeholder's
correspondingPrivateKey.
“QualifiedCertificate”meansacertificatethatmeetstherequirementsinAnnexIofEUDirective99/93and
isprovidedbyanIssuerCAmeetingtherequirementsofAnnexIIoftheDirective.
“RelyingParty”meansanentitythatreliesuponeithertheinformationcontainedwithinacertificateora
time‐stamptoken.
“RelyingPartyAgreement”meansanagreementwhichmustbereadandacceptedbytheRelyingParty
priortovalidating,relyingonorusingaCertificateoraccessingorusingDigiCert’sRepository.TheRelying
PartyAgreementisavailableforreferencethroughaDigiCertonlinerepository.
“SecureSignatureCreationDevice”meansasignature‐creationdevicethatmeetstherequirementslaid
downinAnnexIIIofEUDirective99/93.
“Subscriber”meanseithertheentityidentifiedasthesubjectinthecertificateortheentitythatisreceiving
DigiCert’stime‐stampingservices.
“SubscriberAgreement”meansanagreementthatgovernstheissuanceanduseofacertificatethatthe
Applicantmustreadandacceptbeforereceivingacertificate.
“WebTrust”meansthecurrentversionoftheAICPA/CICAWebTrustProgramforCertificationAuthorities.
“WebTrustEVProgram”meanstheadditionalauditproceduresspecifiedforCAsthatissueEVCertificates
bytheAICPA/CICAtobeusedinconjunctionwithitsWebTrustProgramforCertificationAuthorities.
Acronyms:
AATL
CA
CAB
CMS
CP
CPS
CRL
CSR
DBA DCPA
ETSI
EU
EV
FIPS FQDN FTP
HISP
HSM
HTTP
IANA ICANN AdobeApprovedTrustList
CertificateAuthorityorCertificationAuthority
”CA/Browser”asin“CABForum”
CardManagementSystem
CertificatePolicy
CertificationPracticeStatement
CertificateRevocationList
CertificateSigningRequest
DoingBusinessAs(alsoknownas"TradingAs")
DigiCertPolicyAuthority
EuropeanTelecommunicationsStandardsInstitute
EuropeanUnion
ExtendedValidation
(USGovernment)FederalInformationProcessingStandard
FullyQualifiedDomainName
FileTransferProtocol
HealthInformationServiceProvider
HardwareSecurityModule
HypertextTransferProtocol
InternetAssignedNumbersAuthority
InternetCorporationforAssignedNamesandNumbers
8
IdM
IDN
ISSO
IETF
IGTF
ITU
ITU‐T
MICS
OCSP
OID
ONC
PIN
PIV‐I
PKI
PKIX
PKCS
RA
RFC
SHA
SSCD
SSL
TLD TLS
TSA
TST
URL
UTC
X.509
IdentityManagementSystem
InternationalizedDomainName
InformationSystemSecurityOfficer
InternetEngineeringTaskForce
InternationalGridTrustFederation
InternationalTelecommunicationUnion
ITUTelecommunicationStandardizationSector
Member‐IntegratedCredentialService(IGTF)
OnlineCertificateStatusProtocol
ObjectIdentifier
OfficeoftheNationalCoordinatorforHealthcare(U.S.)
PersonalIdentificationNumber(e.g.asecretaccesscode)
PersonalIdentityVerification‐Interoperable
PublicKeyInfrastructure
IETFWorkingGrouponPublicKeyInfrastructure
PublicKeyCryptographyStandard
RegistrationAuthority
RequestforComments(atIETF.org)
SecureHashingAlgorithm
SecureSignatureCreationDevice
SecureSocketsLayer
Top‐LevelDomain
TransportLayerSecurity
TimeStampingAuthority
Time‐StampToken
UniformResourceLocator
CoordinatedUniversalTime
TheITU‐TstandardforCertificatesandtheircorrespondingauthentication
framework
2. PUBLICATIONANDREPOSITORYRESPONSIBILITIES
2.1.
REPOSITORIES
DigiCertmakesitsrootcertificates,revocationdataforissueddigitalcertificates,CPs,CPSs,RelyingParty
Agreements,andstandardSubscriberAgreementsavailableinpublicrepositories.
DigiCert’slegalrepositoryformostservicesislocatedathttp://www.digicert.com/ssl‐cps‐repository.htm.
DigiCert’srepositoryforInternationalGridTrustislocatedathttp://www.digicert‐grid.com/.
DigiCert’spubliclytrustedrootcertificatesanditsCRLsandOCSPresponsesareavailablethroughonline
resources24hoursaday,7daysaweekwithsystemsdescribedinSection5tominimizedowntime.
2.2.
PUBLICATIONOFCERTIFICATIONINFORMATION
TheDigiCertcertificateservicesandtherepositoryareaccessiblethroughseveralmeansofcommunication:
1. Ontheweb:www.digicert.com(andviaURIsincludedinthecertificatesthemselves)
2. [email protected]
3. Bymailaddressedto:DigiCert,Inc.,Suite500,2600WestExecutiveParkway,Lehi,Utah84043
4. BytelephoneTel:1‐801‐877‐2100
5. Byfax:1‐801‐705‐0481
2.3.
TIMEORFREQUENCYOFPUBLICATION
CAcertificatesarepublishedinarepositoryassoonaspossibleafterissuance.CRLsforend‐usercertificates
areissuedatleastonceperday.CRLsforCAcertificatesareissuedatleastevery6months(every31daysfor
offlineCAschainingtotheFederalBridgeCA),andalsowithin18hoursifaCAcertificateisrevoked.Under
9
specialcircumstances,DigiCertmaypublishnewCRLspriortothescheduledissuanceofthenextCRL.
(SeeSection4.9foradditionaldetails.)
NewormodifiedversionsoftheCP,thisCPS,SubscriberAgreements,orRelyingPartyWarrantiesare
typicallypublishedwithinsevendaysaftertheirapproval.
2.4.
ACCESSCONTROLSONREPOSITORIES
Read‐onlyaccesstotherepositoryisunrestricted.Logicalandphysicalcontrolspreventunauthorizedwrite
accesstorepositories.
3. IDENTIFICATIONANDAUTHENTICATION
3.1.
NAMING
3.1.1. TypesofNames
Certificatesareissuedwithanon‐nullsubjectDistinguishedName(DN)thatcomplieswithITUX.500
standardsexceptthatDigiCertmayissueaLevel1CertificatewithanullsubjectDNifitincludesatleastone
alternativenameformthatismarkedcritical.WhenDNsareused,commonnamesmustrespectnamespace
uniquenessrequirementsandmustnotbemisleading.Thisdoesnotprecludetheuseofpseudonymous
certificates,exceptwherestatedotherwiseunderSection3.1.3.SomeSSL/TLScertificates,including
certificatesforintranetuseandUnifiedCommunicationsCertificates,maycontainentriesinthesubject
alternativenameextensionthatarenotintendedtoberelieduponbythegeneralpublic(e.g.,theycontain
non‐standardtopleveldomainslike.localortheyareaddressedtoanIPnumberspacethathasbeen
allocatedasprivatebyRFC1918).Theissuanceofpublicly‐trustedSSLcertificatestotheselocalIPaddresses
orwithnon‐FQDN(DNS‐addressable)servernameshasbeendeprecated.Unlessotherwisemodifiedbythe
CA/BrowserForuminitsBaselineRequirements,asofJuly1,2012,DigiCertwillnotissueapubliclytrusted
SSLcertificatewithanExpiryDatelaterthanNovember1,2015ifithasasubjectAlternativeNameextension
orSubjectcommonNamefieldcontainingaReservedIPAddressorInternalName,andonOctober1,2016,
DigiCertwillrevokeanyunexpiredcertificatecontaininganinternalnameorreservedIPaddress.
CertificatesforPIV‐Icardsincludebothanon‐nullsubjectnameandsubjectalternativename.
EachPIV‐IHardwarecertificateindicateswhetherornottheSubscriberisassociatedwithanAffiliated
Organizationbytakingoneofthefollowingforms:
ForcertificateswithanAffiliatedOrganization:
cn=Subscriber'sfullname,ou=AffiliatedOrganizationName,{BaseDN}
ForcertificateswithnoAffiliatedOrganization:
cn=Subscriber'sfullname,ou=Unaffiliated,ou=EntityCA’sName,{BaseDN}
EachPIV‐IContentSigningcertificatealsoclearlyindicatestheorganizationadministeringtheCMS.PIV‐I
CardAuthenticationsubscribercertificatedonotincludeaSubscribercommonname.
EachPIV‐ICardAuthenticationcertificateindicateswhetherornottheSubscriberisassociatedwithan
AffiliatedOrganizationbytakingoneofthefollowingforms:
ForcertificateswithanAffiliatedOrganization:
serialNumber=UUID,ou=AffiliatedOrganizationName,{BaseDN}
ForcertificateswithnoAffiliatedOrganization:
serialNumber=UUID,ou=Unaffiliated,ou=EntityCA’sName,{BaseDN}
TheUUIDisencodedwithintheserialNumberattributeusingtheUUIDstringrepresentationdefinedin
Section3ofRFC4122(e.g.,"f81d4fae‐7dec‐11d0‐a765‐00a0c91e6bf6").
ThesubjectnameineachEUQualifiedCertificatecomplieswithsection3.1.2ofRFC3739
10
3.1.2. NeedforNamestobeMeaningful
DigiCertusesdistinguishednamesthatidentifyboththeentity(i.e.person,organization,device,orobject)
thatisthesubjectofthecertificateandtheentitythatistheissuerofthecertificate.DigiCertonlyallows
directoryinformationtreesthataccuratelyreflectorganizationstructures.
3.1.3. AnonymityorPseudonymityofSubscribers
Generally,DigiCertdoesnotissueanonymousorpseudonymouscertificates;however,forIDNs,DigiCertmay
includethePunycodeversionoftheIDNasasubjectname.DigiCertmayalsoissueotherpseudonymous
end‐entitycertificatesprovidedthattheyarenotprohibitedbypolicyandanyapplicablenamespace
uniquenessrequirementsaremet.
3.1.4. RulesforInterpretingVariousNameForms
DistinguishedNamesincertificatesareinterpretedusingX.500standardsandASN.1syntax.SeeRFC2253
andRFC2616forfurtherinformationonhowX.500distinguishednamesincertificatesareinterpretedas
UniformResourceIdentifiersandHTTPreferences.
3.1.5. UniquenessofNames
Theuniquenessofeachsubjectnameinacertificateisenforcedasfollows:
SSLServerCertificates
Inclusionofthedomainnameinthe Certificate.Domainname
uniquenessiscontrolledbytheInternetCorporationforAssigned
NamesandNumbers(ICANN).
ClientCertificates
Requiringauniqueemailaddress ora uniqueorganizationname
combined/associatedwithauniqueserialinteger.
IGTFandGrid‐onlyDevice
Fordevicecertificates,anFQDNisincludedintheappropriate
Certificates
fields.Forothercertificates,DigiCertmayappendauniqueIDtoa
namelistedinthecertificate.
CodeSigningCertificates
Requiringauniqueorganizationnameandaddressoraunique
(includingCDSCertificates) organizationnamecombined/associatedwithauniqueserial
integer.
TimeStamping
Requiringauniquehashandtimeoruniqueserialintegerassigned
tothetimestamp
3.1.6. Recognition,Authentication,andRoleofTrademarks
Subscribersmaynotrequestcertificateswithcontentthatinfringesontheintellectualpropertyrightsof
anotherentity.UnlessotherwisespecificallystatedinthisCPS,DigiCertdoesnotverifyanApplicant’srightto
useatrademarkanddoesnotresolvetrademarkdisputes.DigiCertmayrejectanyapplicationorrequire
revocationofanycertificatethatispartofatrademarkdispute.
3.2.
INITIALIDENTITYVALIDATION
DigiCertmayuseanylegalmeansofcommunicationorinvestigationtoascertaintheidentityofan
organizationalorindividualApplicant.DigiCertmayrefusetoissueaCertificateinitssolediscretion.
3.2.1. MethodtoProvePossessionofPrivateKey
DigiCertestablishesthattheApplicantholdsorcontrolsthePrivateKeycorrespondingtothePublicKeyby
performingsignatureverificationordecryptionondatapurportedtohavebeendigitallysignedorencrypted
withthePrivateKeybyusingthePublicKeyassociatedwiththecertificaterequest.
3.2.2. AuthenticationofOrganizationIdentity
DVSSLServerCertificates
DigiCertvalidatestheApplicant’srighttouseorcontrolthedomain
namesthatwillbelistedinthecertificateusingoneormoreofthe
followingprocedures:
1.
RelyingonpubliclyavailablerecordsfromtheDomainName
Registrar,suchasWHOISorotherDNSrecordinformation;
11
2.
Communicatingwithoneofthefollowingemailaddresses:
[email protected],[email protected],
[email protected],hostmaster@domain,
postmaster@domain,oranyaddresslistedinthetechnical,
registrant,oradministrativecontactfieldofthedomain’s
Registrarrecord;
3.
Requiringapracticaldemonstrationofdomaincontrol(e.g.,
requiringtheApplicanttomakeaspecifiedchangetoaDNS
zonefileoralivepageonthegivendomain);and/or
4.
Adomainauthorizationletter,providedthelettercontains
thesignatureofanauthorizedrepresentativeofthedomain
holder,adatethatisonorafterthecertificaterequest,alist
oftheapprovedfully‐qualifieddomainname(s),anda
statementgrantingtheApplicanttherighttousethedomain
namesinthecertificate.DigiCertalsocontactsthedomain
nameholderusingareliablethird‐partydatasourceto
confirmtheauthenticityofthedomainauthorizationletter;
and/or
5.
Asimilarprocedurethatoffersanequivalentlevelof
assuranceintheApplicant’sownership,control,orrightto
usetheDomainName.
DigiCertverifiesanincludedcountrycodeusing(a)theIPAddress
rangeassignmentbycountryforeither(i)thewebsite’sIPaddress,as
indicatedbytheDNSrecordforthewebsiteor(ii)theApplicant’sIP
address;(b)theccTLDoftherequestedDomainName;or(c)
informationprovidedbytheDomainNameRegistrar.
OVSSLServer,Object
DigiCertvalidatestheApplicant’srighttouseorcontroltheDomain
Signing,andDevice
Name(s)thatwillbelistedintheCertificateusingtheDVSSLServer
Certificates
Certificatevalidationproceduresabove.
(excludingdevice
certificatesissuedunder
DigiCertalsoverifiestheidentityandaddressoftheApplicantusing:
theGrid‐onlyarc)
1. areliablethirdparty/governmentdatabasesorthrough
communicationwiththeentityorjurisdictiongoverning
theorganization’slegalcreation,existence,or
recognition;
2. asitevisit;
3. anattestationletterthatissignedbyanaccountant,
lawyer,governmentofficial,orotherreliablethird
party;or
4. foraddressonly,autilitybill,bankstatement,credit
cardstatement,taxdocument,orotherreliableformof
identification.
DigiCertverifiesanyDBAincludedinacertificateusingathirdparty
orgovernmentsource,attestationletter,orreliableformof
identification.
Devicecertificatesissued
AnRAorTrustedAgentvalidatestheapplicant’sinformationin
undertheGrid‐onlyarc
accordancewithanRPS(orsimilardocument)applicabletothe
communityofinterest.
EVSSLandEVCode
Informationconcerningorganizationidentityrelatedtotheissuance
SigningCertificates
ofEVCertificatesisvalidatedinaccordancewiththeEVGuidelines.
Level1ClientCertificates‐ DigiCertverifies organizationalcontrolovertheemaildomainusing
Enterprise
authenticationproceduressimilartothoseusedbyDigiCertwhen
12
Level2,3,and4Client
Certificates
PIV‐I
establishingdomainownershipbyanorganizationbeforeissuanceof
aDVorOVSSLServerCertificate.
Ifthecertificatecontainsorganizationinformation,DigiCertobtains
documentationfromtheorganizationsufficienttoconfirmthatthe
individualhasanaffiliationwiththeorganizationnamedinthe
certificate.
Forcertificate requests thatassertanorganizationalaffiliation
betweenahumansubscriberandanorganization,DigiCertverifiesthe
organization’sidentityandlegalexistenceandtheorganizationis
requiredtoenterintoanagreementauthorizingorrecognizingthat
affiliationandrequiringthattheorganizationrequestrevocationof
thecertificatewhenthataffiliationends.
DigiCertmaintainsandutilizesascoringsystemtoflagcertificaterequeststhatpotentiallypresentahigher
riskoffraud.Thosecertificaterequeststhatareflagged“highrisk”receiveadditionalscrutinyorverification
priortoissuance,whichmayincludeobtainingadditionaldocumentationfromoradditionalcommunication
withtheApplicant.
BeforeissuinganSSLcertificatewithadomainnamethathasnotbeenpreviouslyverifiedaswithinthescope
ofanRA’sorotherDelegatedThirdParty’salloweddomainnames,DigiCertestablishesthattheRAor
DelegatedThirdPartyhastherighttousetheDomainNamebyindependentlyverifyingtheauthorization
withthedomainowner,asdescribedabove,orbyusingotherreliablemeans,suchasperformingaDNS
lookuptodeterminewhetherthereisamatchingDNSrecordthatpointstotheDelegatedThirdParty’sIP
addressordomainnamespace.
DigiCertverifiestheorganizationname,address,legalexistence,andauthorizationforCAcertificatesthat
cross‐certifywiththeFBCA.
3.2.3. AuthenticationofIndividualIdentity
Ifacertificatewillcontaintheidentityofanindividual,thenDigiCertoranRAvalidatestheidentityofthe
individualusingthefollowingprocedures:
Certificate
Validation
OVSSLServerCertificates 1. DigiCertortheRAobtainsa legiblecopy,whichdiscernibly
and
showstheApplicant’sface,ofatleastonecurrentlyvalid
ObjectSigningCertificates
government‐issuedphotoID(passport,driver’slicense,
(issuedtoanindividual)
militaryID,nationalID,orequivalentdocumenttype).
DigiCertortheRAinspectsthecopyforanyindicationof
alterationorfalsification.
2. DigiCertmayadditionallycross‐checktheApplicant’sname
andaddressforconsistencywithavailablethirdpartydata
sources.
3. Iffurtherassuranceisrequired,thentheApplicantmust
provideanadditionalformofidentification,suchasrecent
utilitybills,financialaccountstatements,creditcard,an
additionalIDcredential,orequivalentdocumenttype.
4. DigiCertortheRAconfirmsthattheApplicantisableto
receivecommunicationbytelephone,postalmail/courier,or
fax.
IfDigiCertcannotverifytheApplicant’sidentityusingthe
proceduresdescribedabove,thentheApplicantmustsubmita
13
DeviceCertificate
Sponsors
EVCertificates
issuedtoabusinessentity
Grid‐onlyCertificates
DeclarationofIdentity thatiswitnessedandsignedbya
RegistrationAuthority,TrustedAgent,notary,lawyer,accountant,
postalcarrier,oranyentitycertifiedbyaStateorNational
Governmentasauthorizedtoconfirmidentities.
Seesection3.2.3.3
AsspecifiedintheEVGuidelines
EithertheRAresponsibleforthegridcommunityoraTrusted
Agentobtainsanidentitydocumentduringaface‐to‐facemeeting
withtheApplicant,oraTrustedAgentatteststhattheApplicantis
personallyknowntotheTrustedAgent.TheRAmustretain
sufficientinformationabouttheapplicant’sidentitytoproveupon
DigiCert’srequestthattheapplicantwasproperlyidentified.
AuthenticationCertificates Theentitycontrollingthesecurelocationmustrepresentthatthe
certificateholderisauthorizedtoaccessthelocation.
Level1ClientCertificates
DigiCertoranRAverifiesApplicant'scontroloftheemailaddressor
–Personal
websitelistedinthecertificate.
(emailcertificates)
Level1ClientCertificates‐ Anyoneofthefollowing:
Enterprise
1. In‐personappearancebeforeapersonperformingidentity
proofingforaRegistrationAuthorityoraTrustedAgentwith
presentmentofanidentitycredential(e.g.,driver'slicenseor
birthcertificate).
2. Usingproceduressimilartothoseusedwhenapplyingfor
consumercreditandauthenticatedthroughinformationin
consumercreditdatabasesorgovernmentrecords,suchas:
a. theabilitytoplaceorreceivecallsfromagivennumber;or
b. theabilitytoobtainmailsenttoaknownphysicaladdress.
3. Throughinformationderivedfromanongoingbusiness
relationshipwiththecredentialproviderorapartnercompany
(e.g.,afinancialinstitution,airline,employer,orretailcompany).
Acceptableinformationincludes:
a. theabilitytoobtainmailatthebillingaddressusedinthe
businessrelationship;
b. verificationofinformationestablishedinprevious
transactions(e.g.,previousordernumber);or
c. theabilitytoplacecallsfromorreceivephonecallsata
phonenumberusedinpreviousbusinesstransactions.
4.
Level2ClientCertificates
andIGTFClassic/MICS
Certificates
AnymethodusedtoverifytheidentityofanApplicantforaLevel
2,3,or4ClientCertificate.
TheCAoranRAconfirms that thefollowingareconsistentwiththe
applicationandsufficienttoidentifyauniqueindividual:
(a)
thenameonthegovernment‐issuedphoto‐ID
referencedbelow;
(b)
dateofbirth;and
(c)
currentaddressorpersonaltelephonenumber.
14
Level3ClientCertificates
1. In‐personappearancebeforeapersonperformingidentity
proofingforaRegistrationAuthorityoraTrustedAgent(or
entitycertifiedbyastate,federal,ornationalentityas
authorizedtoconfirmidentities)withpresentmentofareliable
formofcurrentgovernment‐issuedphotoID.
2. TheApplicantmustpossessavalid,current,government‐issued,
photoID.TheRegistrationAuthorityorTrustedAgent
performingidentityproofingmustobtainandreview,whichmay
bethroughremoteverification,thefollowinginformationabout
theApplicant:(i)name,dateofbirth,andcurrentaddressor
telephonenumber;(ii)serialnumberassignedtotheprimary,
government‐issuedphotoID;and(iii)oneadditionalformofID
suchasanothergovernment‐issuedID,anemployeeorstudent
IDcardnumber,telephonenumber,afinancialaccountnumber
(e.g.,checkingaccount,savingsaccount,loanorcreditcard),ora
utilityserviceaccountnumber(e.g.,electricity,gas,orwater)for
anaddressmatchingtheapplicant’sresidence.Identityproofing
throughremoteverificationmayrelyondatabaserecordchecks
withanagent/institutionorthroughcreditbureausorsimilar
databases.
DigiCertoranRAmayconfirmanaddressbyissuingcredentials
inamannerthatconfirmstheaddressofrecordorbyverifying
knowledgeofrecentaccountactivityassociatedwiththe
Applicant’saddressandmayconfirmatelephonenumberby
sendingachallenge‐responseSMStextmessageorbyrecording
theapplicant’svoiceduringacommunicationafterassociating
thetelephonenumberwiththeapplicantinrecordsavailableto
DigiCertortheRA.
3. WhereDigiCertoranRAhasacurrentandongoingrelationship
withtheApplicant,identitymaybeverifiedthroughthe
exchangeofapreviouslyexchangedsharedsecret(e.g.,aPINor
password)thatmeetsorexceedsNISTSP800‐63Level2
entropyrequirements,providedthat:(a)identitywasoriginally
establishedwiththedegreeofrigorequivalenttothatrequired
in1or2aboveusingagovernment‐issuedphoto‐ID,and(b)an
ongoingrelationshipexistssufficienttoensuretheApplicant’s
continuedpersonalpossessionofthesharedsecret.
4. Anyofthemethodsusedtoverifytheidentityofanapplicantfor
aDigiCertLevel3or4ClientCertificate.
In‐personproofingbeforeanRA,TrustedAgent, oranentitycertified
byastate,federal,ornationalentitythatisauthorizedtoconfirm
identities.Theinformationmustbecollectedandstoredinasecure
manner.Requiredidentificationconsistsofoneunexpired
Federal/NationalGovernment‐issuedPictureI.D.(e.g.apassport),a
REALID,ortwounexpiredNon‐FederalGovernmentI.D.s,oneof
whichmustbeaphotoI.D.(e.g.,driver’slicense).
Thepersonperformingidentityproofingexaminesthecredentials
anddetermineswhethertheyareauthenticandunexpiredand
checkstheprovidedinformation(name,dateofbirth,andcurrent
15
Level4ClientCertificates
(BiometricIDcertificates)
PIV‐ICertificates
EUQualifiedCertificates
address)toensurelegitimacy. TheApplicantsignsaDeclarationof
Identity,definedbelow,towhichthepersonperformingidentity
proofingattests.DigiCertortheRAreviewsandkeepsarecordofthe
DeclarationofIdentity.
AtrustrelationshipbetweenanRAorTrustedAgentandthe
applicantthatisbasedonanin‐personantecedent(asdefinedin
FBCASupplementaryAntecedent,In‐PersonDefinition)sufficesas
meetingthein‐personidentityproofingrequirementprovidedthat
(1)itmeetsthethoroughnessandrigorofin‐personproofing
describedabove,(2)supportingIDproofingartifactsexistto
substantiatetheantecedentrelationship,and(3)mechanismsarein
placethatbindtheindividualtotheassertedidentity.
TheidentityoftheApplicantmustbeestablishedbyin‐person
proofingnoearlierthan30dayspriortoinitialcertificateissuance.
In‐personproofingbeforeanRA,TrustedAgent, oranentitycertified
byastate,federal,ornationalentitythatisauthorizedtoconfirm
identities.Acertifiedentitymustforwardthecollectedinformation
directlytoanRAinasecuremanner.TheApplicantmustsupplyone
unexpiredFederal/NationalGovernment‐issuedPictureI.D.(e.g.a
passport),aREALID,ortwounexpiredNon‐FederalGovernment
I.D.s,oneofwhichmustbeaphotoI.D.(e.g.,driver’slicense).The
entitycollectingthecredentialsmustalsoobtainatleastoneformof
biometricdata(e.g.photographorfingerprints)toensurethatthe
Applicantcannotrepudiatetheapplication.
ThepersonperformingidentityverificationforDigiCertortheRA
examinesthecredentialsforauthenticityandvalidity.TheApplicant
signsaDeclarationofIdentity,definedbelow,towhichtheperson
performingidentityproofingattests.DigiCertortheRAreviewsand
keepsarecordoftheDeclarationofIdentity.
Useofanin‐personantecedentisnotallowed.Theidentityofthe
Applicantmustbeestablishedbyin‐personproofingnoearlierthan
30dayspriortoinitialcertificateissuance.Level4ClientCertificates
areissuedinamannerthatconfirmstheApplicant’saddress.
PIV‐IHardwarecertificatesare onlyissuedtohumansubscribers.
ThefollowingbiometricdataiscollectedbyDigiCert,anRA,ora
TrustedAgentduringtheidentityproofingandregistrationprocess:
1. Anelectronicfacialimageusedforprintingfacialimageonthe
cardandforvisualauthenticationduringcardusage.Anew
facialimageiscollectedeachtimeacardisissued;and
2. Twoelectronicfingerprintsarestoredonthecardforautomated
authenticationduringcardusage.
TheSubscribermustalsopresenttwoidentitysourcedocumentsin
originalformthatcomefromthelistofacceptabledocuments
includedinFormI‐9,OMBNo.1115‐0136,EmploymentEligibility
Verification.Atleastonedocumentmustbeavalid,unexpiredState
orFederalGovernment‐issuedpictureidentification(ID).ForPIV‐I,
theuseofanin‐personantecedentisnotapplicable.Identityis
establishednomorethan30dayspriortoinitialcertificateissuance.
Usingidentityandattributevalidationproceduresinaccordancewith
16
nationallaw.Evidenceofidentityischeckeddirectlyagainsta
physicalpersonorindirectlyusingmeanswhichprovidesequivalent
assurancetophysicalpresence.
AcceptableformsofgovernmentIDincludeadriver'slicense,state‐issuedphotoIDcard,passport,national
identitycard,permanentresidentcard,trustedtravelercard,tribalID,militaryID,orsimilarphoto
identificationdocument.Acceptableformsofnon‐governmentIDincludeavoidedcheckfromacurrent
checkingaccount,recentutilitybillshowingApplicant’sname,address,andutilityaccountnumber,social
securitycard,orsimilardocument.
ADeclarationofIdentityconsistsof:
1. theidentityofthepersonperformingtheverification;
2. asigneddeclarationbytheverifyingpersonstatingthattheyverifiedtheidentityoftheSubscriberas
requiredusingtheformatsetforthat28U.S.C.1746(declarationunderpenaltyofperjury)or
comparableprocedureunderlocallaw,thesignatureonthedeclarationmaybeeitherahandwritten
ordigitalsignatureusingacertificatethatisofequalorhigherlevelofassuranceasthecredential
beingissued;
3. uniqueidentifyingnumber(s)fromtheApplicant’sidentificationdocument(s),orafacsimileofthe
ID(s);
4. thedateoftheverification;and
5. adeclarationofidentitybytheApplicantthatissigned(inhandwritingorusingadigitalsignature
thatisofequivalentorhigherassurancethanthecredentialbeingissued)inthepresenceofthe
personperformingtheverificationusingtheformatsetforthat28U.S.C.1746(declarationunder
penaltyofperjury)orcomparableprocedureunderlocallaw.
Ifin‐personidentityverificationisrequiredandtheApplicantcannotparticipateinface‐to‐faceregistration
alone(e.g.becauseApplicantisanetworkdevice,minor,orpersonnotlegallycompetent),thentheApplicant
maybeaccompaniedbyapersonalreadycertifiedbythePKIorwhohastherequiredidentitycredentialsfor
acertificateofthesametypeappliedforbytheApplicant.ThepersonaccompanyingtheApplicant(i.e.the
“Sponsor”)willpresentinformationsufficientforregistrationatthelevelofthecertificatebeingrequested,
forhimselforherself,andfortheApplicant.
Forin‐personidentityproofingatLevels3and4andforPIV‐I,DigiCertmayrelyonanentitycertifiedbya
state,federal,ornationalentityasauthorizedtoconfirmidentitiesmayperformtheauthenticationonbehalf
oftheRA.ThecertifiedentityshouldforwardtheinformationcollectedfromtheapplicantdirectlytotheRA
inasecuremanner.
3.2.3.1.
Authentication for Role‐based Client Certificates DigiCertmayissuecertificatesthatidentifyaspecificrolethattheSubscriberholds,providedthattherole
identifiesaspecificindividualwithinanorganization(e.g.,ChiefInformationOfficerisauniqueindividual
whereasProgramAnalystisnot).Theserole‐basedcertificatesareusedwhennon‐repudiationisdesired.
DigiCertonlyissuesrole‐basedcertificatestoSubscriberswhofirstobtainanindividualSubscribercertificate
thatisatthesameorhigherassurancelevelastherequestedrole‐basedcertificate.DigiCertmayissue
certificateswiththesameroletomultipleSubscribers.However,DigiCertrequiresthateachcertificatehave
auniquekeypair.Individualsmaynotsharetheirissuedrole‐basedcertificatesandarerequiredtoprotect
therole‐basedcertificateinthesamemannerasindividualcertificates.
DigiCertverifiestheidentityoftheindividualrequestingarole‐basedcertificate(thesponsor)inaccordance
withSection3.2.3beforeissuingarole‐basedcertificate.ThesponsormustholdaDigiCert‐issuedclient
individualcertificateatthesameorhigherassurancelevelastherole‐basedcertificate.Ifthecertificateisa
pseudonymouscertificatecross‐certifiedwiththeFBCAthatidentifiessubjectsbytheirorganizationalroles,
thenDigiCertoranRAvalidatesthattheindividualeitherholdsthatroleorhastheauthoritytosignon
behalfoftherole.
IGTFandEUQualifiedCertificatesarenotissuedasrole‐basedcertificates.
17
3.2.3.2.
Authentication for Group Client Certificates DigiCertissuesgroupcertificates(acertificatethatcorrespondstoaPrivateKeythatissharedbymultiple
Subscribers)ifseveralentitiesareactinginonecapacityandifnon‐repudiationisnotrequired.Direct
AddressCertificatesandDirectOrganizationalCertificatesareusedasgroupcertificatesconsistentwith
applicablerequirementsoftheDirectProgram.DigiCertortheRArecordstheinformationidentifiedin
Section3.2.3forasponsorbeforeissuingagroupcertificate.ThesponsormustbeatleastanInformation
SystemsSecurityOfficer(ISSO)oroftheequivalentrankorgreaterwithintheorganization.
Thesponsorisresponsibleforensuringcontroloftheprivatekey.Thesponsormustmaintainand
continuouslyupdatealistofSubscriberswithaccesstotheprivatekeyandaccountforthetimeperiod
duringwhicheachSubscriberhadcontrolofthekey.Groupcertificatesmaylisttheidentityofanindividual
inthesubjectNameDNprovidedthatthesubjectNameDNfieldalsoincludesatextstring,suchas“Direct
GroupCert,”sothatthecertificatespecifiesthesubjectisagroupandnotasingleindividual.Client
certificatesissuedinthiswaytoanorganizationarealwaysconsideredgroupclientcertificates.
3.2.3.3.
Authentication of Devices with Human Sponsors DigiCertissuesLevel1,2,3or4ClientandFederatedDeviceCertificatesforuseoncomputingornetwork
devices,providedthattheentityowningthedeviceislistedasthesubject.Inallcases,thedevicehasa
humansponsorwhoprovides:
1. Equipmentidentification(e.g.,serialnumber)orservicename(e.g.,DNSname),
2. Equipmentpublickeys,
3. Equipmentauthorizationsandattributes(ifanyaretobeincludedinthecertificate),and
4. Contactinformation.
Ifthecertificate’ssponsorchanges,thenewsponsorisrequiredtoreviewthestatusofeachdevicetoensure
itisstillauthorizedtoreceivecertificates.Eachsponsorisrequiredtoprovideproofthatthedeviceisstill
underthesponsor’scontrolorresponsibilityonrequest.Sponsorsarecontractuallyobligatedtonotify
DigiCertiftheequipmentisnolongerinuse,nolongerundertheircontrolorresponsibility,ornolonger
requiresacertificate.Allregistrationisverifiedcommensuratewiththerequestedcertificatetype.
3.2.4. Non‐verifiedSubscriberInformation
Level1‐PersonalClientCertificatesareverifiedbyemail,andthecommonnameisnotverifiedasthelegal
nameoftheSubscriber.DVSSLServerCertificatesdonotincludeaverifiedorganizationalidentity.Subjectto
thedeprecationdatelistedinSection3.1.1,OVSSLCertificatesmaycontainapseudo‐domainforusewithin
theSubscriber’sinternal,non‐public‐DNSnetworks.DigiCertdoesnotissueSSLcertificatestodomain
namesorIPaddressesthataSubscriberdoesnotlegitimatelyownorcontrol.DigiCertmayrelyonthe
Subscriber’sindicationofthehostorservernamethatformsthefullyqualifieddomainname.Anyothernon‐
verifiedinformationincludedinacertificateisdesignatedassuchinthecertificate.Unverifiedinformation
isneverincludedinaLevel2,Level,3,Level4,PIV‐I,ObjectSigning,EVSSL,FederatedDevice,orEU
QualifiedCertificate.,
3.2.5. ValidationofAuthority
Theauthorizationofacertificaterequestisverifiedasfollows:
Certificate
Verification
DVSSLServerCertificate
Therequest isverifiedwithanauthorizedcontactlistedwiththe
DomainNameRegistrar,throughapersonwithcontroloverthe
domain,orthroughanout‐of‐bandconfirmationwiththeapplicant.
Apersonwithaccesstoonemoreofthefollowingemailaddressesis
consideredtohavecontroloverthedomain:
[email protected],[email protected],
[email protected],hostmaster@domain,postmaster@domain,or
anyaddresslistedasacontactfieldofthedomain’sDomainName
Registrarrecord.
18
OVSSLServerand
FederatedDevice
Certificates
EVCertificates
ObjectSigningCertificates
andAdobeSigning
Certificates
TherequestisverifiedinaccordancewithSection11.2.3ofthe
BaselineRequirementsusingareliablemethodofcommunication.
TherequestisverifiedinaccordancewiththeEVGuidelines.
Ifthecertificatenamesanorganization,therequester’scontact
informationisverifiedwithanauthoritativesourcewithinthe
applicant’sorganizationusingareliablemethodofcommunication.
Thecontactinformationisthenusedtoconfirmtheauthenticityofthe
certificaterequest.
Level1ClientCertificates‐ Therequestisverifiedthroughtheemailaddresslistedinthe
Personal
certificate.
(emailcertificates)
Level1ClientCertificates‐ Therequestisverifiedwithapersonwhohastechnicalor
Enterprise
administrativecontroloverthedomainandtheemailaddresstobe
(emailcertificates)
listedinthecertificate.
ClientCertificatesLevels2, TheorganizationnamedinthecertificateconfirmstoDigiCertor
3and4andPIV‐I
anRAthattheindividualisauthorizedtoobtainthecertificate.
Certificates
Theorganizationisrequiredtorequestrevocationofthecertificate
whenthataffiliationends.
DirectAddressandDirect Theentitynamedinthecertificateauthorizes aHISPtoorderthe
OrganizationCertificates
certificateandusetherelatedprivatekeyontheentity’sbehalf.The
HISPISSOisresponsiblefortrackingaccesstoandensuringproper
useoftheprivatekey.
IGTFCertificates
Anauthorizedindividualapprovesthecertificaterequest.Fordevice
certificates,theRAretainscontactinformationforeachdevice’s
registeredowner.ThedeviceownerisrequiredtonotifytheRAand
requestrevocationifthedevicesponsorisnolongerauthorizedtouse
thedeviceortheFQDNinthecertificate.
EUQualifiedCertificates
DigiCertverifies thattheindividualisassociatedwiththe
organizationlistedinthecertificate(ifany)andthatthe
organizationconsentedtotheissuanceofthecertificate.
AnorganizationmaylimitwhoisauthorizedtorequestcertificatesbysendingarequesttoDigiCert.A
requesttolimitauthorizedindividualsisnoteffectiveuntilapprovedbyDigiCert.DigiCertwillrespondtoan
organization’sverifiedrequestforDigiCert’slistofitsauthorizedrequesters.
3.3.
IDENTIFICATIONANDAUTHENTICATIONFORRE‐KEYREQUESTS
3.3.1. IdentificationandAuthenticationforRoutineRe‐key
Subscribersmayrequestre‐keyofacertificatepriortoacertificate’sexpiration.Afterreceivingarequestfor
re‐key,DigiCertcreatesanewcertificatewiththesamecertificatecontentsexceptforanewPublicKeyand,
optionally,anextendedvalidityperiod.Ifthecertificatehasanextendedvalidityperiod,DigiCertmay
performsomerevalidationoftheApplicantbutmayalsorelyoninformationpreviouslyprovidedor
obtained.
Subscribersre‐establishtheiridentityasfollows:
Certificate
RoutineRe‐KeyAuthentication
Re‐VerificationRequired
DVandOVSSLServerand
Usernameandpassword
Atleastevery39months
DeviceCertificates
EVSSLCertificates
Usernameandpassword
AccordingtotheEVGuidelines
SubscriberEVCodeSigning Usernameandpassword
Atleastevery39months
Certificates
SigningAuthorityEVCode
Usernameandpassword
Atleastevery123months
SigningCertificates
19
TimestampEVCodeSigning Usernameandpassword
Certificates
Atleastevery123months
ObjectSigningCertificates
(includingAdobeSigning
Certificates)
Level1ClientCertificates
Level2ClientCertificates
Atleasteverysixyears
Usernameandpassword
Usernameandpassword
Atleasteverynineyears
Currentsignaturekeyormulti‐
Atleasteverynineyears
factorauthenticationmeetingNIST
SP800‐63Level3
Level3and4Client
Currentsignaturekeyormulti‐
Atleasteverynineyears
CertificatesandPIV‐I
factorauthenticationmeetingNIST
Certificates
SP800‐63Level3
FederatedDeviceand
Currentsignaturekeyormulti‐
Atleasteverynineyears
FederatedDevice‐hardware factorauthenticationmeetingNIST‐
800‐63Level3
IGTFCertificates
Usernameandpassword,RA
Atleastevery13months.However,
attestationaftercomparisonof
certificatesassociatedwithaprivate
identitydocuments,re‐authenticate keyrestrictedsolelytoahardware
throughanapprovedIdM,or
tokenmayberekeyedorrenewed
throughassociatedprivatekey
foraperiodofupto5years
AuthenticationCertificates Usernameandpasswordorwith
None
associatedprivatekey
DigiCertdoesnotre‐keyacertificatewithoutadditionalauthenticationifdoingsowouldallowtheSubscriber
tousethecertificatebeyondthelimitsdescribedabove.
3.3.2. IdentificationandAuthenticationforRe‐keyAfterRevocation
Ifacertificatewasrevokedforanyreasonotherthanarenewal,update,ormodificationaction,thenthe
Subscribermustundergotheinitialregistrationprocesspriortorekeyingthecertificate.
3.4.
IDENTIFICATIONANDAUTHENTICATIONFORREVOCATIONREQUEST
DigiCertoranRAauthenticatesallrevocationrequests.DigiCertmayauthenticaterevocationrequestsby
referencingtheCertificate’sPublicKey,regardlessofwhethertheassociatedPrivateKeyiscompromised.
4. CERTIFICATELIFE‐CYCLEOPERATIONALREQUIREMENTS
4.1.
CERTIFICATEAPPLICATION
4.1.1. WhoCanSubmitaCertificateApplication
EithertheApplicantoranindividualauthorizedtorequestcertificatesonbehalfoftheApplicantmaysubmit
certificaterequests.ApplicantsareresponsibleforanydatathattheApplicantoranagentoftheApplicant
suppliestoDigiCert.
EVCertificaterequestsmustbesubmittedbyanauthorizedCertificateRequesterandapprovedbya
CertificateApprover.Thecertificaterequestmustbeaccompaniedbyasigned(inwritingorelectronically)
SubscriberAgreementfromaContractSigner.
DigiCertdoesnotissuecertificatestoentitiesonagovernmentdeniedlistmaintainedbytheUnitedStatesor
thatislocatedinacountrywithwhichthelawsoftheUnitedStatesprohibitdoingbusiness.
4.1.2. EnrollmentProcessandResponsibilities
Innoparticularorder,theenrollmentprocessincludes:
1. Submittingacertificateapplication,
20
2.
3.
4.
5.
4.2.
Generatingakeypair,
DeliveringthepublickeyofthekeypairtoDigiCert,
AgreeingtotheapplicableSubscriberAgreement,and
Payinganyapplicablefees.
CERTIFICATEAPPLICATIONPROCESSING
4.2.1. PerformingIdentificationandAuthenticationFunctions
Afterreceivingacertificateapplication,DigiCertoranRAverifiestheapplicationinformationandother
informationinaccordancewithSection3.2.IfanRAassistsintheverification,theRAmustcreateand
maintainrecordssufficienttoestablishthatithasperformeditsrequiredverificationtasksandcommunicate
thecompletionofsuchperformancetoDigiCert.Afterverificationiscomplete,DigiCertevaluatesthecorpus
ofinformationanddecideswhetherornottoissuethecertificate.Aspartofthisevaluation,DigiCertchecks
thecertificateagainstaninternaldatabaseofpreviouslyrevokedcertificatesandrejectedcertificaterequests
toidentifysuspiciouscertificaterequests.Ifsomeorallofthedocumentationusedtosupportanapplication
isinalanguageotherthanEnglish,aDigiCertemployee,RA,oragentskilledinthelanguageperformsthe
finalcross‐correlationandduediligence.
DigiCertconsidersasource’savailability,purpose,andreputationwhendeterminingwhetherathirdparty
sourceisreasonablyreliable.DigiCertdoesnotconsideradatabase,source,orformofidentification
reasonablyreliableifDigiCertortheRAisthesolesourceoftheinformation.
4.2.2. ApprovalorRejectionofCertificateApplications
DigiCertrejectsanycertificateapplicationthatDigiCertoranRAcannotverify.DigiCertmayalsorejecta
certificateapplicationifDigiCertbelievesthatissuingthecertificatecoulddamageordiminishDigiCert’s
reputationorbusiness.
ExceptforEnterpriseEVCertificates,EVCertificateissuanceapprovalrequirestwoseparateDigiCert
validationspecialists.Thesecondvalidationspecialistcannotbethesameindividualwhocollectedthe
documentationandoriginallyapprovedtheEVCertificate.Thesecondvalidationspecialistreviewsthe
collectedinformationanddocumentsanydiscrepanciesordetailsthatrequirefurtherexplanation.The
secondvalidationspecialistmayrequireadditionalexplanationsanddocumentspriortoauthorizingthe
certificate’sissuance.EnterpriseRAsmayperformthefinalcross‐correlationandduediligencedescribed
hereinusingasinglepersonrepresentingtheEnterpriseRA.Ifsatisfactoryexplanationsand/oradditional
documentsarenotreceivedwithinareasonabletime,DigiCertwillrejecttheEVCertificaterequestandnotify
theApplicantaccordingly.
IfthecertificateapplicationisnotrejectedandissuccessfullyvalidatedinaccordancewiththisCPS,DigiCert
willapprovethecertificateapplicationandissuethecertificate.DigiCertisnotliableforanyrejected
certificateandisnotobligatedtodisclosethereasonsforarejection.RejectedApplicantsmayre‐apply.
Subscribersarerequiredtocheckthecertificate’scontentsforaccuracypriortousingthecertificate.
4.2.3. TimetoProcessCertificateApplications
Undernormalcircumstances,DigiCertverifiesanApplicant’sinformationandissuesadigitalcertificate
withinareasonabletimeframe.IssuancetimeframesaregreatlydependentonwhentheApplicantprovides
thedetailsanddocumentationnecessarytocompletevalidation.Fornon‐EVSSLcertificates,DigiCertwill
usuallycompletethevalidationprocessandissueorrejectacertificateapplicationwithintwoworkingdays
afterreceivingallofthenecessarydetailsanddocumentationfromtheApplicant,althougheventsoutsideof
thecontrolofDigiCertcandelaytheissuanceprocess.
21
4.3.
CERTIFICATEISSUANCE
4.3.1. CAActionsduringCertificateIssuance
DigiCertconfirmsthesourceofacertificaterequestbeforeissuance.DigiCertdoesnotissueendentity
certificatesdirectlyfromitsrootcertificates.DatabasesandCAprocessesoccurringduringcertificate
issuanceareprotectedfromunauthorizedmodification.Afterissuanceiscomplete,thecertificateisstoredin
adatabaseandsenttotheSubscriber.
4.3.2. NotificationtoSubscriberbytheCAofIssuanceofCertificate
DigiCertmaydelivercertificatesinanysecuremannerwithinareasonabletimeafterissuance.Generally,
DigiCertdeliverscertificatesviaemailtotheemailaddressdesignatedbytheSubscriberduringthe
applicationprocess.
4.4.
CERTIFICATEACCEPTANCE
4.4.1. ConductConstitutingCertificateAcceptance
SubscribersaresolelyresponsibleforinstallingtheissuedcertificateontheSubscriber’scomputeror
hardwaresecuritymodule.Certificatesareconsideredacceptedontheearlierof(i)theSubscriber’suseof
thecertificateor(ii)30daysafterthecertificate’sissuance.
4.4.2. PublicationoftheCertificatebytheCA
DigiCertpublishesallCAcertificatesinitsrepository.DigiCertpublishesend‐entitycertificatesbydelivering
themtotheSubscriber.
4.4.3. NotificationofCertificateIssuancebytheCAtoOtherEntities
RAsmayreceivenotificationofacertificate’sissuanceiftheRAwasinvolvedintheissuanceprocess.
4.5.
KEYPAIRANDCERTIFICATEUSAGE
4.5.1. SubscriberPrivateKeyandCertificateUsage
SubscribersarecontractuallyobligatedtoprotecttheirPrivateKeysfromunauthorizeduseordisclosure,
discontinueusingaPrivateKeyafterexpirationorrevocationoftheassociatedcertificate,anduse
Certificatesinaccordancewiththeirintendedpurpose.
4.5.2. RelyingPartyPublicKeyandCertificateUsage
RelyingPartiesmayonlyusesoftwarethatiscompliantwithX.509,IETFRFCs,andotherapplicable
standards.DigiCertdoesnotwarrantthatanythirdpartysoftwarewillsupportorenforcethecontrols
andrequirementsfoundherein.
ARelyingPartyshouldusediscretionwhenrelyingonacertificateandshouldconsiderthetotalityofthe
circumstancesandriskoflosspriortorelyingonacertificate.Ifthecircumstancesindicatethatadditional
assurancesarerequired,theRelyingPartymustobtainsuchassurancesbeforeusingthecertificate.Any
warrantiesprovidedbyDigiCertareonlyvalidifaRelyingParty’sreliancewasreasonableandiftheRelying
PartyadheredtotheRelyingPartyAgreementsetforthintheDigiCertrepository.
ARelyingPartyshouldrelyonadigitalsignatureorSSL/TLShandshakeonlyif:
1. thedigitalsignatureorSSL/TLSsessionwascreatedduringtheoperationalperiodofavalid
certificateandcanbeverifiedbyreferencingavalidcertificate,
2. thecertificateisnotrevokedandtheRelyingPartycheckedtherevocationstatusofthecertificate
priortothecertificate’susebyreferringtotherelevantCRLsorOCSPresponses,and
3. thecertificateisbeingusedforitsintendedpurposeandinaccordancewiththisCPS.
22
Beforerelyingonatime‐stamptoken,aRelyingPartymust:
1. verifythatthetime‐stamptokenhasbeencorrectlysignedandthatthePrivateKeyusedtosignthe
time‐stamptokenhasnotbeencompromisedpriortothetimeoftheverification,
2. takeintoaccountanylimitationsontheusageofthetime‐stamptokenindicatedbythetime‐stamp
policy,and
3. takeintoaccountanyotherprecautionsprescribedinthisCPSorelsewhere.
4.6.
CERTIFICATERENEWAL
4.6.1. CircumstanceforCertificateRenewal
DigiCertmayrenewacertificateif:
1. theassociatedpublickeyhasnotreachedtheendofitsvalidityperiod,
2. theSubscriberandattributesareconsistent,and
3. theassociatedprivatekeyremainsuncompromised.
DigiCertmayalsorenewacertificateifaCAcertificateisre‐keyedorasotherwisenecessarytoprovide
servicestoacustomer.DigiCertmaynotifySubscriberspriortoacertificate’sexpirationdate.Certificate
renewalrequirespaymentofadditionalfees.
4.6.2. WhoMayRequestRenewal
Onlythecertificatesubjectoranauthorizedrepresentativeofthecertificatesubjectmayrequestrenewal
oftheSubscriber’scertificates.Forcertificatescross‐certifiedwiththeFBCA,renewalrequestsareonly
acceptedfromcertificatesubjects,PKIsponsors,orRAs.DigiCertmayrenewacertificatewithouta
correspondingrequestifthesigningcertificateisre‐keyed.
4.6.3. ProcessingCertificateRenewalRequests
Renewalapplicationrequirementsandproceduresaregenerallythesameasthoseusedduringthe
certificate’soriginalissuance.DigiCertmayelecttoreusepreviouslyverifiedinformationinitssole
discretionbutwillrefreshanyinformationthatisolderthantheperiodsspecifiedinSection3.3.1.DigiCert
mayrefusetorenewacertificateifitcannotverifyanyrecheckedinformation.Ifanindividualisrenewinga
clientcertificateandtherelevantinformationhasnotchanged,thenDigiCertdoesnotrequireanyadditional
identityvetting. Somedeviceplatforms,e.g.Apache,allowreneweduseofthePrivateKey.IfthePrivateKey
anddomaininformationhasnotchanged,theSubscribermayrenewtheSSLcertificateusingapreviously
issuedcertificateorprovidedCSR.
4.6.4. NotificationofNewCertificateIssuancetoSubscriber
DigiCertmaydeliverthecertificateinanysecurefashion,typicallybyemailorbyprovidingtheSubscribera
hypertextlinktoauserid/password‐protectedlocationwherethesubscribermayloginanddownloadthe
certificate.
4.6.5. ConductConstitutingAcceptanceofaRenewalCertificate
Renewedcertificatesareconsideredacceptedontheearlierof(i)theSubscriber’suseofthecertificateor(ii)
30daysafterthecertificate’srenewal.
4.6.6. PublicationoftheRenewalCertificatebytheCA
DigiCertpublishesarenewedcertificatebydeliveringittotheSubscriber.RenewedCAcertificatesare
publishedinDigiCert’srepository.
4.6.7. NotificationofCertificateIssuancebytheCAtoOtherEntities
RAsmayreceivenotificationofacertificate’srenewaliftheRAwasinvolvedintheissuanceprocess.
23
4.7.
CERTIFICATERE‐KEY
4.7.1. CircumstanceforCertificateRekey
Re‐keyingacertificateconsistsofcreatinganewcertificatewithanewpublickeyandserialnumberwhile
keepingthesubjectinformationthesame.Thenewcertificatemayhaveadifferentvaliditydate,key
identifiers,CRLandOCSPdistributionpoints,andsigningkey.Afterre‐keyingacertificate,aPIV‐I
certificate,orafederateddevicecertificate,DigiCertmayrevoketheoldcertificatebutmaynotfurther
re‐key,renew,ormodifythepreviouscertificate.Subscribersrequestingre‐keyshouldidentifyand
authenticatethemselvesaspermittedbysection3.3.1.
4.7.2. WhoMayRequestCertificateRekey
DigiCertwillonlyacceptre‐keyrequestsfromthesubjectofthecertificateorthePKIsponsor.DigiCertmay
initiateacertificatere‐keyattherequestofthecertificatesubjectorinDigiCert’sowndiscretion.
4.7.3. ProcessingCertificateRekeyRequests
DigiCertwillonlyacceptre‐keyrequestsfromthesubjectofthecertificateorthePKIsponsor.Ifthe
PrivateKeyandanyidentityanddomaininformationinacertificatehavenotchanged,thenDigiCertcan
issueareplacementcertificateusingapreviouslyissuedcertificateorpreviouslyprovidedCSR.DigiCert
re‐usesexistingverificationinformationunlessre‐verificationandauthenticationisrequiredunder
section3.3.1orifDigiCertbelievesthattheinformationhasbecomeinaccurate.
4.7.4. NotificationofCertificateRekeytoSubscriber
DigiCertnotifiestheSubscriberwithinareasonabletimeafterthecertificateissues.
4.7.5. ConductConstitutingAcceptanceofaRekeyedCertificate
Issuedcertificatesareconsideredacceptedontheearlierof(i)theSubscriber’suseofthecertificateor(ii)30
daysafterthecertificateisrekeyed.
4.7.6. PublicationoftheIssuedCertificatebytheCA
DigiCertpublishesrekeyedcertificatesbydeliveringthemtoSubscribers.
4.7.7. NotificationofCertificateIssuancebytheCAtoOtherEntities
RAsmayreceivenotificationofacertificate’srekeyiftheRAwasinvolvedintheissuanceprocess.
4.8.
CERTIFICATEMODIFICATION
4.8.1. CircumstancesforCertificateModification
Modifyingacertificatemeanscreatinganewcertificateforthesamesubjectwithauthenticatedinformation
thatdiffersslightlyfromtheoldcertificate(e.g.,changestoemailaddressornon‐essentialpartsofnamesor
attributes)providedthatthemodificationotherwisecomplieswiththisCPS.Thenewcertificatemayhave
thesameoradifferentsubjectpublickey.Aftermodifyingacertificatethatiscross‐certifiedwiththeFBCA,
DigiCertmayrevoketheoldcertificatebutwillnotfurtherre‐key,renew,ormodifytheoldcertificate.
4.8.2. WhoMayRequestCertificateModification
DigiCertmodifiescertificatesattherequestofcertaincertificatesubjectsorinitsowndiscretion.DigiCert
doesnotmakecertificatemodificationservicesavailabletoallSubscribers.
4.8.3. ProcessingCertificateModificationRequests
Afterreceivingarequestformodification,DigiCertverifiesanyinformationthatwillchangeinthemodified
certificate.DigiCertwillonlyissuethemodifiedcertificateaftercompletingtheverificationprocessonall
modifiedinformation.DigiCertwillnotissueamodifiedcertificatethathasavalidityperiodthatexceedsthe
applicabletimelimitsfoundinsection3.3.1or6.3.2.
24
4.8.4. NotificationofCertificateModificationtoSubscriber
DigiCertnotifiestheSubscriberwithinareasonabletimeafterthecertificateissues.
4.8.5. ConductConstitutingAcceptanceofaModifiedCertificate
Issuedcertificatesareconsideredacceptedontheearlierof(i)theSubscriber’suseofthecertificateor(ii)30
daysafterthecertificateisrekeyed.
4.8.6. PublicationoftheModifiedCertificatebytheCA
DigiCertpublishesmodifiedcertificatesbydeliveringthemtoSubscribers.
4.8.7. NotificationofCertificateModificationbytheCAtoOtherEntities
RAsmayreceivenotificationofacertificate’smodificationiftheRAwasinvolvedintheissuanceprocess.
4.9.
CERTIFICATEREVOCATIONANDSUSPENSION
4.9.1. CircumstancesforRevocation
Revocationofacertificatepermanentlyendstheoperationalperiodofthecertificatepriortothecertificate
reachingtheendofitsstatedvalidityperiod.Priortorevokingacertificate,DigiCertverifiestheidentityand
authorityoftheentityrequestingrevocation.DigiCertmayrevokeanycertificateinitssolediscretion,
includingifDigiCertbelievesthat:
1. TheSubscriberrequestedrevocationofitscertificate;
2. TheSubscriberdidnotauthorizetheoriginalcertificaterequestanddidnotretroactivelygrant
authorization;
3. EitherthePrivateKeyassociatedwiththecertificateorthePrivateKeyusedtosignthecertificate
wascompromisedormisused;
4. TheSubscriberbreachedamaterialobligationundertheCP,theCPS,ortherelevantSubscriber
Agreement;
5. EithertheSubscriber’sorDigiCert’sobligationsundertheCPorCPSaredelayedorpreventedby
circumstancesbeyondtheparty’sreasonablecontrol,includingcomputerorcommunication
failure,and,asaresult,anotherentity’sinformationismateriallythreatenedorcompromised;
6. TheSubscriber,sponsor,orotherentitythatwasissuedthecertificatehaslostitsrightstoaname,
trademark,device,IPaddress,domainname,orotherattributethatwasassociatedwiththe
certificate;
7. Awildcardcertificatewasusedtoauthenticateafraudulentlymisleadingsubordinatedomainname;
8. ThecertificatewasnotissuedinaccordancewiththeCP,CPS,orapplicableindustrystandards;
9. DigiCertreceivedalawfulandbindingorderfromagovernmentorregulatorybodytorevokethe
certificate;
10. DigiCertceasedoperationsanddidnotarrangeforanothercertificateauthoritytoprovide
revocationsupportforthecertificates;
11. DigiCert'srighttomanagecertificatesunderapplicableindustrystandardswasterminated(unless
arrangementshavebeenmadetocontinuerevocationservicesandmaintaintheCRL/OCSP
Repository);
12. AnyinformationappearingintheCertificatewasorbecameinaccurateormisleading;
13. ThetechnicalcontentorformatoftheCertificatepresentsanunacceptablerisktoapplication
softwarevendors,RelyingParties,orothers;
14. TheSubscriberwasaddedasadeniedpartyorprohibitedpersontoablacklistorisoperatingfroma
destinationprohibitedunderthelawsoftheUnitedStates;
15. ForAdobeSigningCertificates,Adobehasrequestedrevocation;or
16. Forcode‐signingcertificates,thecertificatewasusedtosign,publish,ordistributemalware,code
thatisdownloadedwithoutuserconsent,orotherharmfulcontent.
DigiCertalwaysrevokesacertificateifthebindingbetweenthesubjectandthesubject’spublickeyinthe
certificateisnolongervalidorifanassociatedPrivateKeyiscompromised.
25
DigiCertwillrevokeacross‐certificateifthecross‐certifiedentity(includingDigiCert)nolongermeetsthe
stipulationsofthecorrespondingpolicies,asindicatedbypolicyOIDslistedinthepolicymappingextension
ofthecross‐certificate.
4.9.2. WhoCanRequestRevocation
Anyappropriatelyauthorizedparty,suchasarecognizedrepresentativeofasubscriberorcross‐signed
partner,mayrequestrevocationofacertificate.DigiCertmayrevokeacertificatewithoutreceivingarequest
andwithoutreason.Thirdpartiesmayrequestcertificaterevocationforproblemsrelatedtofraud,misuse,or
compromise.Certificaterevocationrequestsmustidentifytheentityrequestingrevocationandspecifythe
reasonforrevocation.
4.9.3. ProcedureforRevocationRequest
DigiCertprocessesarevocationrequestasfollows:
1. DigiCertlogstheidentityofentitymakingtherequestorproblemreportandthereasonfor
requestingrevocation.DigiCertmayalsoincludeitsownreasonsforrevocationinthelog.
2. DigiCertmayrequestconfirmationoftherevocationfromaknownadministrator,whereapplicable,
viaout‐of‐bandcommunication(e.g.,telephone,fax,etc.).
3. IftherequestisauthenticatedasoriginatingfromtheSubscriber,DigiCertrevokesthecertificate.
4. Forrequestsfromthirdparties,DigiCertpersonnelbegininvestigatingtherequestwithin24hours
afterreceiptanddecidewhetherrevocationisappropriatebasedonthefollowingcriteria:
a. thenatureoftheallegedproblem,
b. thenumberofreportsreceivedaboutaparticularcertificateorwebsite,
c. theidentityofthecomplainants(forexample,complaintsfromalawenforcementofficial
thatawebsiteisengagedinillegalactivitieshavemoreweightthanacomplaintfroma
consumerallegingtheyneverreceivedthegoodstheyordered),and
d. relevantlegislation.
5. IfDigiCertdeterminesthatrevocationisappropriate,DigiCertpersonnelrevokethecertificateand
updatetheCRL.
DigiCertmaintainsacontinuous24/7abilitytointernallyrespondtoanyhighpriorityrevocationrequests.If
appropriate,DigiCertforwardscomplaintstolawenforcement.
WheneveraPIV‐ICardisnolongervalid,theRAresponsibleforitsissuanceormaintenanceisrequiredto
collectthePIV‐ICardfromtheSubscriberassoonaspossibleanddestroythePIV‐ICard.TheRAmustlogthe
collectionandphysicaldestructionofeachPIV‐ICard.
4.9.4. RevocationRequestGracePeriod
Subscribersarerequiredtorequestrevocationwithinonedayafterdetectingthelossorcompromiseofthe
PrivateKey.DigiCertmaygrantandextendrevocationgraceperiodsonacase‐by‐casebasis.DigiCert
reportsthesuspectedcompromiseofitsCAprivatekeyandrequestsrevocationtoboththepolicyauthority
andoperatingauthorityofthesuperiorissuingCAwithinonehourofdiscovery.
4.9.5. TimewithinwhichCAMustProcesstheRevocationRequest
DigiCertwillrevokeaCAcertificatewithinonehourafterreceivingclearinstructionsfromtheDCPA.Other
certificatesarerevokedasquicklyaspracticalaftervalidatingtherevocationrequest,generallywithinthe
followingtimeframes:
1. Certificaterevocationrequestsforpublicly‐trustedcertificatesareprocessedwithin18hoursafter
theirreceipt,
2. RevocationrequestsreceivedtwoormorehoursbeforeCRLissuanceareprocessedbeforethenext
CRLispublished,and
3. RevocationrequestsreceivedwithintwohoursofCRLissuanceareprocessedbeforethefollowing
CRLispublished.
26
4.9.6. RevocationCheckingRequirementforRelyingParties
Priortorelyingoninformationlistedinacertificate,aRelyingPartymustconfirmthevalidityofeach
certificateinthecertificatepathinaccordancewithIETFPKIXstandards,includingcheckingforcertificate
validity,issuer‐to‐subjectnamechaining,policyandkeyuseconstraints,andrevocationstatusthroughCRLs
orOCSPrespondersidentifiedineachcertificateinthechain.
4.9.7. CRLIssuanceFrequency
DigiCertusesitsofflinerootCAstopublishCRLsforitsintermediateCAsatleastevery6months.Foran
offlineCAthathasbeencross‐signedbytheFederalBridgeCAandonlyissuesCAcertificates,certificate‐
status‐checkingcertificates,orinternaladministrativecertificates,DigiCertissuesaCRLatleastevery31
days.AllotherCRLsarepublishedatleastevery24hours.IfaCertificateisrevokedforreasonofkey
compromise,aninterimCRLispublishedassoonasfeasible,butnolaterthan18hoursafterreceiptofthe
noticeofkeycompromise.
4.9.8. MaximumLatencyforCRLs
CRLsforcertificatesissuedtoendentitysubscribersarepostedautomaticallytotheonlinerepositorywithin
acommerciallyreasonabletimeaftergeneration,usuallywithinminutesofgeneration.Irregular,interim,or
emergencyCRLsarepostedwithinfourhoursaftergenerationandwithin18hoursofdeterminingofthe
occurrenceofakeycompromise.RegularlyscheduledCRLsarepostedpriortothenextUpdatefieldinthe
previouslyissuedCRLofthesamescope.
4.9.9. On‐lineRevocation/StatusCheckingAvailability
DigiCertmakescertificatestatusinformationavailableviaOCSPforSSLandPIV‐Icertificates.OCSPmaynot
beavailableforotherkindsofcertificates.WhereOCSPsupportisrequiredbytheapplicableCP,OCSP
responsesareprovidedwithinacommerciallyreasonabletimeandnolaterthansixsecondsaftertherequest
isreceived,subjecttotransmissionlatenciesovertheInternet.
4.9.10. On‐lineRevocationCheckingRequirements
Arelyingpartymustconfirmthevalidityofacertificateinaccordancewithsection4.9.6priortorelyingon
thecertificate.
4.9.11. OtherFormsofRevocationAdvertisementsAvailable
Nostipulation.
4.9.12. SpecialRequirementsRelatedtoKeyCompromise
DigiCertusescommerciallyreasonableeffortstonotifypotentialRelyingPartiesifitdiscoversorsuspectsthe
compromiseofaPrivateKey.DigiCertwilltransitionanyrevocationreasoncodeinaCRLto“key
compromise”upondiscoveryofsuchreasonorasrequiredbyanapplicableCP.Ifacertificateisrevoked
becauseofcompromise,DigiCertwillissueanewCRLwithin18hoursafterreceivingnoticeofthe
compromise.
4.9.13. CircumstancesforSuspension
Notapplicable.
4.9.14. WhoCanRequestSuspension
Notapplicable.
4.9.15. ProcedureforSuspensionRequest
Notapplicable.
4.9.16. LimitsonSuspensionPeriod
Notapplicable.
27
4.10. CERTIFICATESTATUSSERVICES
4.10.1. OperationalCharacteristics
CertificatestatusinformationisavailableviaCRLandOCSPresponder.Theserialnumberofarevoked
certificateremainsontheCRLuntiloneadditionalCRLispublishedaftertheendofthecertificate’svalidity
period,exceptforrevokedEVCodeSigningCertificates,whichremainontheCRLforatleast365days
followingthecertificate’svalidityperiod.OCSPinformationforsubscribercertificatesisupdatedatleast
everyfourdays.OCSPinformationforsubordinateCAcertificatesisupdatedatleastevery12monthsand
within24hoursafterrevokingthecertificate.
4.10.2. ServiceAvailability
Certificatestatusservicesareavailable24x7withoutinterruption.
4.10.3. OptionalFeatures
OCSPRespondersmaynotbeavailableforallcertificatetypes.
4.11. ENDOFSUBSCRIPTION
ASubscriber’ssubscriptionserviceendsifitscertificateexpiresorisrevokedoriftheapplicableSubscriber
Agreementexpireswithoutrenewal.
4.12. KEYESCROWANDRECOVERY
4.12.1. KeyEscrowandRecoveryPolicyPractices
DigiCertneverescrowsCAPrivateKeys.
DigiCertmayescrowSubscriberkeymanagementkeystoprovidekeyrecoveryservices.DigiCertencrypts
andprotectsescrowedPrivateKeysusingthesameorahigherlevelofsecurityasusedtogenerateand
deliverthePrivateKey.ASubscriber’sprivatesignaturekeysarenotescrowedexceptasallowedbyother
supersedingpoliciesoragreementsamongSubscribers,RelyingParties,andescrowagents.
DigiCertallowsSubscribersandotherauthorizedentitiestorecoverescrowed(decryption)PrivateKeys.
DigiCertusesmulti‐personcontrolsduringkeyrecoverytopreventunauthorizedaccesstoaSubscriber’s
escrowedPrivateKeys.DigiCertacceptskeyrecoveryrequests:
1. FromtheSubscriberorSubscriber’sorganization,iftheSubscriberhaslostordamagedtheprivate
keytoken;
2. FromtheSubscriber’sorganization,iftheSubscriberisnotavailableorisnolongerpartofthe
organizationthatcontractedwithDigiCertforPrivateKeyescrow;
3. Fromanauthorizedinvestigatororauditor,ifthePrivateKeyispartofarequiredinvestigationor
audit;
4. Fromarequesterauthorizedbyacompetentlegalauthoritytoaccessthecommunicationthatis
encryptedusingthekey;
5. Fromarequesterauthorizedbylaworgovernmentalregulation;or
6. FromanentitycontractingwithDigiCertforescrowofthePrivateKeywhenkeyrecoveryismission
criticalormissionessential.
EntitiesusingDigiCert’skeyescrowservicesarerequiredto:
1. NotifySubscribersthattheirPrivateKeysareescrowed;
2. Protectescrowedkeysfromunauthorizeddisclosure;
3. ProtectanyauthenticationmechanismsthatcouldbeusedtorecoverescrowedPrivateKeys;
4. Releaseanescrowedkeyonlyaftermakingorreceiving(asapplicable)aproperlyauthorizedrequest
forrecovery;and
5. Complywithanylegalobligationstodiscloseorkeepconfidentialescrowedkeys,escrowedkey‐
relatedinformation,orthefactsconcerninganykeyrecoveryrequestorprocess.
28
4.12.2. SessionKeyEncapsulationandRecoveryPolicyandPractices
Nostipulation.
5. FACILITY,MANAGEMENT,ANDOPERATIONALCONTROLS
5.1.
PHYSICALCONTROLS
5.1.1. SiteLocationandConstruction
DigiCertperformsitsCAandTSAoperationsfromsecureandgeographicallydiversecommercialdata
centers.ThedatacentersareequippedwithlogicalandphysicalcontrolsthatmakeDigiCert’sCAandTSA
operationsinaccessibletonon‐trustedpersonnel.DigiCertoperatesunderasecuritypolicydesignedto
detect,deter,andpreventunauthorizedaccesstoDigiCert'soperations.
5.1.2. PhysicalAccess
DigiCertprotectsitsequipment(includingcertificatestatusserversandCMSequipmentcontainingPIV‐I
ContentSigningkeys)fromunauthorizedaccessandimplementsphysicalcontrolstoreducetheriskof
equipmenttampering.ThesecurepartsofDigiCertCAhostingfacilitiesareprotectedusingphysicalaccess
controlsmakingthemaccessibleonlytoappropriatelyauthorizedindividuals.
Accesstosecureareasofthebuildingsrequirestheuseofan"access"or"pass"card.Thebuildingsare
equippedwithmotiondetectingsensors,andtheexteriorandinternalpassagewaysofthebuildingsare
underconstantvideosurveillance.DigiCertsecurelystoresallremovablemediaandpapercontaining
sensitiveplain‐textinformationrelatedtoitsCAoperationsinsecurecontainersinaccordancewithitsData
ClassificationPolicy.
5.1.2.1.
Data Center ThedatacenterswhereDigiCert’sCAandTSAsystemsoperatehavesecuritypersonnelondutyfulltime(24
hoursperday,365daysperyear).AccesstothedatacentershousingtheCAandTSAplatformsrequires
two‐factorauthentication—theindividualmusthaveanauthorizedaccesscardandpassbiometricaccess
controlauthenticators.Thesebiometricauthenticationaccesssystemslogeachuseoftheaccesscard.
DigiCertdeactivatesandsecurelystoresitsCAequipmentwhennotinuse.Activation data must either be
memorized or recorded and stored in a manner commensurate with the security afforded the cryptographic module.
Activation data is never stored with the cryptographic module or removable hardware associated with equipment
used to administer DigiCert’s private keys.Cryptographichardwareincludesamechanismtolockthe
hardwareafteracertainnumberoffailedloginattempts.
The DigiCert data centers are continuously attended. However,ifDigiCerteverbecomesawarethatadata
centeristobeleftunattendedorhasbeenleftunattendedforanextendedperiodoftime,DigiCertpersonnel
willperformasecuritycheckofthedatacentertoverifythat:
1. DigiCert’sequipmentisinastateappropriatetothecurrentmodeofoperation,
2. Anysecuritycontainersareproperlysecured,
3. Physicalsecuritysystems(e.g.,doorlocks)arefunctioningproperly,and
4. Theareaissecuredagainstunauthorizedaccess.
DigiCert’sadministratorsareresponsibleformakingthesechecksandmustsignoffthatallnecessary
physicalprotectionmechanismsareinplaceandactivated.Theidentityoftheindividualmakingthecheckis
logged.
5.1.2.2.
Support and Vetting Room Controlledaccessandkeyed‐lockdoorssecurethesupportandvettingroomswhereDigiCertpersonnel
performidentityvettingandotherRAfunctions.Accesscarduseisloggedbythebuildingsecuritysystem.
Theroomisequippedwithmotion‐activatedvideosurveillancecameras.
29
5.1.3. PowerandAirConditioning
Datacentershaveprimaryandsecondarypowersuppliesthatensurecontinuousanduninterruptedaccess
toelectricpower.Uninterruptedpowersupplies(UPS)anddieselgeneratorsprovideredundantbackup
power.DigiCertmonitorscapacitydemandsandmakesprojectionsaboutfuturecapacityrequirementsto
ensurethatadequateprocessingpowerandstorageareavailable.
DigiCert’sdatacenterfacilitiesusemultipleload‐balancedHVACsystemsforheating,cooling,andair
ventilationthroughperforated‐tileraisedflooringtopreventoverheatingandtomaintainasuitablehumidity
levelforsensitivecomputersystems.
5.1.4. WaterExposures
ThecabinetshousingDigiCert'sCAandTSAsystemsarelocatedonraisedflooring,andthedatacentersare
equippedwithmonitoringsystemstodetectexcessmoisture.
5.1.5. FirePreventionandProtection
Thedatacentersareequippedwithfiresuppressionmechanisms.
5.1.6. MediaStorage
DigiCertprotectsitsmediafromaccidentaldamageandunauthorizedphysicalaccess.Backupfilesare
createdonadailybasis.Onaweeklybasis,backupmediaareremovedandstoredinabackuplocationthat
isseparatefromDigiCert’sprimaryfacility.
5.1.7. WasteDisposal
Allunnecessarycopiesofprintedsensitiveinformationareshreddedon‐sitebeforedisposal.Allelectronic
mediaarezeroized(alldataisoverwrittenwithbinaryzerossoastopreventtherecoveryofthedata)using
programsmeetingU.S.DepartmentofDefenserequirements.
5.1.8. Off‐siteBackup
DigiCertmaintainsatleastonefullbackupandmakesregularbackupcopiesofanyinformationnecessaryto
recoverfromasystemfailure.Onatleastaweeklybasis,DigiCertmovesmediadesignatedforstorageoff‐
sitetoasafedepositboxlocatedinsideafederallyinsuredfinancialinstitution.BackupcopiesofCAPrivate
Keysandactivationdataarestoredoff‐siteinlocationsthatareaccessibleonlybytrustedpersonnel.
5.1.9. CertificateStatusHosting,CMSandExternalRASystems
AllphysicalcontrolrequirementsunderSection5.1applyequallytoanyCertificateStatusHosting,CMS,or
externalRAsystem.
5.2.
PROCEDURALCONTROLS
5.2.1. TrustedRoles
PersonnelactingintrustedrolesincludeCA,TSA,andRAsystemadministrationpersonnel,andpersonnel
involvedwithidentityvettingandtheissuanceandrevocationofcertificates.Thefunctionsandduties
performedbypersonsintrustedrolesaredistributedsothatonepersonalonecannotcircumventsecurity
measuresorsubvertthesecurityandtrustworthinessofthePKIorTSAoperations.Allpersonnelintrusted
rolesmustbefreefromconflictsofinterestthatmightprejudicetheimpartialityoftheDigiCertPKI’s
operations.Trustedrolesareappointedbyseniormanagement.Alistofpersonnelappointedtotrusted
rolesismaintainedandreviewedannually.
PersonsactingintrustedrolesareonlyallowedtoaccessaCMSaftertheyareauthenticatedusingamethod
commensuratewithissuanceandcontrolofPIV‐IHardware.
30
5.2.1.1.
CA Administrators TheCAAdministratorinstallsandconfigurestheCAsoftware,includingkeygeneration,keybackup,andkey
management.TheCAAdministratorperformsandsecurelystoresregularsystembackupsoftheCAsystem.
AdministratorsdonotissuecertificatestoSubscribers.
5.2.1.2.
CA Officers – CMS, RA, Validation and Vetting Personnel TheCAOfficerroleisresponsibleforissuingandrevokingcertificates,includingenrollment,identity
verification,andcompliancewithrequiredissuanceandrevocationstepssuchasmanagingthecertificate
requestqueueandcompletingcertificateapprovalchecklistsasidentityvettingtasksaresuccessfully
completed.
5.2.1.3.
System Administrators/ System Engineers (Operator) TheSystemAdministrator/SystemEngineerinstallsandconfiguressystemhardware,includingservers,
routers,firewalls,andnetworkconfigurations.TheSystemAdministrator/SystemEngineeralsokeepsCA,
CMSandRAsystemsupdatedwithsoftwarepatchesandothermaintenanceneededforsystemstabilityand
recoverability.
5.2.1.4.
Internal Auditors InternalAuditorsareresponsibleforreviewing,maintaining,andarchivingauditlogsandperformingor
overseeinginternalcomplianceauditstodetermineifDigiCert,anIssuerCA,orRAisoperatinginaccordance
withthisCPSoranRA’sRegistrationPracticesStatement.
5.2.2. NumberofPersonsRequiredperTask
DigiCertrequiresthatatleasttwopeopleactinginatrustedrole(onetheCAAdministratorandtheothernot
anInternalAuditor)takeactionrequiringatrustedrole,suchasactivatingDigiCert’sPrivateKeys,
generatingaCAkeypair,orbackingupaDigiCertprivatekey.TheInternalAuditormayservetofulfillthe
requirementofmultipartycontrolforphysicalaccesstotheCAsystembutnotlogicalaccess.
NosingleindividualhasthecapabilitytoissueaPIV‐Icredential.
5.2.3. IdentificationandAuthenticationforeachRole
AllpersonnelarerequiredtoauthenticatethemselvestoCA,TSA,andRAsystemsbeforetheyareallowed
accesstosystemsnecessarytoperformtheirtrustedroles.
5.2.4. RolesRequiringSeparationofDuties
Rolesrequiringaseparationofdutiesinclude:
1. Thoseperformingauthorizationfunctionssuchastheverificationofinformationincertificate
applicationsandapprovalsofcertificateapplicationsandrevocationrequests,
2. Thoseperformingbackups,recording,andrecordkeepingfunctions;
3. Thoseperformingaudit,review,oversight,orreconciliationfunctions;and
4. ThoseperformingdutiesrelatedtoCA/TSAkeymanagementorCA/TSAadministration.
Toaccomplishthisseparationofduties,DigiCertspecificallydesignatesindividualstothetrustedroles
definedinSection5.2.1above.DigiCertappointsindividualstoonlyoneoftheOfficer,Administrator,
Operator,orAuditorroles.DigiCert’ssystemsidentifyandauthenticateindividualsactingintrustedroles,
restrictanindividualfromassumingmultipleroles,andpreventanyindividualfromhavingmorethanone
identity.
5.3.
PERSONNELCONTROLS
5.3.1. Qualifications,Experience,andClearanceRequirements
TheDCPAisresponsibleandaccountableforDigiCert’sPKIoperationsandensurescompliancewiththisCPS
andtheCP.DigiCert’spersonnelandmanagementpracticesprovidereasonableassuranceofthe
trustworthinessandcompetenceofitsemployeesandofthesatisfactoryperformanceoftheirduties.All
31
trustedrolesforCAsissuingFederatedDeviceCertificates,ClientCertificatesatLevels3‐USand4‐US(which
areintendedforinteroperabilitythroughtheFederalBridgeCAatid‐fpki‐certpcy‐mediumAssuranceandid‐
fpki‐certpcy‐mediumHardware),andPIV‐ICertificatesareheldbycitizensoftheUnitedStates.Anindividual
performingatrustedroleforanRAmaybeacitizenofthecountrywheretheRAislocated.Thereisno
citizenshiprequirementforpersonnelperformingtrustedrolesassociatedwiththeissuanceofotherkindsof
certificates.
Managementandoperationalsupportpersonnelinvolvedintime‐stampoperationspossessexperiencewith
informationsecurityandriskassessmentandknowledgeoftime‐stampingtechnology,digitalsignature
technology,mechanismsforcalibrationoftimestampingclockswithUTC,andsecurityprocedures.The
DCPAensuresthatallindividualsassignedtotrustedroleshavetheexperience,qualifications,and
trustworthinessrequiredtoperformtheirdutiesunderthisCPS.
5.3.2. BackgroundCheckProcedures
DigiCertverifiestheidentityofeachemployeeappointedtoatrustedroleandperformsabackgroundcheck
priortoallowingsuchpersontoactinatrustedrole.DigiCertrequireseachindividualtoappearin‐person
beforeahumanresourcesemployeewhoseresponsibilityitistoverifyidentity.Thehumanresources
employeeverifiestheindividual’sidentityusinggovernment‐issuedphotoidentification(e.g.,passports
and/ordriver’slicensesreviewedpursuanttoU.S.CitizenshipandImmigrationServicesFormI‐9,
EmploymentEligibilityVerification,orcomparableprocedureforthejurisdictioninwhichtheindividual’s
identityisbeingverified).Backgroundchecksincludeemploymenthistory,education,characterreferences,
socialsecuritynumber,previousresidences,drivingrecordsandcriminalbackground.Checksofprevious
residencesareoverthepastthreeyears.Allotherchecksareforthepreviousfiveyears.Thehighest
educationdegreeobtainedisverifiedregardlessofthedateawarded.Backgroundchecksarerefreshed
atleasteverytenyears.
5.3.3. TrainingRequirements
DigiCertprovidesskillstrainingtoallemployeesinvolvedinDigiCert’sPKIandTSAoperations.Thetraining
relatestotheperson’sjobfunctionsandcovers:
1. basicPublicKeyInfrastructure(PKI)knowledge,
2. softwareversionsusedbyDigiCert,
3. authenticationandverificationpoliciesandprocedures,
4. DigiCertsecurityprincipalsandmechanisms,
5. disasterrecoveryandbusinesscontinuityprocedures,
6. commonthreatstothevalidationprocess,includingphishingandothersocialengineeringtactics,
and
7. applicableindustryandgovernmentguidelines.
Trainingisprovidedviaamentoringprocessinvolvingseniormembersoftheteamtowhichtheemployee
belongs.
DigiCertmaintainsrecordsofwhoreceivedtrainingandwhatleveloftrainingwascompleted.Validation
Specialistsmusthavetheminimumskillsnecessarytosatisfactorilyperformvalidationdutiesbeforebeing
grantedvalidationprivileges.AllValidationSpecialistsarerequiredtopassaninternalexaminationonthe
EVGuidelinesandtheBaselineRequirementspriortovalidatingandapprovingtheissuanceofcertificates.
Wherecompetenceisdemonstratedinlieuoftraining,DigiCertmaintainssupportingdocumentation.
5.3.4. RetrainingFrequencyandRequirements
Employeesmustmaintainskilllevelsthatareconsistentwithindustry‐relevanttrainingandperformance
programsinordertocontinueactingintrustedroles.DigiCertmakesallemployeesactingintrustedroles
awareofanychangestoDigiCert’soperations.IfDigiCert’soperationschange,DigiCertwillprovide
documentedtraining,inaccordancewithanexecutedtrainingplan,toallemployeesactingintrustedroles.
5.3.5. JobRotationFrequencyandSequence
Nostipulation.
32
5.3.6. SanctionsforUnauthorizedActions
DigiCertemployeesandagentsfailingtocomplywiththisCPS,whetherthroughnegligenceormalicious
intent,aresubjecttoadministrativeordisciplinaryactions,includingterminationofemploymentoragency
andcriminalsanctions.Ifapersoninatrustedroleiscitedbymanagementforunauthorizedor
inappropriateactions,thepersonwillbeimmediatelyremovedfromthetrustedrolependingmanagement
review.Aftermanagementhasreviewedanddiscussedtheincidentwiththeemployeeinvolved,
managementmayreassignthatemployeetoanon‐trustedroleordismisstheindividualfromemploymentas
appropriate.
5.3.7. IndependentContractorRequirements
Independentcontractorswhoareassignedtoperformtrustedrolesaresubjecttothedutiesand
requirementsspecifiedforsuchrolesinthisSection5.3andaresubjecttosanctionsstatedaboveinSection
5.3.6.
5.3.8. DocumentationSuppliedtoPersonnel
Personnelintrustedrolesareprovidedwiththedocumentationnecessarytoperformtheirduties,including
acopyoftheCP,thisCPS,EVGuidelines,andothertechnicalandoperationaldocumentationneededto
maintaintheintegrityofDigiCert'sCAoperations.Personnelarealsogivenaccesstoinformationoninternal
systemsandsecuritydocumentation,identityvettingpoliciesandprocedures,discipline‐specificbooks,
treatisesandperiodicals,andotherinformation.
5.4.
AUDITLOGGINGPROCEDURES
5.4.1. TypesofEventsRecorded
DigiCert’ssystemsrequireidentificationandauthenticationatsystemlogonwithauniqueusernameand
password.Importantsystemactionsareloggedtoestablishtheaccountabilityoftheoperatorswhoinitiate
suchactions.
DigiCertenablesallessentialeventauditingcapabilitiesofitsCAandTSAapplicationsinordertorecordthe
eventslistedbelow.IfDigiCert’sapplicationscannotautomaticallyrecordanevent,DigiCertimplements
manualprocedurestosatisfytherequirements.Foreachevent,DigiCertrecordstherelevant(i)dateand
time,(ii)typeofevent,(iii)successorfailure,and(iv)userorsystemthatcausedtheeventorinitiatedthe
action.DigiCertrecordstheprecisetimeofanysignificantTSAevents.Alleventrecordsareavailableto
auditorsasproofofDigiCert’spractices.
AuditableEvent
SECURITYAUDIT
Anychangestotheauditparameters,e.g.,auditfrequency,typeofeventaudited
Anyattempttodeleteormodifytheauditlogs
AUTHENTICATIONTOSYSTEMS
Successfulandunsuccessfulattemptstoassumearole
Thevalueofmaximumnumberofauthenticationattemptsischanged
Maximumnumberofauthenticationattemptsoccurduringuserlogin
Anadministratorunlocksanaccountthathasbeenlockedasaresultofunsuccessful
authenticationattempts
Anadministratorchangesthetypeofauthenticator,e.g.,fromapasswordtoabiometric
LOCALDATAENTRY
Allsecurity‐relevantdatathatisenteredinthesystem
REMOTEDATAENTRY
Allsecurity‐relevantmessagesthatarereceivedbythesystem
DATAEXPORTANDOUTPUT
Allsuccessfulandunsuccessfulrequestsforconfidentialandsecurity‐relevantinformation
KEYGENERATION
WheneveraCAgeneratesakey(notmandatoryforsinglesessionorone‐timeusesymmetric
33
AuditableEvent
keys)
PRIVATEKEYLOADANDSTORAGE
TheloadingofComponentPrivateKeys
AllaccesstocertificatesubjectPrivateKeysretainedwithintheCAforkeyrecoverypurposes
TRUSTEDPUBLICKEYENTRY,DELETIONANDSTORAGE
SECRETKEYSTORAGE
Themanualentryofsecretkeysusedforauthentication
PRIVATEANDSECRETKEYEXPORT
Theexportofprivateandsecretkeys(keysusedforasinglesessionormessageareexcluded)
CERTIFICATEREGISTRATION
Allcertificaterequests,includingissuance,re‐key,renewal,andrevocation
Certificateissuance
Verificationactivities
CERTIFICATEREVOCATION
Allcertificaterevocationrequests
CERTIFICATESTATUSCHANGEAPPROVALANDREJECTION
CACONFIGURATION
Anysecurity‐relevantchangestotheconfigurationofaCAsystemcomponent
ACCOUNTADMINISTRATION
Rolesandusersareaddedordeleted
Theaccesscontrolprivilegesofauseraccountorarolearemodified
CERTIFICATEPROFILEMANAGEMENT
Allchangestothecertificateprofile
REVOCATIONPROFILEMANAGEMENT
Allchangestotherevocationprofile
CERTIFICATEREVOCATIONLISTPROFILEMANAGEMENT
Allchangestothecertificaterevocationlistprofile
GenerationofCRLsandOCSPentries
TIMESTAMPING
Clocksynchronization
MISCELLANEOUS
AppointmentofanindividualtoaTrustedRole
Designationofpersonnelformultipartycontrol
InstallationofanOperatingSystem,PKIApplication,orHardwareSecurityModule RemovalorDestructionofHSMs
SystemStartup
LogonattemptstoPKIApplication
Receiptofhardware/software
Attemptstosetormodifypasswords
BackuporrestorationoftheinternalCAdatabase
Filemanipulation(e.g.,creation,renaming,moving)
Postingofanymaterialtoarepository
AccesstotheinternalCAdatabase
Allcertificatecompromisenotificationrequests
LoadingHSMswithCertificates
ShipmentofHSMs
ZeroizingHSMs
Re‐keyoftheComponent
CONFIGURATIONCHANGES
Hardware
Software
34
AuditableEvent
OperatingSystem
Patches
SecurityProfiles
PHYSICALACCESS/SITESECURITY
PersonnelaccesstosecureareahousingCAorTSAcomponent
AccesstoaCAorTSAcomponent
Knownorsuspectedviolationsofphysicalsecurity
Firewallandrouteractivities
ANOMALIES
Systemcrashesandhardwarefailures
Softwareerrorconditions
Softwarecheckintegrityfailures
Receiptofimpropermessagesandmisroutedmessages
Networkattacks(suspectedorconfirmed)
Equipmentfailure
Electricalpoweroutages
UninterruptiblePowerSupply(UPS)failure
Obviousandsignificantnetworkserviceoraccessfailures
ViolationsofaCPS
ResettingOperatingSystemclock
5.4.2. FrequencyofProcessingLog
Atleastonceeverytwomonths,aDigiCertadministratorreviewsthelogsgeneratedbyDigiCert’ssystems,
makessystemandfileintegritychecks,andconductsavulnerabilityassessment.Theadministratormay
performthechecksusingautomatedtools.Duringthesechecks,theadministrator(1)checkswhether
anyonehastamperedwiththelog,(2)scansforanomaliesorspecificconditions,includinganyevidenceof
maliciousactivity,and(3)preparesawrittensummaryofthereview.Anyanomaliesorirregularitiesfound
inthelogsareinvestigated.ThesummariesincluderecommendationstoDigiCert’soperationsmanagement
committeeandaremadeavailabletoDigiCert'sauditorsuponrequest.DigiCertdocumentsanyactionstaken
asaresultofareview.
5.4.3. RetentionPeriodforAuditLog
DigiCertretainsauditlogson‐siteuntilaftertheyarereviewed.Theindividualswhoremoveauditlogs
fromDigiCert’sCAsystemsaredifferentthantheindividualswhocontrolDigiCert’ssignaturekeys.
5.4.4. ProtectionofAuditLog
CAauditloginformationisretainedonequipmentuntilafteritiscopiedbyasystemadministrator.DigiCert’s
CAandTSAsystemsareconfiguredtoensurethat(i)onlyauthorizedpeoplehavereadaccesstologs,(ii)only
authorizedpeoplemayarchiveauditlogs,and(iii)auditlogsarenotmodified.Auditlogsareprotectedfrom
destructionpriortotheendoftheauditlogretentionperiodandareretainedsecurelyon‐siteuntil
transferredtoabackupsite.DigiCert’soff‐sitestoragelocationisasafeandsecurelocationthatisseparate
fromthelocationwherethedatawasgenerated.
DigiCertmakestime‐stampingrecordsavailablewhenrequiredtoproveinalegalproceedingthatDigiCert’s
time‐stampingservicesareoperatingcorrectly.Auditlogsaremadeavailabletoauditorsuponrequest.
5.4.5. AuditLogBackupProcedures
DigiCertmakesregularbackupcopiesofauditlogsandauditlogsummariesandsendsacopyoftheauditlog
off‐siteonamonthlybasis.
35
5.4.6. AuditCollectionSystem(internalvs.external)
Automaticauditprocessesbeginonsystemstartupandendatsystemshutdown.Ifanautomatedaudit
systemfailsandtheintegrityofthesystemorconfidentialityoftheinformationprotectedbythesystemisat
risk,DigiCert’sAdministratorswillconsidersuspendingitsoperationuntiltheproblemisremedied.
5.4.7. NotificationtoEvent‐causingSubject
Nostipulation.
5.4.8. VulnerabilityAssessments
DigiCertperformsannualriskassessmentsthatidentifyandassessreasonablyforeseeableinternaland
externalthreatsthatcouldresultinunauthorizedaccess,disclosure,misuse,alteration,ordestructionofany
certificatedataorcertificateissuanceprocess.DigiCertalsoroutinelyassessesthesufficiencyofthepolicies,
procedures,informationsystems,technology,andotherarrangementsthatDigiCerthasinplacetocontrol
suchrisks.DigiCert’sInternalAuditorsreviewthesecurityauditdatachecksforcontinuityandwillalertthe
appropriatepersonnelofanyevents,suchasrepeatedfailedactions,requestsforprivilegedinformation,
attemptedaccessofsystemfiles,andunauthenticatedresponses.
5.5.
RECORDSARCHIVAL
DigiCert complies with all record retention policies that apply by law. DigiCert includes sufficient detail in all
archived records to show that a certificate or time-stamp token was issued in accordance with this CPS.
5.5.1. TypesofRecordsArchived
DigiCertretainsthefollowinginformationinitsarchives(assuchinformationpertainstoDigiCert’sCA/TSA
operations):
1. AccreditationsofDigiCert,
2. CPandCPSversions,
3. ContractualobligationsandotheragreementsconcerningtheoperationoftheCA/TSA,
4. Systemandequipmentconfigurations,modifications,andupdates,
5. Rejectionoracceptanceofacertificaterequest,
6. Certificateissuance,rekey,renewal,andrevocationrequests,
7. SufficientidentityauthenticationdatatosatisfytheidentificationrequirementsofSection3.2,
includinginformationabouttelephonecallsmadeforverificationpurposes,
8. Anydocumentationrelatedtothereceiptoracceptanceofacertificateortoken,
9. SubscriberAgreements,
10. Issuedcertificates,
11. Arecordofcertificatere‐keys,
12. CRLandOCSPentries,
13. Dataorapplicationsnecessarytoverifyanarchive’scontents,
14. Complianceauditorreports,
15. ChangestoDigiCert’sauditparameters,
16. Anyattempttodeleteormodifyauditlogs,
17. Keygeneration,destruction,storage,backup,andrecovery,
18. AccesstoPrivateKeysforkeyrecoverypurposes,
19. ChangestotrustedPublicKeys,
20. ExportofPrivateKeys,
21. Approvalorrejectionofacertificatestatuschangerequest,
22. Appointmentofanindividualtoatrustedrole,
23. Destructionofacryptographicmodule,
24. Certificatecompromisenotifications,
25. Remedialactiontakenasaresultofviolationsofphysicalsecurity,and
26. ViolationsoftheCPorCPS.
36
5.5.2. RetentionPeriodforArchive
DigiCertretainsarchiveddataassociatedwithLevel3orLevel4,federateddevice,andPIV‐Icertificatesfor
atleast10.5years.DigiCert,ortheRAsupportingissuance,archivesdataforothercertificatetypesforat
least7.5years.
5.5.3. ProtectionofArchive
Archiverecordsarestoredatasecureoff‐sitelocationandaremaintainedinamannerthatprevents
unauthorizedmodification,substitution,ordestruction.Archivesarenotreleasedexceptasallowedby
theDCPAorasrequiredbylaw.DigiCertmaintainsanysoftwareapplicationrequiredtoprocessthe
archivedatauntilthedataiseitherdestroyedortransferredtoanewermedium.
IfDigiCertneedstotransferanymediatoadifferentarchivesiteorequipment,DigiCertwillmaintain
botharchivedlocationsand/orpiecesofequipmentuntilthetransferarecomplete.Alltransferstonew
archiveswilloccurinasecuremanner.
5.5.4. ArchiveBackupProcedures
Onasemi‐annualbasis,DigiCertcreatesanarchivediskofthedatalistedinsection5.5.1bygroupingthedata
typestogetherbysourceintoseparate,compressedarchivefiles.Eacharchivefileishashedtoproduce
checksumsthatarestoredseparatelyforintegrityverificationatalaterdate.DigiCertstoresthearchivedisk
inasecureoff‐sitelocationforthedurationofthesetretentionperiod.RAscreateandstorearchived
recordsinaccordancewiththeapplicabledocumentationretentionpolicy.
5.5.5. RequirementsforTime‐stampingofRecords
DigiCertautomaticallytime‐stampsarchivedrecordswithsystemtime(non‐cryptographicmethod)asthey
arecreated.DigiCertsynchronizesitssystemtimeatleasteveryeighthoursusingarealtimevalue
distributedbyarecognizedUTC(k)laboratoryorNationalMeasurementInstitute.
Certificateissuanceistime‐stampedasafunctionofthe"ValidFrom"fieldinaccordancewiththeX.509
CertificateProfile.Certificaterevocationistime‐stampedasafunctionofthe"RevocationDate"fieldin
accordancewiththeX.509CertificateRevocationListProfile.
5.5.6. ArchiveCollectionSystem(internalorexternal)
ArchiveinformationiscollectedinternallybyDigiCert.
5.5.7. ProcedurestoObtainandVerifyArchiveInformation
Detailsconcerningthecreationandstorageofarchiveinformationarefoundinsection5.5.4.Afterreceiving
arequestmadeforaproperpurposebyaCustomer,itsagent,orapartyinvolvedinadisputeovera
transactioninvolvingtheDigiCertPKI,DigiCertmayelecttoretrievetheinformationfromarchival.The
integrityofarchiveinformationisverifiedbycomparingahashofthecompressedarchivefilewiththefile
checksumoriginallystoredforthatfile,asdescribedinSection5.5.4.DigiCertmayelecttotransmitthe
relevantinformationviaasecureelectronicmethodorcourier,oritmayalsorefusetoprovidethe
informationinitsdiscretionandmayrequirepriorpaymentofallcostsassociatedwiththedata.
5.6.
KEYCHANGEOVER
KeychangeoverproceduresenablethesmoothtransitionfromexpiringCAcertificatestonewCAcertificates.
TowardstheendofaCAPrivateKey’slifetime,DigiCertceasesusingtheexpiringCAPrivateKeytosign
certificatesandusestheoldPrivateKeyonlytosignCRLsandOCSPrespondercertificates.AnewCAsigning
keypairiscommissionedandallsubsequentlyissuedcertificatesandCRLsaresignedwiththenewprivate
signingkey.Boththeoldandthenewkeypairsmaybeconcurrentlyactive.Thiskeychangeoverprocess
helpsminimizeanyadverseeffectsfromCAcertificateexpiration.ThecorrespondingnewCAPublicKey
certificateisprovidedtosubscribersandrelyingpartiesthroughthedeliverymethodsdetailedinSection
6.1.4.WhereDigiCerthascross‐certifiedanotherCAthatisintheprocessofakeyrollover,DigiCertobtainsa
newCApublickey(PKCS#10)ornewCAcertificatefromtheotherCAanddistributesanewCAcross
certificatefollowingtheproceduresdescribedabove.
37
5.7.
COMPROMISEANDDISASTERRECOVERY
5.7.1. IncidentandCompromiseHandlingProcedures
DigiCertmaintainsincidentresponseprocedurestoguidepersonnelinresponsetosecurityincidents,
naturaldisasters,andsimilareventsthatmaygiverisetosystemcompromise.DigiCertreviews,tests,and
updatesitsincidentresponseplansandproceduresonatleastanannualbasis.
5.7.2. ComputingResources,Software,and/orDataAreCorrupted
DigiCertmakesregularsystembackupsonatleastaweeklybasisandmaintainsbackupcopiesofitsPrivate
Keys,whicharestoredinasecure,off‐sitelocation.IfDigiCertdiscoversthatanyofitscomputingresources,
software,ordataoperationshavebeencompromised,DigiCertassessesthethreatsandrisksthatthe
compromisepresentstotheintegrityorsecurityofitsoperationsorthoseofaffectedparties.IfDigiCert
determinesthatacontinuedoperationcouldposeasignificantrisktoRelyingPartiesorSubscribers,DigiCert
suspendssuchoperationuntilitdeterminesthattheriskismitigated.
5.7.3. EntityPrivateKeyCompromiseProcedures
IfDigiCertsuspectsthatoneofitsPrivateKeyshasbeencomprisedorlostthenanemergencyresponseteam
willconveneandassessthesituationtodeterminethedegreeandscopeoftheincidentandtakeappropriate
action.Specifically,DigiCertwill:
1. Collectinformationrelatedtotheincident;
2. Begininvestigatingtheincidentanddeterminethedegreeandscopeofthecompromise;
3. Haveitsincidentresponseteamdetermineandreportonthecourseofactionorstrategythatshould
betakentocorrecttheproblemandpreventreoccurrence;
4. Ifappropriate,contactgovernmentagencies,lawenforcement,andotherinterestedpartiesand
activateanyotherappropriateadditionalsecuritymeasures;
5. IfthecompromiseinvolvesaPrivateKeyusedtosigntime‐stamptokens,provideadescriptionofthe
compromisetoSubscribersandRelyingParties;
6. Notifyanycross‐certifiedentitiesofthecompromisesothattheycanrevoketheircross‐certificates;
7. Makeinformationavailablethatcanbeusedtoidentifywhichcertificatesandtime‐stamptokensare
affected,unlessdoingsowouldbreachtheprivacyofaDigiCertuserorthesecurityofDigiCert’s
services;
8. Monitoritssystem,continueitsinvestigation,ensurethatdataisstillbeingrecordedasevidence,and
makeaforensiccopyofdatacollected;
9. Isolate,contain,andstabilizeitssystems,applyinganyshort‐termfixesneededtoreturnthesystem
toanormaloperatingstate;
10. Prepareandcirculateanincidentreportthatanalyzesthecauseoftheincidentanddocumentsthe
lessonslearned;and
11. IncorporatelessonslearnedintotheimplementationoflongtermsolutionsandtheIncident
ResponsePlan.
DigiCertmaygenerateanewkeypairandsignanewcertificate.IfadisasterphysicallydamagesDigiCert’s
equipmentanddestroysallcopiesofDigiCert’ssignaturekeysthenDigiCertwillprovidenoticetoaffected
partiesattheearliestfeasibletime.
5.7.4. BusinessContinuityCapabilitiesafteraDisaster
Tomaintaintheintegrityofitsservices,DigiCertimplementsdatabackupandrecoveryproceduresaspart
ofitsBusinessContinuityManagementPlan(BCMP).StatedgoalsoftheBCMParetoensurethatcertificate
statusservicesbeonlyminimallyaffectedbyanydisasterinvolvingDigiCert’sprimaryfacilityandthat
DigiCertbecapableofmaintainingotherservicesorresumingthemasquicklyaspossiblefollowinga
disaster.DigiCertreviews,tests,andupdatestheBCMPandsupportingproceduresatleastannually.
DigiCert'ssystemsareredundantlyconfiguredatitsprimaryfacilityandaremirroredataseparate,
geographicallydiverselocationforfailoverintheeventofadisaster.IfadisastercausesDigiCert’sprimary
38
CAorTSAoperationstobecomeinoperative,DigiCertwillre‐initiateitsoperationsatitssecondarylocation
givingprioritytotheprovisionofcertificatestatusinformationandtimestampingcapabilities,ifaffected.
5.8.
CAORRATERMINATION
BeforeterminatingitsCAorTSAactivities,DigiCertwill:
1. Providenoticeandinformationabouttheterminationbysendingnoticebyemailtoits
customers,ApplicationSoftwareVendors,andcross‐certifyingentitiesandbypostingsuch
informationonDigiCert’swebsite;and
2. Transferallresponsibilitiestoaqualifiedsuccessorentity.
Ifaqualifiedsuccessorentitydoesnotexist,DigiCertwill:
1. transferthosefunctionscapableofbeingtransferredtoareliablethirdpartyandarrangeto
preserveallrelevantrecordswithareliablethirdpartyoragovernment,regulatory,orlegal
bodywithappropriateauthority;
2. revokeallcertificatesthatarestillun‐revokedorun‐expiredonadateasspecifiedinthenotice
andpublishfinalCRLs;
3. destroyallPrivateKeys;and
4. makeothernecessaryarrangementsthatareinaccordancewiththisCPS.
DigiCerthasmadearrangementstocoverthecostsassociatedwithfulfillingtheserequirementsincase
DigiCertbecomesbankruptorisunabletocoverthecosts.Anyrequirementsofthissectionthatare
variedbycontractapplyonlythecontractingparties.
6. TECHNICALSECURITYCONTROLS
6.1.
KEYPAIRGENERATIONANDINSTALLATION
6.1.1. KeyPairGeneration
AllkeysmustbegeneratedusingaFIPS‐approvedmethodorequivalentinternationalstandard.
DigiCert'sCAkeypairsaregeneratedbymultipletrustedindividualsactingintrustedrolesandusinga
cryptographichardwaredeviceaspartofscriptedkeygenerationceremony.Thecryptographichardwareis
evaluatedtoFIPS140‐1Level3andEAL4+.Activationofthehardwarerequirestheusetwo‐factor
authenticationtokens.DigiCertcreatesauditableevidenceduringthekeygenerationprocesstoprovethat
theCPSwasfollowedandroleseparationwasenforcedduringthekeygenerationprocess.DigiCertrequires
thatanauditorwitnessthegenerationofanyCAkeystobeusedaspubliclytrustedrootcertificatesortosign
EVCertificates.ForotherCAkeypairgenerationceremonies,DigiCertestablishesitscompliancewiththis
requirementbyhavinganauditororindependentthirdpartyattendtheceremonyorbyhavinganauditor
examinethesignedanddocumentedrecordofthekeygenerationceremony,asallowedbyapplicablepolicy.
Subscribersmustgeneratetheirkeysinamannerthatisappropriateforthecertificatetype.Certificates
issuedatLevel3HardwareoratLevel4Biometricmustbegeneratedonvalidatedhardwarecryptographic
modulesusingaFIPS‐approvedmethod.SubscriberswhogeneratetheirownkeysforaQualifiedCertificate
onanSSCDshallensurethattheSSCDmeetstherequirementsofCWA14169andthatthePublicKeytobe
certifiedisfromthekeypairgeneratedbytheSSCD.ForAdobeSigningCertificates,Subscribersmust
generatetheirkeypairsinamediumthatpreventsexportationorduplicationandthatmeetsorexceedsFIPS
140‐1Level2certificationstandards.
6.1.2. PrivateKeyDeliverytoSubscriber
IfDigiCert,aCMS,oranRAgeneratesakeyforaSubscriber,thenitmustdeliverthePrivateKeysecurelyto
theSubscriber.Keysmaybedeliveredelectronically(suchasthroughsecureemailorstoredinacloud‐based
system)oronahardwarecryptographicmodule/SSCD.Inallcases:
1. Exceptwhereescrow/backupservicesareauthorizedandpermitted,thekeygeneratormustnot
retainaccesstotheSubscriber’sPrivateKeyafterdelivery,
39
2.
3.
4.
Thekeygeneratormustprotecttheprivatekeyfromactivation,compromise,ormodificationduring
thedeliveryprocess,
TheSubscribermustacknowledgereceiptoftheprivatekey(s),typicallybyhavingtheSubscriber
usetherelatedcertificate,and
ThekeygeneratormustdeliverthePrivateKeyinawaythatensuresthatthecorrecttokensand
activationdataareprovidedtothecorrectSubscribers,including:
a. Forhardwaremodules,thekeygeneratormaintainingaccountabilityforthelocationand
stateofthemoduleuntiltheSubscriberacceptspossessionofitand
b. Forelectronicdeliveryofprivatekeys,thekeygeneratorencryptingkeymaterialusinga
cryptographicalgorithmandkeysizeatleastasstrongastheprivatekey.Thekeygenerator
shalldeliveractivationdatausingaseparatesecurechannel.
TheentityassistingtheSubscriberwithkeygenerationshallmaintainarecordoftheSubscriber’s
acknowledgementofreceiptofthedevicecontainingtheSubscriber’sKeyPair.ACMSorRAprovidingkey
deliveryservicesisrequiredtoprovideacopyofthisrecordtoDigiCert.
6.1.3. PublicKeyDeliverytoCertificateIssuer
SubscribersgeneratekeypairsandsubmitthePublicKeytoDigiCertinaCSRaspartofthecertificaterequest
process.TheSubscriber’ssignatureontherequestisauthenticatedpriortoissuingthecertificate.
6.1.4. CAPublicKeyDeliverytoRelyingParties
DigiCert'sPublicKeysareprovidedtoRelyingPartiesasspecifiedinacertificatevalidationorpathdiscovery
policyfile,astrustanchorsincommercialbrowsersandoperatingsystemrootstore,and/orasrootssigned
byotherCAs.AllaccreditationauthoritiessupportingDigiCertcertificatesandallapplicationsoftware
providersarepermittedtoredistributeDigiCert’srootanchors.
DigiCertmayalsodistributePublicKeysthatarepartofanupdatedsignaturekeypairasaself‐signed
certificate,asanewCAcertificate,orinakeyroll‐overcertificate.RelyingPartiesmayobtainDigiCert'sself‐
signedCAcertificatesfromDigiCert'swebsiteorbyemail.
6.1.5. KeySizes
DigiCertgenerallyfollowstheNISTtimelinesinusingandretiringsignaturealgorithmsandkeysizes.
Currently,DigiCertgeneratesandusesatleastthefollowingminimumkeysizes,signaturealgorithms,and
hashalgorithmsforsigningcertificates,CRLs,andcertificatestatusserverresponses:
Fornon‐FBCAcertificates:
2048‐bitRSAKeywithSecureHashAlgorithmversion1(SHA‐1)(SHA‐1isbeingphasedout)
Forallcertificates:
2048‐bitRSAKeywithSecureHashAlgorithmversion2(SHA‐256)
384‐bitECDSAKeywithSecureHashAlgorithmversion2(SHA‐256)
DigiCertrequiresend‐entitycertificatestocontainakeysizethatisatleast2048bitsforRSA,DSA,orDiffie‐
Hellmanand224bitsforellipticcurvealgorithms.
DigiCertmayrequirehigherbitkeysinitssolediscretion.PIV‐ICertificatescontainpublickeysand
algorithmsthatconformto[NISTSP800‐78].
Anycertificates(whetherCAorend‐entity)expiringafter12/31/2030mustbeatleast3072‐bitforRSAand
256‐bitforECDSA.
SignaturesonCRLs,OCSPresponses,andOCSPrespondercertificatesthatprovidestatusinformationfor
certificatesthatweregeneratedusingSHA‐1arealsogeneratedusingtheSHA‐1algorithm.Allother
signaturesonCRLs,OCSPresponses,andOCSPrespondercertificatesusetheSHA‐256hashalgorithmorone
thatisequallyormoreresistanttocollisionattack.
40
DigiCertandSubscribersmayfulfilltheirrequirementsundertheCPandthisCPSusingTLSoranother
protocolthatprovidessimilarsecurity,providedtheprotocolrequiresatleastAES128bitsorequivalentfor
thesymmetrickeyandatleast2048bitRSAorequivalentfortheasymmetrickeys(andatleast3072bitRSA
orequivalentforasymmetrickeysafter12/31/2030).
6.1.6. PublicKeyParametersGenerationandQualityChecking
DigiCertusesacryptomodulethatconformstoFIPS186‐2andprovidesrandomnumbergenerationandon‐
boardgenerationofupto4096‐bitRSAPublicKeysandawiderangeofECCcurves.
6.1.7. KeyUsagePurposes(asperX.509v3keyusagefield)
DigiCert'scertificatesincludekeyusageextensionfieldsthatspecifytheintendeduseofthecertificateand
technicallylimitthecertificate’sfunctionalityinX.509v3compliantsoftware.
TheuseofaspecifickeyisdeterminedbythekeyusageextensionintheX.509certificate.
Subscribercertificatesassertkeyusagesbasedontheintendedapplicationofthekeypair.Inparticular,
certificatestobeusedfordigitalsignatures(includingauthentication)setthedigitalSignatureand/or
nonRepudiationbits.CertificatestobeusedforkeyordataencryptionshallsetthekeyEnciphermentand/or
dataEnciphermentbits.CertificatestobeusedforkeyagreementshallsetthekeyAgreementbit.
Keyusagebitsandextendedkeyusagesarespecifiedinthecertificateprofileforeachtypeofcertificateasset
forthinDigiCert’sCertificateProfilesdocument.DigiCert’sCAcertificateshaveatleasttwokeyusagebits
set:keyCertSignandcRLSign,andforsigningOCSPresponses,thedigitalSignaturebitisalsoset.
Exceptforlegacyapplicationsrequiringasinglekeyfordualusewithbothencryptionandsignature,DigiCert
doesnotissuecertificateswithkeyusageforbothsigningandencryption.Instead,DigiCertissues
Subscriberstwokeypairs—oneforkeymanagementandonefordigitalsignatureandauthentication.For
CertificatesatLevels1,2and3thatareusedforsigningandencryptioninsupportoflegacyapplications,
theymust:
1. begeneratedandmanagedinaccordancewiththeirrespectivesignaturecertificaterequirements,
exceptwhereotherwisenotedinthisCPS,
2. neverassertthenon‐repudiationkeyusagebit,and
3. notbeusedforauthenticatingdatathatwillbeverifiedonthebasisofthedual‐usecertificateata
futuretime.
NoLevel4certificatesmayhavesuchdual‐usekeypairs.
PIV‐IContentSigningcertificatesalsoincludeanextendedkeyusageofid‐fpki‐pivi‐content‐signing.
6.2.
PRIVATEKEYPROTECTIONANDCRYPTOGRAPHICMODULEENGINEERING
CONTROLS
6.2.1. CryptographicModuleStandardsandControls
DigiCert'scryptographicmodulesforallofitsCAandOCSPresponderkeypairsarevalidatedtotheFIPS140
Level3andInternationalCommonCriteria(CC)InformationTechnologySecurityEvaluationAssuranceLevel
(EAL)14169EAL4+Type3(EAL4AugmentedbyAVA_VLA.4andAVA_MSU.3)intheEuropeanUnion(EU).
IGTFCertificateSubscribersmustprotecttheirPrivateKeysinaccordancewiththeapplicableGuidelineson
PrivateKeyProtection,includingtheuseofstrongpassphrasestoprotectprivatekeys.
Cryptographicmodulerequirementsforsubscribersandregistrationauthoritiesareshowninthetable
below.
41
AssuranceLevel
Subscriber
RegistrationAuthority
EVCodeSigning
FIPS140Level2
(Hardware)
FIPS140Level2
(Hardware)
AdobeSigning
FIPS140Level2
(Hardware)
FIPS140Level3
(Hardware)
Rudimentary
N/A
FIPS140Level1
(HardwareorSoftware)
Basic,LOA2,andLOA3
FIPS140Level1
(HardwareorSoftware)
FIPS140Level1
(HardwareorSoftware)
Medium
FIPS140Level1
(Software)
FIPS140Level2
(Hardware)
FIPS140Level2
(Hardware)
MediumHardware,
Biometric&PIV‐I
Card/Hardware
Authentication
FIPS140Level2
(Hardware)
FIPS140Level2
(Hardware)
EUQConSSCD
EAL4Augmented
(Hardware)
EAL4Augmented
(Hardware)
DigiCertensuresthatthePrivateKeyofanEVCodeSigningCertificateisproperlygenerated,used,andstored
inacryptomodulethatmeetsorexceedstherequirementsofFIPS140level2by(i)shippingconforming
cryptomoduleswithpreinstalledkeypairs,(ii)communicatingviaPKCS#11cryptoAPIsofcryptomodules
thatDigiCerthasverifiedmeetorexceedrequirements,or(iii)obtaininganITauditfromtheSubscriberthat
indicatescompliancewithFIPS140‐2level2ortheequivalent.
6.2.2. PrivateKey(noutofm)Multi‐personControl
DigiCert'sauthenticationmechanismsareprotectedsecurelywhennotinuseandmayonlybeaccessedby
actionsofmultipletrustedpersons.
BackupsofCAPrivateKeysaresecurelystoredoff‐siteandrequiretwo‐personaccess.Re‐activationofa
backed‐upCAPrivateKey(unwrapping)requiresthesamesecurityandmulti‐personcontrolaswhen
performingothersensitiveCAPrivateKeyoperations.
6.2.3. PrivateKeyEscrow
DigiCertdoesnotescrowitssignaturekeys.Subscribersmaynotescrowtheirprivatesignaturekeysordual
usekeysexceptasallowedbyothersupersedingpoliciesoragreementsamongSubscribers,RelyingParties,
andescrowagents.DigiCertmayprovideescrowservicesforothertypesofcertificatesinordertoprovide
keyrecoveryasdescribedinsection4.12.1.
6.2.4. PrivateKeyBackup
DigiCert'sPrivateKeysaregeneratedandstoredinsideDigiCert’scryptographicmodule,whichhasbeen
evaluatedtoatleastFIPS140Level3andEAL4+.Whenkeysaretransferredtoothermediaforbackupand
disasterrecoverypurposes,thekeysaretransferredandstoredinanencryptedform.DigiCert'sCAkeypairs
arebackedupbymultipletrustedindividualsusingacryptographichardwaredeviceaspartofscriptedand
videotapedkeybackupprocess.
42
DigiCertmayprovidebackupservicesforPrivateKeysthatarenotrequiredtobekeptonahardwaredevice.
AccesstobackupcertificatesisprotectedinamannerthatonlytheSubscribercancontroltheprivatekey.
DigiCertmayrequirebackupofPIV‐IContentSigningprivatesignaturekeystofacilitatedisasterrecovery,
providedthatallbackupisperformedundermulti‐personcontrol.Backedupkeysareneverstoredinaplain
textformoutsideofthecryptographicmodule.
6.2.5. PrivateKeyArchival
DigiCertdoesnotarchivePrivateKeys.
6.2.6. PrivateKeyTransferintoorfromaCryptographicModule
Allkeysmustbegeneratedbyandinacryptographicmodule.PrivateKeysareexportedfromthe
cryptographicmoduleonlyforbackuppurposes.ThePrivateKeysareencryptedwhentransferredoutofthe
moduleandneverexistinplaintextform.Whentransportedbetweencryptographicmodules,DigiCert
encryptstheprivatekeyandprotectsthekeysusedforencryptionfromdisclosure.PrivateKeysusedto
encryptbackupsaresecurelystoredandrequiretwo‐personaccess.
6.2.7. PrivateKeyStorageonCryptographicModule
DigiCert'sPrivateKeysaregeneratedandstoredinsideDigiCert’scryptographicmodule,whichhasbeen
evaluatedtoatleastFIPS140Level3andEAL4+.
6.2.8. MethodofActivatingPrivateKeys
DigiCert'sPrivateKeysareactivatedaccordingtothespecificationsofthecryptographicmodule
manufacturer.Activationdataentryisprotectedfromdisclosure.
SubscribersaresolelyresponsibleforprotectingtheirPrivateKeys.Subscribersshoulduseastrong
passwordorequivalentauthenticationmethodtopreventunauthorizedaccessoruseoftheSubscriber’s
PrivateKey.Ataminimum,Subscribersarerequiredtoauthenticatethemselvestothecryptographic
modulebeforeactivatingtheirprivatekeys.SeealsoSection6.4.
6.2.9. MethodofDeactivatingPrivateKeys
DigiCert’sPrivateKeysaredeactivatedvialogoutproceduresontheapplicableHSMdevicewhennotinuse.
RootPrivateKeysarefurtherdeactivatedbyremovingthementirelyfromthestoragepartitionontheHSM
device.DigiCertneverleavesitsHSMdevicesinanactiveunlockedorunattendedstate.
SubscribersshoulddeactivatetheirPrivateKeysvialogoutandremovalprocedureswhennotinuse.
6.2.10. MethodofDestroyingPrivateKeys
DigiCertpersonnel,actingintrustedroles,destroyCA,RA,andstatusserverPrivateKeyswhennolonger
needed.SubscribersshalldestroytheirPrivateKeyswhenthecorrespondingcertificateisrevokedor
expiredorifthePrivateKeyisnolongerneeded.
DigiCertmaydestroyaPrivateKeybydeletingitfromallknownstoragepartitions.DigiCertalsozeroizesthe
HSMdeviceandassociatedbackuptokensaccordingtothespecificationsofthehardwaremanufacturer.This
reinitializesthedeviceandoverwritesthedatawithbinaryzeros.Ifthezeroizationorre‐initialization
procedurefails,DigiCertwillcrush,shred,and/orincineratethedeviceinamannerthatdestroystheability
toextractanyPrivateKey.
6.2.11. CryptographicModuleRating
SeeSection6.2.1.
43
6.3.
OTHERASPECTSOFKEYPAIRMANAGEMENT
6.3.1. PublicKeyArchival
DigiCertarchivescopiesofPublicKeysinaccordancewithSection5.5.
6.3.2. CertificateOperationalPeriodsandKeyPairUsagePeriods
DigiCertcertificateshavemaximumvalidityperiodsof:
Type
PrivateKeyUse
CertificateTerm
RootCA
20 years
25years
SubCA*
12 years
15years
FBCAorIGTFCross‐certifiedSubCA*
6years
15years
CRLandOCSPrespondersigning
3 years
31days†
OVSSL
Nostipulation
42months
EVSSL
Nostipulation
27months
TimeStampingAuthority
Nostipulation
123months
CodeSigningCertificate
Nostipulation
123months
EVCodeSigningCertificateissuedto
No stipulation
39months
Subscriber
EVCodeSigningCertificateissuedtoSigning
123months
123months
Authority
AdobeSigningCertificate
39months
5years
EndEntityClientusedforsignatures,
36months
36months
includingEUQualifiedCertificates,codeand
contentsignatures
EndEntityClientusedforkeymanagement
36months
36months
Clientcross‐certifiedwithFBCA
36months
36months
EndEntityClientforallotherpurposes(non
42months
42months
FBCAandIGTFcerts)
PIV‐ICards
36 months
36 months
IGTF(2048‐bitRSAkeys)onhardware
60 months
13 months
IGTF(1024‐bitRSAkeys)onhardware
36 months
13 months
IGTFnotonhardware
13 months
13 months
*IGTFsigningcertificateshavealifetimethatisatleasttwicethemaximumlifetimeofanendentity
certificate.
†OCSPresponderandCRLsigningcertificatesassociatedwithaPIV‐Icertificateonlyhaveamaximum
certificatevalidityperiodof31days.
Relyingpartiesmaystillvalidatesignaturesgeneratedwiththesekeysafterexpirationofthecertificate.
Privatekeysassociatedwithself‐signedrootcertificatesthataredistributedastrustanchorsareusedfora
maximumof20years.DigiCertdoesnotissuePIV‐Isubscribercertificatesthatexpirelaterthanthe
expirationdateofthePIV‐Ihardwaretokenonwhichthecertificatesreside.
DigiCertmayvoluntarilyretireitsCAPrivateKeysbeforetheperiodslistedabovetoaccommodatekey
changeoverprocesses.DigiCertdoesnotissueSubscribercertificateswithanexpirationdatethatispastthe
signingroot’spublickeyexpirationdateorthatexceedstheroutinere‐keyidentificationrequirements
specifiedinSection3.1.1.
44
6.4.
ACTIVATIONDATA
6.4.1. ActivationDataGenerationandInstallation
DigiCertactivatesthecryptographicmodulecontainingitsCAPrivateKeysaccordingtothespecificationsof
thehardwaremanufacturer.ThismethodhasbeenevaluatedasmeetingtherequirementsofFIPS140‐2
Level3.Thecryptographichardwareisheldundertwo‐personcontrolasexplainedinSection5.2.2and
elsewhereinthisCPS.DigiCertwillonlytransmitactivationdataviaanappropriatelyprotectedchanneland
atatimeandplacethatisdistinctfromthedeliveryoftheassociatedcryptographicmodule.
AllDigiCertpersonnelandSubscribersareinstructedtousestrongpasswordsandtoprotectPINsand
passwords.DigiCertemployeesarerequiredtocreatenon‐dictionary,alphanumericpasswordswitha
minimumlengthandtochangetheirpasswordsonaregularbasis.IfDigiCertusespasswordsasactivation
dataforasigningkey,DigiCertwillchangetheactivationdatachangeuponrekeyoftheCAcertificate.
6.4.2. ActivationDataProtection
DigiCert protects data used to unlock private keys from disclosure using a combination of cryptographic and
physical access control mechanisms. Protection mechanisms include keepingactivationmechanismssecure
usingrole‐basedphysicalcontrol.AllDigiCertpersonnelareinstructedtomemorizeandnottowritedown
theirpasswordorshareitwithanotherindividual.DigiCertlocksaccountsusedtoaccesssecureCA
processesifacertainnumberoffailedpasswordattemptsoccur.
6.4.3. OtherAspectsofActivationData
IfDigiCertmustresetactivationdataassociatedwithaPIV‐IcertificatethenDigiCertoranRAperformsa
successfulbiometric1:1matchoftheapplicantagainstthebiometricscollectedinSection3.2.3.
6.5.
COMPUTERSECURITYCONTROLS
6.5.1. SpecificComputerSecurityTechnicalRequirements
DigiCertsecuresitsCAsystemsandauthenticatesandprotectscommunicationsbetweenitssystemsand
trustedroles.DigiCert'sCAserversandsupport‐and‐vettingworkstationsrunontrustworthysystemsthat
areconfiguredandhardenedusingindustrybestpractices.AllCAsystemsarescannedformaliciouscodeand
protectedagainstspywareandviruses.
DigiCert’sCAsystems,includinganyremoteworkstations,areconfiguredto:
1. authenticatetheidentityofusersbeforepermittingaccesstothesystemorapplications,
2. managetheprivilegesofusersandlimituserstotheirassignedroles,
3. generateandarchiveauditrecordsforalltransactions,
4. enforcedomainintegrityboundariesforsecuritycriticalprocesses,and
5. supportrecoveryfromkeyorsystemfailure.
AllCertificateStatusServers:
1. authenticatetheidentityofusersbeforepermittingaccesstothesystemorapplications,
2. manageprivilegestolimituserstotheirassignedroles,
3. enforcedomainintegrityboundariesforsecuritycriticalprocesses,and
4. supportrecoveryfromkeyorsystemfailure.
6.5.2. ComputerSecurityRating
Nostipulation.
6.6.
LIFECYCLETECHNICALCONTROLS
6.6.1. SystemDevelopmentControls
DigiCerthasmechanismsinplacetocontrolandmonitortheacquisitionanddevelopmentofitsCAsystems.
Changerequestsrequiretheapprovalofatleastoneadministratorwhoisdifferentfromtheperson
45
submittingtherequest.DigiCertonlyinstallssoftwareonCAsystemsifthesoftwareispartoftheCA’s
operation.CAhardwareandsoftwarearededicatedtoperformingoperationsoftheCA.
Vendorsareselectedbasedontheirreputationinthemarket,abilitytodeliverqualityproduct,andlikelihood
ofremainingviableinthefuture.Managementisinvolvedinthevendorselectionandpurchasedecision
process.Non‐PKIhardwareandsoftwareispurchasedwithoutidentifyingthepurposeforwhichthe
componentwillbeused.Allhardwareandsoftwareareshippedunderstandardconditionstoensure
deliveryofthecomponentdirectlytoatrustedemployeewhoensuresthattheequipmentisinstalledwithout
opportunityfortampering.
SomeofthePKIsoftwarecomponentsusedbyDigiCertaredevelopedin‐houseorbyconsultantsusing
standardsoftwaredevelopmentmethodologies.Allsuchsoftwareisdesignedanddevelopedinacontrolled
environmentandsubjectedtoqualityassurancereview.Othersoftwareispurchasedcommercialoff‐the‐
shelf(COTS).Qualityassuranceismaintainedthroughouttheprocessthroughtestinganddocumentationor
bypurchasingfromtrustedvendorsasdiscussedabove.
Updatesofequipmentandsoftwarearepurchasedordevelopedinthesamemannerastheoriginal
equipmentorsoftwareandareinstalledandtestedbytrustedandtrainedpersonnel.Allhardwareand
softwareessentialtoDigiCert’soperationsisscannedformaliciouscodeonfirstuseandperiodically
thereafter.
6.6.2. SecurityManagementControls
DigiCerthasmechanismsinplacetocontrolandmonitorthesecurity‐relatedconfigurationsofitsCA
systems.WhenloadingsoftwareontoaCAsystem,DigiCertverifiesthatthesoftwareisthecorrectversion
andissuppliedbythevendorfreeofanymodifications.DigiCertverifiestheintegrityofsoftwareusedwith
itsCAprocessesatleastonceaweek.
6.6.3. LifeCycleSecurityControls
Nostipulation.
6.7.
NETWORKSECURITYCONTROLS
DigiCertdocumentsandcontrolstheconfigurationofitssystems,includinganyupgradesormodifications
made.DigiCert'sCAsystemisconnectedtooneinternalnetworkandisprotectedbyfirewallsandNetwork
AddressTranslationforallinternalIPaddresses(e.g.,192.168.x.x).DigiCert'scustomersupportandvetting
workstationsarealsoprotectedbyfirewall(s)andonlyuseinternalIPaddresses.RootKeysarekeptoffline
andbroughtonlineonlywhennecessarytosigncertificate‐issuingsubordinateCAs,OCSPResponder
Certificates,orperiodicCRLs.Firewallsandboundarycontroldevicesareconfiguredtoallowaccessonlyby
theaddresses,ports,protocolsandcommandsrequiredforthetrustworthyprovisionofPKIservicesbysuch
systems.
DigiCert'ssecuritypolicyistoblockallportsandprotocolsandopenonlyportsnecessarytoenableCA
functions.AllCAequipmentisconfiguredwithaminimumnumberofservicesandallunusednetworkports
andservicesaredisabled.DigiCert'snetworkconfigurationisavailableforreviewon‐sitebyitsauditorsand
consultantsunderanappropriatenon‐disclosureagreement.
6.8.
TIME‐STAMPING
ThesystemtimeonDigiCert’scomputersisupdatedusingtheNetworkTimeProtocol(NTP)tosynchronize
systemclocksatleastonceeveryeighthours(Windowsdefault).Alltimesaretraceabletoarealtimevalue
distributedbyaUTC(k)laboratoryorNationalMeasurementInstituteandareupdatedwhenaleapsecond
occursasnotifiedbytheappropriatebody.DigiCertmaintainsaninternalNTPserverthatsynchronizeswith
cellulartelephonenetworksandmaintainstheaccuracyofitsclockwithinonesecondorless.Foreach
timestamprequesttheinternalNTPserverisqueriedforthecurrenttime.However,RelyingPartiesshould
beawarethatalltimesincludedinatime‐stamptokenaresynchronizedwithUTCwithintheaccuracy
definedinthetime‐stamptokenitself,ifpresent.
46
DigiCertwillnotissueatime‐stamptokenusinganyclockthatisdetectedasinaccurate.Allclocksusedfor
time‐stampingarehousedintheDigiCert’ssecurefacilitiesandareprotectedagainstthreatsthatcouldresult
inanunexpectedchangetotheclock’stime.DigiCert'sfacilitiesautomaticallydetectandreportanyclock
thatdriftsorjumpsoutofsynchronizationwithUTC.Clockadjustmentsareauditableevents.
SomeaspectsofRFC3161timestampsdifferfromMicrosoftAuthenticodetimestamps.ForRFC3161‐
complianttimestamps,DigiCertincludesauniqueintegerforeachnewlygeneratedtime‐stamptoken.
DigiCertonlytime‐stampshashrepresentationsofdata,notthedataitself.Informationcanbehashedfor
time‐stampingusingSHA‐1orSHA‐256withRSAencryptionandeither1024or2048bitkeysizefor
signaturecreation.(SHA‐1,SHA‐256,SHA‐384,SHA‐512,MD5,MD4,andMD2aresupportedforRFC3161‐
basedrequests.)DigiCertdoesnotexaminetheimprintbeingtime‐stampedotherthantochecktheimprint’s
length.DigiCertalsodoesnotincludeanyidentificationoftheTimeStampTokenRequester(TSTRequester)
inthetime‐stamptoken.Alltime‐stamptokensaresignedusingakeygeneratedexclusivelyforthat
purposesandhavethepropertyofthekeyindicatedinthecertificate.
TSTRequestersrequesttime‐stamptokensbysendingarequesttoDigiCert.AftertheTSTRequester
receivesaresponsefromDigiCert,itmustverifythestatuserrorreturnedintheresponse.Ifanerrorwasnot
returned,theTSTRequestermustthenverifythefieldscontainedinthetime‐stamptokenandthevalidityof
thetime‐stamptoken’sdigitalsignature.Inparticular,theTSTRequestermustverifythatthetime‐stamped
datacorrespondstowhatwasrequestedandthatthetime‐stamptokencontainsthecorrectcertificate
identifier,thecorrectdataimprint,andthecorrecthashalgorithmOID.TheTSTRequestermustalsoverify
thetimelinessoftheresponsebyverifyingtheresponseagainstalocaltrustedtimereference.TheTST
RequesterisrequiredtonotifyDigiCertimmediatelyifanyinformationcannotbeverified.
TimeStampVerifiersshallverifythedigitalsignatureonthetime‐stamptokenandconfirmthatthedata
correspondstothehashvalueinthetime‐stamptoken.
6.9.
PIV‐ICARDS
ThefollowingrequirementsapplytoPIV‐ICards:
1. ToensureinteroperabilitywithFederalsystems,PIV‐ICardsuseasmartcardplatformthatison
GSA’sFIPS201EvaluationProgramApprovedProductList(APL)andusethePIVapplication
identifier(AID).
2. AllPIV‐ICardsconformto[NISTSP800‐731].
3. ThemandatoryX.509CertificateforAuthenticationisonlyissuedunderapolicythatiscross
certifiedwiththeFBCAPIV‐IHardwarepolicyOID.
4. PIV‐IcertificatesconformtothePIV‐IProfile.
5. AnasymmetricX.509CertificateforCardAuthenticationisincludedineachPIV‐Icard.The
Certificate:
a. conformstoPIV‐IProfile,
b. conformsto[NISTSP800‐73],and
c. isissuedunderthePIV‐ICardAuthenticationpolicy.
6. TheCMSincludesanelectronicrepresentation(asspecifiedinSP800‐73andSP800‐76)ofthe
cardholder’sfacialimageineachPIV‐Icard.
7. TheX.509CertificatesforDigitalSignatureandKeyManagementdescribedin[NISTSP800‐73]are
optionalforPIV‐ICards.
8. TheCMSmakesitsPIV‐ICardsvisuallydistinctfromaFederalPIVCardtopreventcreationofa
fraudulentFederalPIVCard.Ataminimum,theCMSdoesnotallowedimagesorlogosonaPIV‐I
CardtobeplacedwithinZone11,AgencySeal,asdefinedby[FIPS201].
9. TheCMSrequiresthefollowingitemsonthefrontofacard:
a. Cardholderfacialimage,
b. Cardholderfullname,
c. OrganizationalAffiliation,ifexists;otherwisetheissuerofthecard,and
d. Cardexpirationdate.
10. PIV‐Icardsareissuedwithanexpirationdatethatisfiveyearsorless.
11. AllPIV‐ICardsexpirelaterthanthePIV‐IContentSigningcertificateonthecard.
47
12. ApolicyOIDthathasbeenmappedtotheFBCAPIV‐IContentSigningpolicyOIDisincludedinthe
digitalsignaturecertificateusedtosignobjectsonthePIV‐ICard.ThePIV‐IContentSigning
certificateconformstothePIV‐IProfile.
13. ThePIV‐IContentSigningcertificateandcorrespondingprivatekeyaremanagedwithinatrusted
CardManagementSystem.
14. Atissuance,thePIV‐ICardisactivatedandreleasedtothesubscriberonlyafterasuccessful1:1
biometricmatchoftheapplicantagainstthebiometricscollectedinSection3.2.3.
15. PIV‐ICardsmaysupportcardactivationbythecardmanagementsystemtosupportcard
personalizationandpost‐issuancecardupdate.Toactivatethecardforpersonalizationorupdate,
thecardmanagementsystemperformsachallengeresponseprotocolusingcryptographickeys
storedonthecardinaccordancewith[SP800‐73].Whencardsarepersonalized,cardmanagement
keysaresettobespecifictoeachPIV‐ICard.Thatis,eachPIV‐ICardcontainsauniquecard
managementkey.Cardmanagementkeysmeetthealgorithmandkeysizerequirementsstatedin
SpecialPublication800‐78,CryptographicAlgorithmsandKeySizesforPersonalIdentity
Verification.[SP800‐78].
7. CERTIFICATE,CRL,ANDOCSPPROFILES
DigiCertusestheITUX.509,version3standardtoconstructdigitalcertificatesforusewithintheDigiCertPKI.
DigiCertaddscertaincertificateextensionstothebasiccertificatestructureforthepurposesintendedby
X.509v3asperAmendment1toISO/IEC9594‐8,1995.ForPIV‐ICertificates,DigiCertfollowstheFPKIPA’s
X.509CertificateandCertificateRevocationList(CRL)ExtensionsProfileforPersonalIdentityVerification
Interoperable(PIV‐I)Cards.ForQualifiedCertificates,DigiCertfollowsETSITS101862.
7.1.
CERTIFICATEPROFILE
7.1.1. VersionNumber(s)
AllcertificatesareX.509version3certificates.
7.1.2. CertificateExtensions
SeeDigiCert’sCertificateProfilesdocument.IGTFcertificatescomplywiththeGridCertificateProfileas
definedbytheOpenGridForumGFD.125.
PIV‐ICertificatescomplywiththeX.509CertificateandCertificateRevocationList(CRL)ExtensionsProfile
forPersonalIdentityVerificationInteroperable(PIV‐I)Cards,Date:April232010,assetforthat:
http://www.idmanagement.gov/fpkipa/documents/pivi_certificate_crl_profile.pdf.
7.1.3. AlgorithmObjectIdentifiers
DigiCertcertificatesaresignedusingoneofthefollowingalgorithms:
sha‐1WithRSAEncryption
[iso(1)member‐body(2)us(840)rsadsi(113549)pkcs(1)pkcs‐1(1)5]
sha256WithRSAEncryption [iso(1)member‐body(2)us(840)rsadsi(113549)pkcs(1)pkcs‐1(1)
11]
ecdsa‐with‐sha384
[iso(1)member‐body(2)us(840)ansi‐X9‐62(10045)signatures(4)
ecdsa‐with‐SHA2(3)3]
DigiCertdoesnotcurrentlysigncertificatesusingRSAwithPSSpadding.
DigiCertandSubscribersmaygenerateKeyPairsusingthefollowing:
id‐dsa
[iso(1)member‐body(2)us(840)x9‐57(10040)x9cm(4)1]
RsaEncryption
[iso(1)member‐body(2)us(840)rsadsi(113549)pkcs(1)pkcs‐1(1)1]
Dhpublicnumber
[iso(1)member‐body(2)us(840)ansi‐x942(10046)number‐type(2)1]
[joint‐iso‐ccitt(2)country(16)us(840)organization(1)gov(101)
id‐keyExchangeAlgorithm
dod(2)infosec(1)algorithms(1)22]
[iso(1)member‐body(2)us(840)ansi‐X9‐62(10045)id‐
id‐ecPublicKey
publicKeyType(2)1]
48
EllipticcurvepublickeyssubmittedtoDigiCertforinclusioninendentitycertificatesshouldallbebasedon
NIST“SuiteB”curves.
SignaturealgorithmsforPIV‐IcertificatesarelimitedtothoseidentifiedbyNISTSP800‐78.
7.1.4. NameForms
Eachcertificateincludesauniqueserialnumberthatisneverreused.Optionalsubfieldsinthesubjectofan
SSLCertificatemusteithercontaininformationverifiedbyDigiCertorbeleftempty.SSLCertificatescannot
containmetadatasuchas‘.’,‘‐‘and‘‘charactersoranyotherindicationthatthefieldisnotapplicable.
DigiCertlogicallyrestrictsOUfieldsfromcontainingSubscriberinformationthathasnotbeenverifiedin
accordancewithSection3.
TheDistinguishedNameforeachCertificatetypeissetforthinDigiCert’scertificateprofilesdocument.The
contentsofthefieldsinEVCertificatesmustmeettherequirementsinSection8.1oftheEVGuidelines.
7.1.5. NameConstraints
Nostipulation.
7.1.6. CertificatePolicyObjectIdentifier
Anobjectidentifier(OID)isauniquenumberthatidentifiesanobjectorpolicy.TheOIDsusedbyDigiCert
arelistedinSection1.2andinDigiCert’sCertificateProfilesdocument.
7.1.7. UsageofPolicyConstraintsExtension
Notapplicable.
7.1.8. PolicyQualifiersSyntaxandSemantics
DigiCertincludesbriefstatementsincertificatesaboutthelimitationsofliabilityandothertermsassociated
withtheuseofacertificateinthePolicyQualifierfieldoftheCertificatesPolicyextension.
7.1.9. ProcessingSemanticsfortheCriticalCertificatePoliciesExtension
Nostipulation.
7.2.
CRLPROFILE
ForPIV‐ICertificates,DigiCertfollowstheFPKIPA’sX.509CertificateandCertificateRevocationList(CRL)
ExtensionsProfileforPersonalIdentityVerificationInteroperable(PIV‐I)Cards.
7.2.1. Versionnumber(s)
DigiCertissuesversion2CRLsthatcontainthefollowingfields:
Field
Value
IssuerSignatureAlgorithm
sha‐1WithRSAEncryption[12840113549115] OR
sha‐256WithRSAEncryption[128401135491111]OR
ecdsa‐with‐sha384[1284010045433]
IssuerDistinguishedName
DigiCert
thisUpdate
CRLissuedateinUTCformat
nextUpdate
DatewhenthenextCRLwillissueinUTCformat.
RevokedCertificatesList
Listofrevokedcertificates,includingtheserialnumberand
revocationdate
Issuer’sSignature
[Signature]
7.2.2. CRLandCRLEntryExtensions
CRLshavethefollowingextensions:
Extension
Value
CRLNumber
Neverrepeatedmonotonicallyincreasinginteger
49
AuthorityKeyIdentifier
InvalidityDate
ReasonCode
7.3.
SameastheAuthorityKeyIdentifierlistedinthecertificate
OptionaldateinUTCformat
Optional reasonforrevocation
OCSPPROFILE
ForPIV‐ICertificates,DigiCertfollowstheFPKIPA’sX.509CertificateandCertificateRevocationList(CRL)
ExtensionsProfileforPersonalIdentityVerificationInteroperable(PIV‐I)Cards.
7.3.1. VersionNumber(s)
DigiCert’sOCSPrespondersconformtoversion1ofRFC2560.
7.3.2. OCSPExtensions
Nostipulation.
8. COMPLIANCEAUDITANDOTHERASSESSMENTS
ThepracticesinthisCPSaredesignedtomeetorexceedtherequirementsofgenerallyacceptedindustry
standards,includingthelatestversionoftheEVGuidelinesandtheAICPA/CICAWebTrustProgramfor
CertificationAuthorities,ANSX9.79/ISO21188PKIPracticesandPolicyFramework("CAWebTrust/ISO
21188").ForpurposesofinteroperationwiththeU.S.Government,compliancecanbedeterminedby
referencetoanycurrentauditorletterofcompliancemeetingtheFPKIPA’sAuditorLetterofCompliance
Requirements,datedOctober28,2009(FPKIPAAuditRequirements).
8.1.
FREQUENCYORCIRCUMSTANCESOFASSESSMENT
DigiCertreceivesanannualauditbyanindependentexternalauditortoassessDigiCert'scompliancewith
thisCPS,anyapplicableCPs,andtheCAWebTrust/ISO21188andWebTrustEVProgramcriteria.Theaudit
coversDigiCert’sRAsystems,SubCAs,andOCSPResponders.
8.2.
IDENTITY/QUALIFICATIONSOFASSESSOR
WebTrustauditorsmustmeettherequirementsofSection14.1.14oftheEVGuidelines.Specifically:
(1) Qualificationsandexperience:Auditingmustbetheauditor’sprimarybusinessfunction.The
individualoratleastonememberoftheauditgroupmustbequalifiedasaCertifiedInformation
SystemsAuditor(CISA),anAICPACertifiedInformationTechnologyProfessional(CPA.CITP),a
CertifiedInternalAuditor(CIA),orhaveanotherrecognizedinformationsecurityauditingcredential.
Auditorsmustbesubjecttodisciplinaryactionbyitslicensingbody.
(2) Expertise:Theindividualorgroupmustbetrainedandskilledintheauditingofsecureinformation
systemsandbefamiliarwithPublicKeyinfrastructures,certificationsystems,andInternetsecurity
issues.
(3) Rulesandstandards:Theauditormustconformtoapplicablestandards,rules,andbestpractices
promulgatedbytheAmericanInstituteofCertifiedPublicAccountants(AICPA),theCanadian
InstituteofCharteredAccountants(CICA),theInstituteofCharteredAccountantsofEngland&Wales
(ICAEW),theInternationalAccountingStandardsadoptedbytheEuropeanCommission(IAS),
InformationSystemsAuditandControlAssociation(ISACA),theInstituteofInternalAuditors(IIA),
oranotherqualifiedauditingstandardsbody.
(4) Reputation:Thefirmmusthaveareputationforconductingitsauditingbusinesscompetentlyand
correctly.
(5) Insurance:EVauditorsmustmaintainProfessionalLiability/ErrorsandOmissionsInsurance,with
policylimitsofatleast$1millionincoverage.
50
8.3.
ASSESSOR'SRELATIONSHIPTOASSESSEDENTITY
DigiCert’sWebTrustauditordoesnothaveafinancialinterest,businessrelationship,orcourseofdealingthat
couldforeseeablycreateasignificantbiasfororagainstDigiCert.
8.4.
TOPICSCOVEREDBYASSESSMENT
TheauditcoversDigiCert'sbusinesspracticesdisclosure,theintegrityofDigiCert'sPKIoperations,and
DigiCert’scompliancewiththeEVGuidelines.TheauditverifiesthatDigiCertiscompliantwiththeCP,this
CPS,andanyMOAbetweenitandanyotherPKI.
8.5.
ACTIONSTAKENASARESULTOFDEFICIENCY
Ifanauditreportsamaterialnoncompliancewithapplicablelaw,thisCPS,theCP,oranyothercontractual
obligationsrelatedtoDigiCert’sservices,then(1)theauditorwilldocumentthediscrepancy,(2)theauditor
willpromptlynotifyDigiCert,and(3)DigiCertwilldevelopaplantocurethenoncompliance.DigiCertwill
submittheplantotheDCPAforapprovalandtoanythirdpartythatDigiCertislegallyobligatedtosatisfy.
TheDCPAmayrequireadditionalactionifnecessarytorectifyanysignificantissuescreatedbythenon‐
compliance,includingrequiringrevocationofaffectedcertificates.
8.6.
COMMUNICATIONOFRESULTS
TheresultsofeachauditarereportedtotheDCPAandtoanythirdpartyentitieswhichareentitledbylaw,
regulation,oragreementtoreceiveacopyoftheauditresults.Onanannualbasis,DigiCertsubmitsareport
ofitsauditcompliancetovariousparties,suchasMozilla,theFederalPKIPolicyAuthority,CAlicensing
bodies,etc.
8.7.
SELF‐AUDITS
Onatleastaquarterlybasis,DigiCertperformsregularinternalauditsagainstarandomlyselectedsampleof
atleastthreepercentofthecertificatesissuedsincethelastinternalaudit.InternalauditsonEVCertificates
areperformedinaccordancewithsection14.1.2oftheEVGuidelines.
9. OTHERBUSINESSANDLEGALMATTERS
9.1.
FEES
9.1.1. CertificateIssuanceorRenewalFees
DigiCertchargesfeesforcertificateissuanceandrenewal.DigiCertmaychangeitsfeesatanytimein
accordancewiththeapplicablecustomeragreement.
9.1.2. CertificateAccessFees
DigiCertmaychargeareasonablefeeforaccesstoitscertificatedatabases.
9.1.3. RevocationorStatusInformationAccessFees
DigiCertdoesnotchargeacertificaterevocationfeeorafeeforcheckingthevaliditystatusofanissued
certificateusingaCRL.DigiCertmaychargeafeeforprovidingcertificatestatusinformationviaOCSP.
9.1.4. FeesforOtherServices
Nostipulation.
9.1.5. RefundPolicy
Subscribersmustrequestrefunds,inwriting,within30daysafteracertificateissues.Afterreceivingthe
refundrequest,DigiCertmayrevokethecertificateandrefundtheamountpaidbytheApplicant,minus
anyapplicableapplicationprocessingfees.
51
9.2.
FINANCIALRESPONSIBILITY
9.2.1. InsuranceCoverage
DigiCertmaintainsCommercialGeneralLiabilityinsurancewithapolicylimitofatleast$2millionin
coverageandProfessionalLiability/Errors&Omissionsinsurancewithapolicylimitofatleast$5millionin
coverage.InsuranceiscarriedthroughcompaniesratednolessthanA‐astoPolicyHolder’sRatinginthe
currenteditionofBest’sInsuranceGuide(orwithanassociationofcompanies,eachofthemembersofwhich
aresorated).
9.2.2. OtherAssets
Nostipulation.
9.2.3. InsuranceorWarrantyCoverageforEnd‐Entities
Insurancecoverageforend‐entitiesisspecifiedinDigiCert’sRelyingPartyAgreement.
9.3.
CONFIDENTIALITYOFBUSINESSINFORMATION
9.3.1. ScopeofConfidentialInformation
Thefollowinginformationisconsideredconfidentialandprotectedagainstdisclosureusingareasonable
degreeofcare:
1. PrivateKeys;
2. ActivationdatausedtoaccessPrivateKeysortogainaccesstotheCAsystem;
3. Businesscontinuity,incidentresponse,contingency,anddisasterrecoveryplans;
4. Othersecuritypracticesusedtoprotecttheconfidentiality,integrity,oravailabilityofinformation;
5. InformationheldbyDigiCertasprivateinformationinaccordancewithSection9.4;
6. Auditlogsandarchiverecords;and
7. Transactionrecords,financialauditrecords,andexternalorinternalaudittrailrecordsandanyaudit
reports(withtheexceptionofanauditor’sletterconfirmingtheeffectivenessofthecontrolssetforth
inthisCPS).
9.3.2. InformationNotWithintheScopeofConfidentialInformation
Anyinformationnotlistedasconfidentialisconsideredpublicinformation.Publishedcertificateand
revocationdataisconsideredpublicinformation.
9.3.3. ResponsibilitytoProtectConfidentialInformation
DigiCert’semployees,agents,andcontractorsareresponsibleforprotectingconfidentialinformationandare
contractuallyobligatedtodoso.Employeesreceivetrainingonhowtohandleconfidentialinformation.
9.4.
PRIVACYOFPERSONALINFORMATION
9.4.1. PrivacyPlan
DigiCertfollowstheprivacypolicypostedonitswebsitewhenhandlingpersonalinformation.Personal
informationisonlydisclosedwhenthedisclosureisrequiredbylaworwhenrequestedbythesubjectof
thepersonalinformation.
9.4.2. InformationTreatedasPrivate
DigiCerttreatsallpersonalinformationaboutanindividualthatisnotpubliclyavailableinthecontentsofa
certificateorCRLasprivateinformation.DigiCertprotectsprivateinformationusingappropriatesafeguards
andareasonabledegreeofcare.
9.4.3. InformationNotDeemedPrivate
Privateinformationdoesnotincludecertificates,CRLs,ortheircontents.
52
9.4.4. ResponsibilitytoProtectPrivateInformation
DigiCertemployeesandcontractorsareexpectedtohandlepersonalinformationinstrictconfidenceand
meettherequirementsofUSandEuropeanlawconcerningtheprotectionofpersonaldata.Allsensitive
informationissecurelystoredandprotectedagainstaccidentaldisclosure.
9.4.5. NoticeandConsenttoUsePrivateInformation
Personalinformationobtainedfromanapplicantduringtheapplicationoridentityverificationprocessis
consideredprivateinformationiftheinformationisnotincludedinacertificate.DigiCertwillonlyuse
privateinformationafterobtainingthesubject'sconsentorasrequiredbyapplicablelaworregulation.All
Subscribersmustconsenttotheglobaltransferandpublicationofanypersonaldatacontainedina
certificate.
9.4.6. DisclosurePursuanttoJudicialorAdministrativeProcess
DigiCertmaydiscloseprivateinformation,withoutnotice,ifDigiCertbelievesthedisclosureisrequiredby
laworregulation.
9.4.7. OtherInformationDisclosureCircumstances
Nostipulation.
9.5.
INTELLECTUALPROPERTYRIGHTS
DigiCertand/oritsbusinesspartnersowntheintellectualpropertyrightsinDigiCert’sservices,includingthe
certificates,trademarksusedinprovidingtheservices,andthisCPS.“DigiCert”isaregisteredtrademarkof
DigiCert,Inc.
CertificateandrevocationinformationarethepropertyofDigiCert.DigiCertgrantspermissiontoreproduce
anddistributecertificatesonanon‐exclusiveandroyalty‐freebasis,providedthattheyarereproducedand
distributedinfull.DigiCertdoesnotallowderivativeworksofitscertificatesorproductswithoutprior
writtenpermission.PrivateandPublicKeysremainthepropertyoftheSubscriberswhorightfullyhold
them.Allsecretshares(distributedelements)oftheDigiCertPrivateKeysarethepropertyofDigiCert.
9.6.
REPRESENTATIONSANDWARRANTIES
9.6.1. CARepresentationsandWarranties
ExceptasexpresslystatedinthisCPSorinaseparateagreementwithaSubscriber,DigiCertdoesnotmake
anyrepresentationsregardingitsproductsorservices.DigiCertrepresents,totheextentspecifiedinthis
CPS,that:
1. DigiCertcomplies,inallmaterialaspects,withtheCP,thisCPS,andallapplicablelawsand
regulations,
2. DigiCertpublishesandupdatesCRLsandOCSPresponsesonaregularbasis,
3. AllcertificatesissuedunderthisCPSwillbeverifiedinaccordancewiththisCPSandmeetthe
minimumrequirementsfoundhereinandintheBaselineRequirements,
4. DigiCertwillmaintainarepositoryofpublicinformationonitswebsite,and
5. InformationpublishedonaqualifiedcertificatemeetstherequirementsspecifiedinEUDirective
99/93.
TotheextentallowedunderEUDirective99/93,DigiCert:
1. Doesnotwarranttheaccuracy,authenticity,completeness,orfitnessofanyunverified
information,includingnameverificationfor(1)certificatesintendedforemailandintranetuse,(2)
UnifiedCommunicationsCertificates,and(3)othercertificatesissuedtoindividualsandintranets.
2. IsnotresponsibleforinformationcontainedinacertificateexceptasstatedinthisCPS,
3. Doesnotwarrantthequality,function,orperformanceofanysoftwareorhardwaredevice,and
4. IsnotresponsibleforfailingtocomplywiththisCPSbecauseofcircumstancesoutsideof
DigiCert’scontrol.
53
ForEVCertificates,DigiCertrepresentstoSubscribers,Subjects,ApplicationSoftwareVendorsthatdistribute
DigiCert’srootcertificates,andRelyingPartiesthatuseaDigiCertcertificatewhilethecertificateisvalidthat
DigiCertfollowedtheEVGuidelineswhenverifyinginformationandissuingEVCertificates.
ThisrepresentationislimitedsolelytoDigiCert’scompliancewiththeEVGuidelines(e.g.,DigiCertmayrely
onerroneousinformationprovidedinanattorney’sopinionoraccountant’sletterthatischeckedin
accordancewiththeGuidelines).
ForPIVCertificates,DigiCertmaintainsanagreementwithAffiliatedOrganizationsthatincludesobligations
relatedtoauthorizingaffiliationwithSubscribersofPIV‐Icertificates.
9.6.2. RARepresentationsandWarranties
RAsrepresentthat:
1. TheRA’scertificateissuanceandmanagementservicesconformtotheDigiCertCPandthisCPS,
2. InformationprovidedbytheRAdoesnotcontainanyfalseormisleadinginformation,
3. TranslationsperformedbytheRAareanaccuratetranslationoftheoriginalinformation,and
4. AllcertificatesrequestedbytheRAmeettherequirementsofthisCPS.
DigiCert’sagreementwiththeRAmaycontainadditionalrepresentations.
9.6.3. SubscriberRepresentationsandWarranties
PriortobeingissuedandreceivingaCertificate,subscribersaresolelyresponsibleforany
misrepresentationstheymaketothirdpartiesandforalltransactionsthatuseSubscriber’sPrivateKey,
regardlessofwhethersuchusewasauthorized.SubscribersarerequiredtonotifyDigiCertandany
applicableRAifachangeoccursthatcouldaffectthestatusofthecertificate.Subscribersrepresentto
DigiCert,ApplicationSoftwareVendors,andRelyingPartiesthat,foreachcertificate,theSubscriberwill:
1. SecurelygenerateitsPrivateKeysandprotectitsPrivateKeysfromcompromise,
2. ProvideaccurateandcompleteinformationwhencommunicatingwithDigiCert,
3. Confirmtheaccuracyofthecertificatedatapriortousingthecertificate,
4. PromptlyceaseusingacertificateandnotifyDigiCertif(i)anyinformationthatwassubmitted
toDigiCertorisincludedinacertificatechangesorbecomesmisleadingor(ii)thereisany
actualorsuspectedmisuseorcompromiseofthePrivateKeyassociatedwiththecertificate,
5. Ensurethatindividualsusingcertificatesonbehalfofanorganizationhavereceivedsecurity
trainingappropriatetothecertificate,
6. Usethecertificateonlyforauthorizedandlegalpurposes,consistentwiththecertificatepurpose,this
CPS,anyapplicableCP,andtherelevantSubscriberAgreement,includingonlyinstallingSSL
certificatesonserversaccessibleatthedomainlistedinthecertificateandnotusingcodesigning
certificatestosignmaliciouscodeoranycodethatisdownloadedwithoutauser’sconsent,and
7. PromptlyceaseusingthecertificateandrelatedPrivateKeyafterthecertificate’sexpiration.
9.6.4. RelyingPartyRepresentationsandWarranties
EachRelyingPartyrepresentsthat,priortorelyingonaDigiCertcertificate,it:
1. ObtainedsufficientknowledgeontheuseofdigitalcertificatesandPKI,
2. StudiedtheapplicablelimitationsontheusageofcertificatesandagreestoDigiCert’slimitationson
liabilityrelatedtotheuseofcertificates,
3. Hasread,understands,andagreestotheDigiCertRelyingPartyAgreementandthisCPS,
4. VerifiedboththeDigiCertcertificateandthecertificatesinthecertificatechainusingtherelevant
CRLorOCSP,
5. WillnotuseaDigiCertcertificateifthecertificatehasexpiredorbeenrevoked,and
6. Willtakeallreasonablestepstominimizetheriskassociatedwithrelyingonadigitalsignature,
includingonlyrelyingonaDigiCertcertificateafterconsidering:
a) applicablelawandthelegalrequirementsforidentificationofaparty,protectionofthe
confidentialityorprivacyofinformation,andenforceabilityofthetransaction;
b) theintendeduseofthecertificateaslistedinthecertificateorthisCPS,
c) thedatalistedinthecertificate,
54
d) theeconomicvalueofthetransactionorcommunication,
e) thepotentiallossordamagethatwouldbecausedbyanerroneousidentificationoralossof
confidentialityorprivacyofinformationintheapplication,transaction,orcommunication,
f) theRelyingParty’spreviouscourseofdealingwiththeSubscriber,
g) theRelyingParty’sunderstandingoftrade,includingexperiencewithcomputer‐based
methodsoftrade,and
h) anyotherindiciaofreliabilityorunreliabilitypertainingtotheSubscriberand/orthe
application,communication,ortransaction.
Anyunauthorizedrelianceonacertificateisataparty’sownrisk.
9.6.5. RepresentationsandWarrantiesofOtherParticipants
Nostipulation.
9.7.
DISCLAIMERSOFWARRANTIES
EXCEPTASEXPRESSLYSTATEDINSECTION9.6.1,ALLCERTIFICATESANDANYRELATEDSOFTWAREAND
SERVICESAREPROVIDED"ASIS"AND"ASAVAILABLE”.TOTHEMAXIMUMEXTENTPERMITTEDBYLAW,
DIGICERTDISCLAIMSALLEXPRESSANDIMPLIEDWARRANTIES,INCLUDINGALLWARRANTIESOF
MERCHANTABILITY,FITNESSFORAPARTICULARPURPOSE,ANDNON‐INFRINGEMENT.DIGICERTDOES
NOTWARRANTTHATANYSERVICEORPRODUCTWILLMEETANYEXPECTATIONSORTHATACCESSTO
CERTIFICIATESWILLBETIMELYORERROR‐FREE.DigiCertdoesnotguaranteetheavailabilityofany
productsorservicesandmaymodifyordiscontinueanyproductorserviceofferingatanytime.Afiduciary
dutyisnotcreatedsimplybecauseanentityusesDigiCert’sservices.
9.8.
LIMITATIONSOFLIABILITY
NOTHINGHEREINLIMITSLIABILTYRELATEDTO(I)DEATHORPERSONALINJURYRESULTINGFROM
DIGICERT’SNEGLIGENCEOR(II)FRAUDCOMMITTEDBYDIGICERT.EXCEPTASSTATEDABOVE,ANY
ENTITYUSINGADIGICERTCERTIFICATEORSERVICEWAIVESALLLIABILITYOFDIGICERTRELATEDTO
SUCHUSE,PROVIDEDTHATDIGICERTHASMATERIALLYCOMPLIEDWITHTHISCPSINPROVIDINGTHE
CERTIFICATEORSERVICE.DIGICERT’SLIABILITYFORCERTIFICATESANDSERVICESTHATDONOT
MATERIALLYCOMPLYWITHTHISCPSISLIMITEDASFOLLOWS:
1.
2.
3.
4.
NOLIABILITYIFTHEDAMAGEORLOSSRELATESTOACERTIFICATEOTHERTHANASSL
CERTIFICATEORCODESIGNINGCERTIFICATE,
AMAXIMUMLIABILITYOF$1,000PERTRANSACTIONFORSSLCERTIFICATES,
ANAGGREGATEMAXIMUMLIABILITYOF$10,000FORALLCLAIMSRELATEDTOASINGLE
CERTIFICATEORSERVICE,
ANDANAGGREGATEMAXIMUMLIABILITYOF$1MILLIONFORALLCLAIMS,REGARDLESSOF
THENUMBERORSOURCEOFTHECLAIMS.
DIGICERTAPPORTIONSPAYMENTSRELATEDTOANAGGREGATEMAXIMUMLIMITATIONONLIABILITY
UNDERTHISSECTIONTOTHEFIRSTCLAIMSTHATACHIEVEFINALRESOLUTION.
Allliabilityislimitedtoactualandlegallyprovabledamages.DigiCertisnotliablefor:
1. Anyindirect,consequential,special,orpunitivedamagesoranylossofprofit,revenue,data,or
opportunity,evenifDigiCertisawareofthepossibilityofsuchdamages;
2. LiabilityrelatedtofraudorwillfulmisconductoftheApplicant;
3. Liabilityrelatedtouseofacertificatethatexceedsthelimitationsonuse,value,ortransactionsas
statedeitherinthecertificateorthisCPS;
4. Liabilityrelatedtothesecurity,usability,orintegrityofproductsnotsuppliedbyDigiCert,including
theSubscriber’sandRelyingParty’shardware;or
5. LiabilityrelatedtothecompromiseofaSubscriber’sPrivateKey.
Thelimitationsinthissectionapplytothemaximumextentpermittedbylawandapplyregardlessof(i)the
reasonforornatureoftheliability,includingtortclaims,(ii)thenumberofclaimsofliability,(iii)theextent
55
ornatureofthedamages,(iv)whetherDigiCertfailedtofollowanyprovisionofthisCPS,or(v)whetherany
provisionofthisCPSwasprovenineffective.
ThedisclaimersandlimitationsonliabilitiesinthisCPSarefundamentaltermstotheuseofDigiCert’s
certificatesandservices.
9.9.
INDEMNITIES
9.9.1. IndemnificationbyDigiCert
DigiCertshallindemnifyeachApplicationSoftwareVendoragainstanyclaim,damage,orlosssufferedbyan
ApplicationSoftwareVendorrelatedtoanEVCertificateissuedbyDigiCert,regardlessofthecauseofaction
orlegaltheoryinvolved,exceptwheretheclaim,damage,orlosssufferedbytheApplicationSoftwareVendor
wasdirectlycausedbytheApplicationSoftwareVendor’ssoftwaredisplayingeither(1)avalidand
trustworthyEVCertificateasnotvalidortrustworthyor(2)displayingastrustworthy(i)anEVCertificate
thathasexpiredor(ii)arevokedEVCertificatewheretherevocationstatusisavailableonlinebutthe
ApplicationSoftwareVendor’ssoftwarefailedtocheckorignoredthestatus.
9.9.2. IndemnificationbySubscribers
Totheextentpermittedbylaw,eachSubscribershallindemnifyDigiCert,itspartners,andanycross‐signed
entities,andtheirrespectivedirectors,officers,employees,agents,andcontractorsagainstanyloss,damage,
orexpense,includingreasonableattorney’sfees,relatedto(i)anymisrepresentationoromissionofmaterial
factbySubscriber,regardlessofwhetherthemisrepresentationoromissionwasintentionalorunintentional;
(ii)Subscriber’sbreachoftheSubscriberAgreement,thisCPS,orapplicablelaw;(iii)thecompromiseor
unauthorizeduseofacertificateorPrivateKeycausedbytheSubscriber’snegligenceorintentionalacts;or
(iv)Subscriber’smisuseofthecertificateorPrivateKey.
9.9.3. IndemnificationbyRelyingParties
Totheextentpermittedbylaw,eachRelyingPartyshallindemnifyDigiCert,itspartners,andanycross‐
signedentities,andtheirrespectivedirectors,officers,employees,agents,andcontractorsagainstanyloss,
damage,orexpense,includingreasonableattorney’sfees,relatedtotheRelyingParty’s(i)breachofthe
RelyingPartyAgreement,anEnd‐UserLicenseAgreement,thisCPS,orapplicablelaw;(ii)unreasonable
relianceonacertificate;or(iii)failuretocheckthecertificate’sstatuspriortouse.
9.10. TERMANDTERMINATION
9.10.1. Term
ThisCPSandanyamendmentstotheCPSareeffectivewhenpublishedtoDigiCert’sonlinerepositoryand
remainineffectuntilreplacedwithanewerversion.
9.10.2. Termination
ThisCPSandanyamendmentsremainineffectuntilreplacedbyanewerversion.
9.10.3. EffectofTerminationandSurvival
DigiCertwillcommunicatetheconditionsandeffectofthisCPS’sterminationviatheDigiCertRepository.The
communicationwillspecifywhichprovisionssurvivetermination.Ataminimum,allresponsibilitiesrelated
toprotectingconfidentialinformationwillsurvivetermination.AllSubscriberAgreementsremaineffective
untilthecertificateisrevokedorexpired,evenifthisCPSterminates.
9.11. INDIVIDUALNOTICESANDCOMMUNICATIONSWITHPARTICIPANTS
DigiCertacceptsnoticesrelatedtothisCPSatthelocationsspecifiedinSection2.2.Noticesaredeemed
effectiveafterthesenderreceivesavalidanddigitallysignedacknowledgmentofreceiptfromDigiCert.Ifan
acknowledgementofreceiptisnotreceivedwithinfivedays,thesendermustresendthenoticeinpaper
formtothestreetaddressspecifiedinSection2.2usingeitheracourierservicethatconfirmsdeliveryor
56
viacertifiedorregisteredmailwithpostageprepaidandreturnreceiptrequested.DigiCertmayallowother
formsofnoticeinitsSubscriberAgreements.
9.12. AMENDMENTS
9.12.1. ProcedureforAmendment
ThisCPSisreviewedannually.AmendmentsaremadebypostinganupdatedversionoftheCPStotheonline
repository.ControlsareinplacetoreasonablyensurethatthisCPSisnotamendedandpublishedwithout
thepriorauthorizationoftheDCPA.
9.12.2. NotificationMechanismandPeriod
DigiCertpostsCPSrevisionstoitswebsite.DigiCertdoesnotguaranteeorsetanotice‐and‐commentperiod
andmaymakechangestothisCPSwithoutnoticeandwithoutchangingtheversionnumber.Majorchanges
affectingaccreditedcertificatesareannouncedandapprovedbytheaccreditingagencypriortobecoming
effective.TheDCPAisresponsiblefordeterminingwhatconstitutesamaterialchangeoftheCPS.
9.12.3. CircumstancesunderwhichOIDMustBeChanged
TheDCPAissolelyresponsiblefordeterminingwhetheranamendmenttotheCPSrequiresanOIDchange.
9.13. DISPUTERESOLUTIONPROVISIONS
PartiesarerequiredtonotifyDigiCertandattempttoresolvedisputesdirectlywithDigiCertbeforeresorting
toanydisputeresolutionmechanism,includingadjudicationoranytypeofalternativedisputeresolution.
9.14. GOVERNINGLAW
ThenationallawoftherelevantmemberstategovernsanydisputeinvolvingQualifiedCertificates.Except
fordisputesinvolvingQualifiedCertificates,thelawsofthestateofUtahgoverntheinterpretation,
construction,andenforcementofthisCPSandallproceedingsrelatedtoDigiCert’sproductsandservices,
includingtortclaims,withoutregardtoanyconflictsoflawprinciples.ThestateofUtahhasnon‐exclusive
venueandjurisdictionoveranyproceedingsrelatedtotheCPSoranyDigiCertproductorservice.
9.15. COMPLIANCEWITHAPPLICABLELAW
ThisCPSissubjecttoallapplicablelawsandregulations,includingUnitedStatesrestrictionsontheexportof
softwareandcryptographyproducts.Subjecttosection9.4.5’sNoticeandConsenttoUsePrivateInformation
containedinCertificates,DigiCertmeetstherequirementsoftheEuropeandataprotectiondirective
95/46/ECandhasestablishedappropriatetechnicalandorganizationmeasuresagainstunauthorizedor
unlawfulprocessingofpersonaldataandagainsttheloss,damage,ordestructionofpersonaldata.
9.16. MISCELLANEOUSPROVISIONS
9.16.1. EntireAgreement
DigiCertcontractuallyobligateseachRAtocomplywiththisCPSandapplicableindustryguidelines.DigiCert
alsorequireseachpartyusingitsproductsandservicestoenterintoanagreementthatdelineatestheterms
associatedwiththeproductorservice.IfanagreementhasprovisionsthatdifferfromthisCPS,thenthe
agreementwiththatpartycontrols,butsolelywithrespecttothatparty.Thirdpartiesmaynotrelyonor
bringactiontoenforcesuchagreement.
9.16.2. Assignment
AnyentitiesoperatingunderthisCPSmaynotassigntheirrightsorobligationswithoutthepriorwritten
consentofDigiCert.Unlessspecifiedotherwiseinacontactwithaparty,DigiCertdoesnotprovidenoticeof
assignment.
57
9.16.3. Severability
IfanyprovisionofthisCPSisheldinvalidorunenforceablebyacompetentcourtortribunal,theremainderof
theCPSwillremainvalidandenforceable.EachprovisionofthisCPSthatprovidesforalimitationofliability,
disclaimerofawarranty,oranexclusionofdamagesisseverableandindependentofanyotherprovision.
9.16.4. Enforcement(attorneys'feesandwaiverofrights)
DigiCertmayseekindemnificationandattorneys'feesfromapartyfordamages,losses,andexpensesrelated
tothatparty'sconduct.DigiCert’sfailuretoenforceaprovisionofthisCPSdoesnotwaiveDigiCert’srightto
enforcethesameprovisionlaterorrighttoenforceanyotherprovisionofthisCPS.Tobeeffective,waivers
mustbeinwritingandsignedbyDigiCert.
9.16.5. ForceMajeure
DigiCertisnotliableforanydelayorfailuretoperformanobligationunderthisCPStotheextentthatthe
delayorfailureiscausedbyanoccurrencebeyondDigiCert’sreasonablecontrol.Theoperationofthe
InternetisbeyondDigiCert’sreasonablecontrol.
9.17. OTHERPROVISIONS
Nostipulation.
58
APPENDIXA:SAMPLEOPINIONLETTER
[Date]
To:
DigiCert,Inc.
2600WestExecutiveParkway
Suite500
Lehi,UT84043
Email:[email protected]
Fax:801‐705‐0481
Re:
DigitalCertificatefor[Exactcompanynameofclient–seefootnote1](“Client”)
ThisfirmrepresentsClient,whoaskedthatI,asits[accountant,lawyer,solicitors,barrister,advocate,
etc.],attesttothefollowinginformationsolelyasrelatedtotheClient’sapplicationforadigitalcertificate.
AfterreviewingtheClient’srecordsandbasedonmyinvestigation,myprofessionalopinionisthat:
1. Clientisadulyformed[corporation,LLC,etc.]underthelawsofthe[state/province]of[nameof
governingjurisdictionwhereClientisincorporatedorregistered];is“active,”“valid,”“current,”orthe
equivalent;andisnotunderanyknownlegaldisability.
2. [Ifapplicable]TheRomanizedtransliterationofClient’sformallegalnameis:[Romanizedname].
3. [Ifapplicable]Clientconductsbusinessunderthe[assumed/DBA/trade]nameof[assumednameof
Client].Clienthasacurrentlyvalidregistrationofthenamewiththegovernmentagencythathas
jurisdictionovertheplaceofbusinesslistedbelow.
4. Theaddresswhere[Client,Client’sparent,orClient’ssubsidiary–selectone]conductsbusiness
operationsis:
[Insertplaceofbusiness–thisshouldmatchtheaddressonthecertificateapplication]
5. AmaintelephonenumberatClient’splaceofbusinessis:
[Insertprimarytelephonenumberofbusiness]
6. [NameofClient’sRepresentative–seefootnote2]isanindividual(orareindividuals)withthe
authoritytoactonbehalfofClientto:
a) ProvideinformationabouttheClientcontainedinthereferencedapplication,
b) Requestoneormoredigitalcertificatesanddesignateotherpersonstorequestdigital
certificates,and
c) AgreetothecontractualobligationscontainedinDigiCert’sagreements.
7. [NameandtitleofClient’sRepresentative],whoisClient’s[TitleofClientRepresentative],canbe
contactedat:
Email:[EmailaddressofClientRepresentative]
Phone:[PhonenumberofClientRepresentative]
8. Clienthaseitheroperatedasabusinessforthreeormoreyearsorhasanactivedepositaccountheld
atabankorotherfinancialinstitutionwherefundsdepositedarepayableondemand.
9. Clienthastheexclusiverighttousethefollowingdomainname(s)inidentifyingitselfontheInternet
andisawarethatithassuchcontrol:
[Insertdomainnames]
59
Althoughwedidnotfindanyexceptionstotheaboveidentificationprocedures,theseproceduresdonot
constituteanauditoropinionofClient'sapplicationforadigitalcertificate.Wearenotexpressinganopinion
onClient'sdigitalcertificateapplicationandhaveprovidedthislettersolelyforthebenefitofDigiCertin
connectionwithClient'sapplicationforadigitalcertificate.Nootherpersonorentitymayrelyonthisletter
withoutmyexpresswrittenconsent.Thislettershallnotbequotedinwholeorinpart,used,publishedor
otherwisereferredtoorrelieduponinanymanner,including,withoutlimitation,inanyfinancialstatement
orotherdocument.
Signature:__________________________________________________
PrintAccountant/AttorneyName:______________________________________________________
PhoneNumber:_____________________________________________
Email:_____________________________________________
FirmName:_____________________________________________
Licensedin:___________________________________
Licensenumber,ifany:__________________________________
Contactinformationforlicensingagencywherethisaccountant's/attorney'slicenseinformationmaybe
verified:___________________________________________________________________
Note1:ThismustbetheClient’sexactcorporatenameasregisteredwiththerelevantIncorporatingAgency
intheClient’sJurisdictionofIncorporation.
Note2:APowerofAttorneyfromanofficeroftheClientwhohasthepowertodelegateauthorityissufficient
toestablishtheClientRepresentative’sactualauthority.Multiplerepresentativesmaybelisted.
Note3:In‐housecounseloftheClientmaysubmitthisletterifpermittedbytherulesofyourjurisdiction.
Note4: Thislettermaybesubmittedbymail,fax,oremail.
60