2009-12-31 20:02:37 +00:00
< !DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
< html >
< head >
< meta http-equiv = "CONTENT-TYPE" content = "text/html; charset=utf-8" >
< title > Configuration Controlled Specification - work-in-progress< / title >
< style type = "text/css" >
<!--
body {
font-family : verdana, helvetica, arial, sans-serif;
}
th {
text-align : left;
}
.q {
color : green;
font-weight: bold;
text-align: center;
font-style:italic;
}
.error {
color : red;
font-weight: bold;
text-align: center;
font-style:italic;
}
.change {
color : blue;
font-weight: bold;
}
a:hover {
color : gray;
}
-->
< / style >
< / head >
< body lang = "en-GB" >
< h1 > Configuration Control Specification < / h1 >
<!-- Absolute URL because the policies are located absolutely. -->
< a href = "http://www.cacert.org/policy/PolicyOnPolicy.php" > < img align = "right" src = "Images/cacert-wip.png" alt = "Configuration Control Specification Status == work-in-progress" border = "0" > < / a > < p >
Creation date: 20091214< br >
Status: < i > WIP < / i > < br > < br >
< h3 > < a name = "1" > 1< / a > < a name = "Introduction" > Introduction < / a > < / h3 >
<!-- This section from A.1.a through A.1.c -->
< p >
The Configuration Control Specification (CCS) controls and tracks those documents, processes and assets which are critical to the business, security and governance of the CAcert operations.
< / p >
< p >
This document is the procedure for CCS.
This document itself is a component of the CCS.
All other documentation and process specified within
is derivative and is ruled by the CCS.
< / p >
< h3 > < a name = "2" > 2< / a > < a name = "Documents" > Documents < / a > < / h3 >
<!-- This section from A.1.c through A.1.h -->
< h4 > < a name = "2.1" > 2.1< / a > < a name = "doc_list" > Controlled Document List < / a > < / h4 >
< p >
2010-01-27 19:17:23 +00:00
This CCS creates a list of Primary or "root" documents.
2009-12-31 20:02:37 +00:00
< / p >
< p >
Primary Documents may authorise other secondary documents
under the same process (PoP).
2010-01-27 19:17:23 +00:00
Policy Officer manages the controlled documents list
2009-12-31 20:02:37 +00:00
containing numbers, locations and versions of all controlled documents.
2010-01-27 19:17:23 +00:00
The list is part of this CCS, and is located at
< a href = "http://svn.cacert.org/CAcert/Policies/ControlledDocumentList.html" >
http://svn.cacert.org/CAcert/Policies/ControlledDocumentList.html< / a >
2009-12-31 20:02:37 +00:00
< / p >
< h4 > < a name = "2.2" > 2.2< / a > < a name = "doc_change" > Change < / a > < / h4 >
< p >
2010-01-27 19:17:23 +00:00
Overall responsibility for change to documents resides with the policy mailgroup,
as specified in Policy on Policy.
CAcert Inc., board maintains a veto on new policies while in DRAFT.
Fully approved documents (POLICY status) are published on the CAcert website at
< a href = "http://www.cacert.org/policy/" >
http://www.cacert.org/policy/< / a >
in plain HTML format.
2009-12-31 20:02:37 +00:00
< / p >
< p >
2010-01-27 19:17:23 +00:00
Pre-approval work (DRAFT status) and working documents (work-in-progress status)
are made available on publically-accessible version management systems
(rooted at Subversion:
< a href = "http://svn.cacert.org/CAcert/Policies" >
http://svn.cacert.org/CAcert/Policies< / a >
wiki:
< a href = "http://wiki.cacert.org/wiki/PolicyDrafts" >
http://wiki.cacert.org/wiki/PolicyDrafts< / a > ).
2009-12-31 20:02:37 +00:00
< / p >
< h4 > < a name = "2.3" > 2.3< / a > < a name = "doc_control" > Control < / a > < / h4 >
< p >
CAcert policies are required to be owned / transferred to CAcert. See PoP 6.2.
< / p >
< h3 > < a name = "3" > 3< / a > < a name = "Hardware" > Hardware < / a > < / h3 >
<!-- This section from A.1.j -->
< h4 > < a name = "3.1" > 3.1< / a > < a name = "hard_list" > Controlled Hardware List < / a > < / h4 >
< p >
Critical systems are defined by Security Policy.
< / p >
< h4 > < a name = "3.2" > 3.2< / a > < a name = "hard_change" > Change < / a > < / h4 >
< p > See Security Policy. < / p >
< h4 > < a name = "3.3" > 3.3< / a > < a name = "hard_control" > Control < / a > < / h4 >
< p >
Control of Hardware is the ultimate responsibility of the Board of CAcert Inc.
The responsibility for acts with hardware is delegated
to Access Engineers and Systems Administrators as per
Security Policy.
The ownership responsibility is delegated by agreement to Oophaga.
< / p >
< h3 > < a name = "4" > 4< / a > < a name = "Software" > Software < / a > < / h3 >
<!-- This section from A.1.i -->
< h4 > < a name = "4.1" > 4.1< / a > < a name = "hard_list" > Controlled Software List < / a > < / h4 >
< p >
Critical software is defined by Security Policy.
< / p >
< h4 > < a name = "4.2" > 4.2< / a > < a name = "soft_change" > Change < / a > < / h4 >
< p > See Security Policy. < / p >
< h4 > < a name = "4.3" > 4.3< / a > < a name = "soft_control" > Control < / a > < / h4 >
< p >
CAcert owns or requires full control over its code
by means of an approved free and open licence.
Such code must be identified and managed by Software Assessment.
< / p >
< p >
Developers transfer full rights to CAcert
(in a similar fashion to documents),
or organise their contributions under a
proper free and open source code regime,
as approved by Board.
Where code is published
(beyond scope of this document)
care must be taken not to infringe licence conditions.
For example, mingling issues with GPL.
< / p >
< p >
The Software Assessment Team Leader
maintains a registry of assignments
of title or full licence,
and a registry of software under approved open source licences.
< / p >
< h3 > < a name = "5" > 5< / a > < a name = "Logs" > Logs < / a > < / h3 >
<!-- This section from A.1.k -->
< h4 > < a name = "5.1" > 5.1< / a > < a name = "logs_list" > Controlled Logs List < / a > < / h4 >
< p >
Logs are defined by Security Policy.
< / p >
< h4 > < a name = "5.2" > 5.2< / a > < a name = "logs_change" > Changes < / a > < / h4 >
< p > Changes to Hardware and Software are logged according to Security Policy. < / p >
< h4 > < a name = "5.3" > 5.3< / a > < a name = "logs_archive" > Archive < / a > < / h4 >
< p > See Security Policy. < / p >
< / body > < / html >