diff --git a/ConfigurationControlSpecification.html b/ConfigurationControlSpecification.html index 2443efa..394de8b 100644 --- a/ConfigurationControlSpecification.html +++ b/ConfigurationControlSpecification.html @@ -53,7 +53,7 @@ Status: 20100407 WIP

-

1 Introduction

+

1 Introduction

@@ -76,11 +76,11 @@ DRC-A.1. CCS may be seen as the index to systems audit under DRC.

-

2 Documents

+

2 Documents

-

2.1 Controlled Document List

+

2.1 Controlled Document List

This CCS creates a list of Primary or "root" documents known as Policies. @@ -101,7 +101,7 @@ http://wiki.cacert.org/PolicyDecisions.

-

2.2 Change

+

2.2 Change

@@ -134,27 +134,27 @@ documents of higher status (DRAFT or POLICY). Copies should be eliminated where not being worked on.

-

2.3 Control

+

2.3 Control

CAcert policies are required to be owned / transferred to CAcert. See PoP 6.2.

-

3 Hardware

+

3 Hardware

-

3.1 Controlled Hardware List

+

3.1 Controlled Hardware List

Critical systems are defined by Security Policy.

-

3.2 Change

+

3.2 Change

See Security Policy.

-

3.3 Control

+

3.3 Control

Control of Hardware is the ultimate responsibility of the Board of CAcert Inc. @@ -165,9 +165,9 @@ The ownership responsibility is delegated by agreement to Oophaga.

-

4 Software

+

4 Software

-

4.1 Controlled Software List

+

4.1 Controlled Software List

Critical software is defined by Security Policy. @@ -181,11 +181,11 @@ Critical software is defined by Security Policy.

  • What is far more problematic is the failure to do CCA & Challenge notification. -

    4.2 Change

    +

    4.2 Change

    See Security Policy.

    -

    4.3 Control

    +

    4.3 Control

    CAcert owns its code, or requires control over open source code in use @@ -219,35 +219,35 @@ and a registry of software under approved open source licences. -

    5 Certificates

    +

    5 Certificates

    -

    5.1 Certificates List

    +

    5.1 Certificates List

    Root Certificates are to be listed in the CPS.

    -

    5.2 Changes

    +

    5.2 Changes

    Creation and usage of Root Certificates is to be controlled by Security Policy.

    -

    5.3 Archive

    +

    5.3 Archive

    See Security Policy.

    -

    6 Logs

    +

    6 Logs

    -

    6.1 Controlled Logs List

    +

    6.1 Controlled Logs List

    Logs are defined by Security Policy.

    -

    6.2 Changes

    +

    6.2 Changes

    Changes to Hardware, Software and Root Certificates are logged according to Security Policy.

    -

    6.3 Archive

    +

    6.3 Archive

    See Security Policy.