diff --git a/SecurityPolicy.html b/SecurityPolicy.html index 75534ca..119e6e1 100644 --- a/SecurityPolicy.html +++ b/SecurityPolicy.html @@ -77,7 +77,7 @@ These roles are directly covered:
@@ -131,14 +133,14 @@ deriving from the above principles. See §1.1. -
This policy document says what is done, rather than how to do it. + + +Some sections are empty, which means +"refer to the Manual." +
-Units shall have nickname clearly marked on front and rear of chassis. + +Each unit shall be distinctly and uniquely identified on all visible sides. + Machines shall be housed in secured facilities (cages and/or locked racks).
@@ -247,8 +260,6 @@ prepared in advance.Wytze: new section replacing 'cables':
-Equipment that is subject to a service security risk must be retired if service is required. @@ -331,8 +342,12 @@ one systems administrator present.
-Only Systems Administrators are authorised to access the data. -All others must not access the data. + +There is no inherent authorisation to access the data. +Systems Administrators are authorised to access +the raw data under the control of this policy. + +All others must not access the raw data. All are responsible for protecting the data from access by those not authorised.
@@ -347,9 +362,14 @@ All physical accesses are logged and reported to all.There is no procedure for emergency access. -If emergency access is gained, -this must be reported and justified immediately. -See DPR. + +If, in the judgement of the systems administrator, +emergency access is required and gained, +in order to avoid a greater harm, +independent authorisation before the +Arbitrator must be sought as soon as possible. + +See DPR.
-Current and complete diagrams of the physical and logical CAcert network infrastructure shall be maintained by systems administration team leader. These diagrams should include cabling information, physical port configuration details, and expected/allowed data flow directions, as applicable. Diagrams should be revision controlled, and must be updated when any change is made. +Current and complete diagrams of the physical and logical +CAcert network infrastructure shall be maintained by +systems administration team leader. +These diagrams should include cabling information, +physical port configuration details, +expected/allowed data flow directions, + +and any further pertinent information, + +as applicable. +Diagrams should be revision controlled, +and must be updated when any change is made.
-Only such services as are required for normal operation should be visible externally; systems and servers which do not require access to the Internet for their normal operation must not be granted that access. +Only such services as are required for normal operation +should be visible externally; +systems and servers which do not require access +to the Internet for their normal operation +must not be granted that access. + +Any exceptions must be documented in the Security Manual. +
Declaration of an emergency patching situation should not occur with any regularity. -Emergency patch events must be documented within the regular summaries to Board. +Emergency patch events must be documented +within the regular summaries + +by the team leader to Board +independent of filed disputes. +
-Software assessment takes place on various test systems (not a critical system). See §7. Once offered by Software Assessment (team), system administration team leader has to approve the installation of each release or patch. +Software assessment takes place on various test systems +(not a critical system). See §7. +Once offered by Software Assessment (team), +system administration team leader has to +approve the installation of each release or patch.
-Any changes made to source code must be referred back to software assessment team. +Any changes made to source code must be referred +back to software assessment team + +and installation needs to be deferred +until approved by the Software Assessment Team. +
- These two paras seem in wrong place. - Either add a "3.4.3. User Access" or? -
--General user access to CAcert services shall normally be conducted through a web-based application interface. Features are made available according to Assurance Points and direct permissions. + +All access to critical data and services shall be +controlled and logged. + + +
-Direct Permissions are managed by the Application to enable special online administrators from the Support Team access to certain functions. -
+what about web-api interfaces? Excluded?
-This bit is expanded!
+-The access control lists (see §1.1.1) are: + +Additional or special access is granted according to the +authorisations on the below access control lists + +(see §1.1.1):
Access Engineers | control of access by personnel to hardware | exclusive of all other roles | -Boards of CAcert and of Oophaga | +Boards of CAcert (or designee) | ||
Physical Access List | systems administrators | hardware-level for installation and recovery | exclusive with Access Engineers and Software Assessors | -Boards of CAcert and of Oophaga | +Boards of CAcert (or designee) | |
SSH Access List | systems administrators | @@ -514,8 +578,8 @@ The access control lists (see §1.1.1) are:systems administration team leader | ||||
Support Access List | -supporters | -support features in the online interface | +Support Engineer | +support features in the web application | includes by default all systems administrators | systems administration team leader |