diff --git a/SecurityPolicy.html b/SecurityPolicy.html index e0e7d26..02d256b 100644 --- a/SecurityPolicy.html +++ b/SecurityPolicy.html @@ -337,7 +337,7 @@ The following steps are to be taken: Records of secure erasure and method of final disposal shall be tracked in the asset inventory. Where critical data is involved, -two systems administrators must sign-off on each step. +two Systems Administrators must sign-off on each step.

2.3. Physical Access

@@ -359,10 +359,10 @@ Access to physical equipment must be authorised.

The Security Manual must present the different access profiles. At least one Access Engineer must control access in all cases. -At least one systems administrator will be present for +At least one Systems Administrator will be present for logical access. Only the most basic and safest of accesses should be done with -one systems administrator present. +one Systems Administrator present.

@@ -388,7 +388,7 @@ All physical accesses are logged and reported to all.

There must not be a procedure for emergency access. -If, in the judgement of the systems administrator, +If, in the judgement of the Systems Administrator, emergency access is required and gained, in order to avoid a greater harm, independent authorisation before the @@ -412,7 +412,7 @@ codes and devices (keys) are to be authorised and documented.

Current and complete diagrams of the physical and logical CAcert network infrastructure shall be maintained by -systems administration team leader. +Systems Administration team leader. These diagrams should include cabling information, physical port configuration details, expected/allowed data flow directions, @@ -490,7 +490,7 @@ Documentation for installing and configuring servers with the appropriate softwa

3.2.3. Patching

-Software used on production servers must be kept current with respect to patches affecting software security. Patch application is governed by CCS and must be approved by the systems administration team leader, fully documented in the logs and reported by email to the systems administration list on completion (see §4.2). +Software used on production servers must be kept current with respect to patches affecting software security. Patch application is governed by CCS and must be approved by the Systems Administration team leader, fully documented in the logs and reported by email to the Systems Administration list on completion (see §4.2).

3.2.3.1. “emergency” patching
@@ -503,7 +503,7 @@ of software has become known an emergent local exploit may also be deemed to be an emergency). Application of patches in this case may occur as soon as possible, bypassing the normal configuration-change process. -The systems administration team leader must either approve the patch +The Systems Administration team leader must either approve the patch or @@ -511,7 +511,7 @@ instruct remedial action, and refer the case to dispute resolution.

- + Declaration of an emergency patching situation should not occur with any regularity. Emergency patch events must be documented @@ -570,25 +570,25 @@ authorisations on the below access control lists Systems Administrators hardware-level for installation and recovery exclusive with Access Engineers and Software Assessors - systems administration team leader Board of CAcert (or designee) + Systems Administration team leader Board of CAcert (or designee) SSH Access List Systems Administrators and Application Engineers Unix / account / shell level includes by default all on Physical Access List - systems administration team leader + Systems Administration team leader Repository Access List Application Engineers change the source code repository and install patches to application - exclusive with Access Engineers and systems administrators + exclusive with Access Engineers and Systems Administrators software assessment team leader Support Access List Support Engineer support features in the web application - includes by default all Application Engineers systems administrators - systems administration support team leader + includes by default all Application Engineers Systems Administrators + Systems Administration support team leader @@ -620,7 +620,7 @@ See §9.1.7.

4.1. System administration

-Primary systems administration tasks +Primary Systems Administration tasks shall be conducted under four eyes principle. These shall include backup performance verification, software patch application, @@ -755,7 +755,7 @@ For any other purpose than verification of the success of the backup, see next.

4.3.7. Key Management

The encryption keys must be stored securely by the -CAcert systems administrators. +CAcert Systems Administrators. Paper documentation must be stored with manual backups.

@@ -843,7 +843,7 @@ A full copy should be appended to the documentation of the investigation. Sensitive information may be pushed out into a restricted appendix of the report. -The systems administration team leader is responsible +The Systems Administration team leader is responsible for publication and maintenance.

@@ -958,7 +958,7 @@ software assessment team. @@ -972,7 +972,7 @@ software assessment team.

The production code is maintained in a secure production repository within the critical systems that is run by the -systems administation team. +Systems Administation team. Access is made available to the Application Engineers.

@@ -1000,7 +1000,7 @@ Test status of each patch must be logged. Software assessment team maintains a bug system. Primary communications should go through this system. Management access should be granted to all Software Assessors, -software developers, and systems administrators. +software developers, and Systems Administrators. Bug submission access should be provided to any Member that requests it.

@@ -1332,12 +1332,13 @@ the CA at the executive level.

All external inquiries of security import are filed as disputes and placed before the Arbitrator under DRP. +Board and applicable team leaders must be notified.

Only the Arbitrator has the authority to deal with external requests and/or create a procedure. -Access Engineers, systems administrators, +Access Engineers, Systems Administrators, support engineers, Board members and other key roles do not have the authority to answer legal inquiry.