diff --git a/SecurityPolicy.html b/SecurityPolicy.html index 0714553..ba16ce7 100644 --- a/SecurityPolicy.html +++ b/SecurityPolicy.html @@ -691,6 +691,268 @@ Access to incident reports is restricted. + +

5. INCIDENT RESPONSE

+

6. DISASTER RECOVERY

+

7. SOFTWARE DEVELOPMENT

+

8. SUPPORT

+ + + + +

9. ADMINISTRATIVE

+ +

9.1. Staffing

+ +

9.1.1. Roles and responsibilities

+ + + +

9.1.2. Staffing levels

+ +

+Each team should have a minimum of 2 members available at any time. +Individuals should be active in only one team at any one time, +but may be observers on any number of teams. +

+ +

+One individual in each team is designated leader and reports to Board. +

+ +

9.1.3. Process of new Team Members

+ +

+New team members need: +

+ + + +

+The team supports the process of adding new team members. +

+ +

9.1.4. Background Check Procedures

+

+Background checks are carried out with full seriousness. +Background checks must be conducted under the direction of the Arbitrator, +with a separate Case Manager to provide four eyes. +

+ +

9.1.4.1. Scope

+

+An investigation should include examination of: +

+ + + +

9.1.4.2. Coverage

+

+A background check is to be done for all critical roles. +The background check should be done on all of: +

+ + + +

9.1.4.3. Documentation

+ +

+The process of the background check should be documented as a procedure. +

+ +

+Documentation of each individual check should be preserved +and should be reviewable under any future Arbitration. +It must include: +

+ + + +

9.1.4.4. Privacy for Hard Roles

+ +

+The following privacy considerations exist: +

+ + + +

+CAcert trusted roles give up some privacy for the privacy of others. +

+ +

9.1.5. Authorisation

+ +

+Individuals and access (both) must be authorised by the Board. +Only the Board may approve new individuals or any access to the systems. +Each Individual should be proposed to the Board, +with the relevant supporting information as above. +

+ +

+The Board should deliberate directly and in full. +Board members who are also active in the area should recuse from the vote, +but should support the deliberations. +Deliberations and decisions should be documented. +All conflicts of interest should be examined. +

+ +

9.1.6. Security

+ +

+It is the responsibility of all individuals to observe and report on security issues. +All of CAcert observes all where possible. +It is the responsibility of each individual to resolve it satisfactorily, +or to ensure that it is reported fully. +

+ +

+Only information subject to a specific and documented exception +may be kept secret or confidential. +The exception itself must not be secret or confidential. +All secrets and confidentials are reviewable under Arbitration, +and may be reversed. +

+ +

9.1.7. Termination of staff

+ +

+Termination of access may be for resignation, Arbitration ruling, +or decision of Board or team leader. +On termination (for any reason), access and information must be secured. +

+ +

9.1.8. HR and Training

+ +

+It is the responsibility of the team leaders +to coordinate technical testing and training, +especially of new team members. +

+ +

9.2. Key changeover

+ +

what goes in here? Non-root keys?

+ +

9.3. Key generation/transfer

+ +

9.3.1. Root Key generation

+ +

+Root keys should be generated on a machine built securely +for that purpose only and cleaned/wiped/destroyed immediately afterwards. +

+ +

9.3.2. Backup and escrow

+ +

+Root keys must be kept on reliable removable media used for that purpose only. +Private Keys must be encrypted and should be dual-encrypted. +Passphrase must be strong and must be separately escrowed from media. +Dual control must be maintained. +

+ +

+The top-level root must be escrowed under Board control. +Subroots may be escrowed by either Board or Systems Administration Team. +

+ +

9.3.3. Recovery

+ +

+Recovery must only be conducted under Board or Arbitrator direction. +A recovery exercise should be conducted approximately every year. +

+ +

9.4. Root certificate changes

+ +

9.4.1. Creation

+ +

Document.

+ +

9.4.2. Revocation

+

Document.

+ +

9.4.3. Public notification

+ +

+Board has responsibility for formal advisory to the public. +

+ +

9.5. Legal

+ +

9.5.1. Responsibility

+ +

+The board is responsible for the CA at the executive level. +

+ +

9.5.2. Response to external (legal) inquiry

+ +

+All external inquiries of security import are filed as disputes and placed before the Arbitrator under DRP. +

+ +

+Only the Arbitrator has the authority to deal with external requests and/or create a procedure. Systems administrators, board members and other key roles do not have the authority to answer legal inquiry. The Arbitrator's ruling may instruct individuals, and becomes your authority to act. +

+ + + + +

10. REFERENCES

+ +

10.1 Contacts

+

+Contact information for all key people and teams must be documented. +

+ +

10.2 Documents

+

+All incorporated Documents must be documented. +

+ +

10.3 Related Documents

+

+Relevant and helpdul Documents should be referenced for convenience. +

+ + + +
Valid HTML 4.01

This is the end of the Security Policy.