From fe0b2a2af05f409fcd96d0cc31d8ebf03d8286e1 Mon Sep 17 00:00:00 2001 From: Ian Grigg Date: Tue, 20 Apr 2010 10:51:03 +0000 Subject: [PATCH] fix up xhtml anchours git-svn-id: http://svn.cacert.org/CAcert/Policies@1874 14b1bab8-4ef6-0310-b690-991c95c89dfd --- ConfigurationControlSpecification.html | 48 +++++++++++++------------- 1 file changed, 24 insertions(+), 24 deletions(-) diff --git a/ConfigurationControlSpecification.html b/ConfigurationControlSpecification.html index 00bfa3d..333cd8d 100644 --- a/ConfigurationControlSpecification.html +++ b/ConfigurationControlSpecification.html @@ -82,11 +82,11 @@ DRC-A.1. CCS may be seen as the index to systems audit under DRC.

-

2 Documents

+

2 Documents

-

2.1 Controlled Document List

+

2.1 Controlled Document List

This CCS creates a list of Primary or "root" documents known as Policies. @@ -107,7 +107,7 @@ wiki.cacert.org/PolicyDecisions.

-

2.2 Change

+

2.2 Change

@@ -140,27 +140,27 @@ documents of higher status (DRAFT or POLICY). Copies should be eliminated where not being worked on.

-

2.3 Control

+

2.3 Control

CAcert policies are required to be owned / transferred to CAcert. See PoP 6.2.

-

3 Hardware

+

3 Hardware

-

3.1 Controlled Hardware List

+

3.1 Controlled Hardware List

Critical systems are defined by Security Policy.

-

3.2 Change

+

3.2 Change

See Security Policy.

-

3.3 Control

+

3.3 Control

Control of Hardware is the ultimate responsibility of the Board of CAcert Inc. @@ -171,9 +171,9 @@ The ownership responsibility is delegated by agreement to Oophaga.

-

4 Software

+

4 Software

-

4.1 Controlled Software List

+

4.1 Controlled Software List

Critical software is defined by Security Policy. @@ -187,11 +187,11 @@ Critical software is defined by Security Policy.

  • What is far more problematic is the failure to do CCA & Challenge notification.
  • -

    4.2 Change

    +

    4.2 Change

    See Security Policy.

    -

    4.3 Control

    +

    4.3 Control

    CAcert owns its code, or requires control over open source code in use @@ -225,17 +225,17 @@ and a registry of software under approved open source licences. -

    5 Certificates

    +

    5 Certificates

    This section applies to Root and Sub-root certificates, not to End-entity (subscriber, member) certificates.

    -

    5.1 Certificates List

    +

    5.1 Certificates List

    Certificates (Root and sub-root) are to be listed in the CPS.

    -

    5.2 Changes

    +

    5.2 Changes

    Creation and handling of Certificates @@ -244,37 +244,37 @@ Usage of Certificates is controlled by Certification Practice Statement.

    -

    5.3 Archive

    +

    5.3 Archive

    See Security Policy.

    -

    6 Logs

    +

    6 Logs

    -

    6.1 Controlled Logs List

    +

    6.1 Controlled Logs List

    Logs are defined by Security Policy.

    -

    6.2 Changes

    +

    6.2 Changes

    Changes to Hardware, Software and Root Certificates are logged according to Security Policy.

    -

    6.3 Archive

    +

    6.3 Archive

    See Security Policy.

    -

    7 Data

    +

    7 Data

    -

    7.1 Types of Data

    +

    7.1 Types of Data

    Types of critical member data is defined by Assurance Policy.

    -

    7.2 Changes

    +

    7.2 Changes

    Changes and access to critical member data @@ -287,7 +287,7 @@ collection and storage of critical member data is defined by Security Policy.

    -

    7.3 Archive

    +

    7.3 Archive

    Data retention is controlled by Security Policy and CAcert Community Agreement.