Dear Ben,
We're wondering about the last sentence of proposed MRSP line 273:
[…] Successive period-of-time audits and auditor-provided annual key lifecycle management reports MUST be contiguous (no gaps).
What are the consequences if there are gaps? Can the gaps be closed retrospectively or must the key be discarded?
Thanks
Roman
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
dev-security-po...@mozilla.org.
To view this discussion visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYZ4bfgg05Wb7MOfKz0q5rjnvnruQoKtS0O_kCOv9GMtQ%40mail.gmail.com.
With respect to CA key protection, gaps in audit reports raise a big concern, but possibly they could be considered on a case-by-case basis. It would depend on the circumstances and the justification provided by the CA operator. But yes, if the gap were unjustified or part of a lapse in compliance or security, we would consider the key compromised and the key material and any certificates would not be trusted.
Here are some ideas for how a CA operator's case-specific request might be handled:
We would require an independent auditor's post-gap report confirming that key lifecycle management processes remained intact, supported by sufficient documentation and evidence from the CA operator demonstrating CA key security measures as well as compliance with relevant policies or requirements.
We would also want the CA operator to explain publicly:
Thanks again,
Ben