Ver. | Change Proposal | Description | Adopted | Effective Date |
---|---|---|---|---|
1.0.0 | None | Version 1.0 of the Certificate Policy Adopted | May 9, 2019 | May 9, 2019 |
This Certificate Policy (CP) outlines the policy and requirements for the United States (U.S.) Federal Public Key Infrastructure in the issuance and management of U.S. Federal Publicly-Trusted TLS Certificates. The certificates under this policy are for identifying and authenticating U.S. Federal Government web services.
This policy is for a hierarchical Public Key Infrastructure restricted to services operated by or on behalf of the U.S. Federal Government. The hierarchical PKI is referenced as the U.S. Federal Public Trust TLS PKI in this document.
This document serves two purposes:
- To specify the U.S. Federal Public Trust TLS PKI Certificate Policy and requirements, and
- To provide requirements for what each Certification Authority shall address in its Certification Practice Statement
This policy promotes automation to improve U.S. Federal Government efficiencies.
In accordance with RFC 3647, this CP includes all nine sections of the RFC 3647 framework and an additional addendum with the certificate profiles.
This policy is applicable to all Certification Authorities within a chain of trust under the U.S. Federal TLS Root CA.
The terms and provisions of this certificate policy shall be interpreted under and governed by applicable Federal law.
This document was originally based on the CAB Forum Baseline Requirements, which is licensed under the Creative Commons Attribution 4.0 International License. All adaptations and modifications made to create this CP are in the United States public domain as works of the U.S. Government, and released internationally under the Creative Commons (CCO) 1.0 Universal Public Domain dedication.
The scope of the U.S. Federal Public Trust TLS PKI includes the Certification Authorities used for issuing and managing Transport Layer Security (TLS) certificates for U.S. Federal Government services. The scope is limited to:
- Services that resolve at a registered Internet subdomain under the .gov and .mil Top Level Domains
- Services that are accessible on the Internet
U.S. Federal Government departments and agencies own and operate services that are not accessible on the Internet and are only accessible from the U.S. Government's intranets and internal networks. These intranet only services should consider using TLS certificates from CAs used for the Federal Enterprise in lieu of the Publicly-Trusted certificates covered under this policy. The Federal Enterprise CAs could include only locally trusted CAs operated by the department or agency or a CA operated under one of the other Federal PKI certificate policies.
The intranet only services may apply for TLS certificates issued under this policy if: i) the identification and authentication requirements (Section 3) can be met in entirety, and ii) the information to be contained in the certificate can be publicly disclosed without any redaction.
This Certificate Policy conforms to the current version of the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates published at https://www.cabforum.org. In the event of any inconsistency between this document and those Baseline Requirements, those Baseline Requirements take precedence over this document.
This Certificate Policy defines five (5) different types of certificates. Certificates issued under this policy are categorized as CA Certificates, Subscriber or Infrastructure Certificates.
A certificate is a CA certificate if the basicConstraints extension is present and has cA:TRUE. CA certificates allowed to be issued under this policy are categorized as Root CA certificates and Subordinate CA certificates.
A CA certificate is a Root CA certificate if the certificate’s issuer and subject are the same and the digital signature may be verified by the public key bound into the certificate.
A CA certificate is a Subordinate CA certificate if the certificate’s issuer and the subject are not the same. Subordinate CA certificates, issued under this policy, have a Path Length Constraint set to zero (0) and Name Constraints specifying permitted dNSName sub-trees only for the .gov and .mil Top Level Domains.
A certificate is a Subscriber certificate if it is not a CA Certificate. Subscriber certificates are end entity certificates as defined in RFC 5280 and issued to subjects that are not authorized to issue certificates. Subscriber certificates allowed to be issued under this policy are categorized as Domain Validation TLS Server Authentication certificates, or Organization Validation TLS Server Authentication certificates. CAs shall not issue Subscriber Certificates that simultaneously meet the criteria of more than one of these categories.
A Domain Validation TLS Server Authentication, issued under this policy: i) does not contain any information in the subject distinguished name other than commonName (OID 2.5.4.3) and countryName (OID 2.5.4.6), and ii) asserts a key purpose of id-kp-serverAuth (OID 1.3.6.1.5.5.7.3.1) in the Extended Key Usage certificate extension.
An Organization Validation TLS Server Authentication certificate, issued under this policy: i) contains commonName (OID 2.5.4.3), stateOrProvinceName (OID 2.5.4.8), organizationName (OID 2.5.4.10) and countryName (OID 2.5.4.6) in the subject distinguished name, and ii) asserts a key purpose of id-kp-serverAuth (OID 1.3.6.1.5.5.7.3.1) in the Extended Key Usage certificate extension.
A certificate is an Infrastructure certificate if it is not a CA Certificate and issued in support of the CA System. Infrastructure certificates are end entity certificates as defined in RFC 5280 and issued to subjects that are not authorized to issue certificates. Infrastructure certificates allowed to be issued under this policy are categorized as Delegated OCSP Responder certificates.
A certificate is a Delegated OCSP Responder Certificate if it has a key purpose of id-kp-OCSPSigning (OID 1.3.6.1.5.5.7.3.9) in the Extended Key Usage certificate extension.
This is the U.S. Federal Public Trust TLS PKI Certificate Policy.
The following Certificate Policy identifiers are registered by the U.S. Government and reserved for use by CAs as a means of asserting compliance with this CP:
OID | Purpose |
---|---|
{joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) pki(2) certificate-policies(1) arcfbca-policies(3) domain-validated(43) } (2.16.840.1.101.3.2.1.3.43) | Domain Validation TLS Server Authentication Certificates |
{joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) pki(2) certificate-policies(1) arcfbca-policies(3) organization-validated(44) } (2.16.840.1.101.3.2.1.3.44) | Organization Validation TLS Server Authentication Certificates |
The following Certificate Policy identifiers are registered by the CAB Forum and reserved for use by CAs as a means of asserting compliance with the Baseline Requirements:
OID | Purpose |
---|---|
{joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140) certificate-policies(1) baseline-requirements(2) domain-validated(1) } (2.23.140.1.2.1) | Domain Validation TLS Server Authentication Certificates |
{joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140) certificate-policies(1) baseline-requirements(2) organization-validated(2) } (2.23.140.1.2.2) | Organization Validation TLS Server Authentication Certificates |
The U.S. Government's Federal CIO Council was codified by the E-Government Act of 2002. The Federal CIO Council is the principal interagency forum for improving Federal agency practices related to the design, acquisition, development, modernization, use, sharing, and performance of Federal information resources.
The Federal CIO Council is comprised of: 1) the Chief Information Officers (CIOs) and Deputy CIOs from 28 U.S. Government Federal executive agencies; 2) liaisons from the Chief Acquisitions Officers, Chief Financial Officers, and Chief Human Capital Officers; 3) representatives from the Office of Information and Regulatory Affairs; 4) representatives from the Office of Science and Technology Policy; and 5) other groups selected by the CIO Council's Executive Committee.
The Federal CIO Council has established the framework for the Federal PKI (FPKI) and governance of the U.S. Federal Public Trust TLS PKI.
The Federal Public Key Infrastructure Policy Authority (FPKIPA) is a sub-council comprised of U.S. Federal Government agency representatives and is chartered under the Federal CIO Council.
The FPKIPA is responsible for:
- Maintaining this CP
- Approving the CPS for each CA that issues certificates under this policy
- Reviewing and approving the compliance audits for each CA issuing certificates under this policy
- Ensuring continued conformance of each CA that issues certificates under this policy with applicable requirements as a condition for allowing continued participation
- Ensuring compliance with the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates as published by CAB Forum
- Ensuring compliance with any additional trust store operator requirements that the U.S. Federal TLS Root CA pursues or has inclusion in
- Ensuring compliance with any additional browser requirements that are defined by browser software vendors
The U.S. Federal Public Trust TLS PKI CAs are operated on behalf of the U.S. Government. The CAs are responsible for the creation, issuance and management of Certificates including:
- Publication of certificates
- Revocation of certificates
- Operation of certificate status services
- Operating automated services or procedures to perform validation of domain authorization or control as specified in Section 3.2.2.4
- Ensuring that all aspects of the CA services, operations, and infrastructure related to certificates issued under this CP are performed in accordance with the requirements, representations, and warranties of this CP
The CAs operated under this policy provide services to U.S. Government entities which may be part of the Executive Branch, Legislative Branch and Judicial Branch of the Federal Government. The services shall not be provided to the general public, commercial entities, U.S. State, Local, Territorial, Native Sovereign Nations, or international government entities.
This policy prohibits persons who may not be affiliated with the same U.S. Federal Government organizational unit that is operating the CA to assist in the certificate application or domain validation process.
Enterprise Registration Authorities are not allowed as Registration Authorities.
Delegated Third Parties are not allowed as Registration Authorities.
A Subscriber is the entity identified in a Certificate, capable of using the Private Key that corresponds to the Public Key listed in the certificate, and has agreed to the Terms of Use with the CA. Prior to verification of identity and issuance of a Certificate, a Subscriber is an Applicant.
For this policy, Subscribers are limited to:
- Web services operated by or on behalf of U.S. Government agencies
- Domain Names within the .gov and .mil Domain Namespace(s)
A Relying Party is any individual or entity that relies on a U.S. Federal Public Trust TLS PKI Certificate, the information included in the certificate, and the digital signature by a CA.
For this policy, Relying Parties may include individuals or entities accessing U.S. Government web services available on the Internet.
Relying Parties should verify the validity of certificates via revocation services provided for all certificates prior to relying on certificates. Certificate Revocation List (CRL) and / or On-line Certificate Status Protocol (OCSP) service location information is provided within certificates.
CAs operating under this policy require the services of Qualified Auditors to perform independent, annual assessments on the conformance of the CA's practices and procedures. Qualified Auditor requirements are covered in Section 8.
This policy is limited to Publicly-Trusted TLS Certificates used for identifying and authenticating U.S. Federal Government web services. Certificates may be used for all legal authentication and encryption purposes.
Certificates may not be used where prohibited by law.
Certificates for identifying natural persons are not allowed under this policy including but not limited to identity certificates used to identify natural persons for digital signatures, S/MIME, client authentication, and encryption. CAs may not issue Subscriber certificates for natural persons or enter into any cross-certification with any CAs that issue certificates used to identify and authenticate natural persons.
The FPKIPA is responsible for administering this document.
Contact information for the FPKIPA is fpki@gsa.gov. Incident notification procedures are posted at https://repository.pki.gov
The FPKIPA shall affirm the suitability of any CPS to this policy.
A CPS shall be submitted and approved by the FPKIPA.
Prior to submitting a CPS, the CA shall perform an analysis of the areas in which the CPS may not or does not comply with this CP. The CA shall resolve these discrepancies prior to submitting the CPS to the FPKIPA. The CA shall have an approved CPS, meet all CP and CPS requirements, conduct Federal Information Security Modernization Act assessment and authorization activities, and produce an authorization to operate prior to commencing operations.
CAs shall review their CPS and perform an annual self-assessment for compliance with this CP at least every 365 days. After review and approval, the CPS document version number and a dated changelog entry shall be added, even if no other changes were made to the document.
Capitalized terms used in this CP shall have the meanings defined in Appendix A.
See Appendix B for a complete list of acronyms and abbreviations used in this CP.
See Appendix C for a complete list of standards and other references included in this CP.
The key words "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this CP shall be interpreted in accordance with RFC 2119.
The FPKIPA shall publicly post this CP on https://repository.pki.gov, ensuring it is readily accessible on a 24x7 basis.
All CAs shall disclose the following practices and audit information on https://repository.pki.gov:
- CPS documents
- Annual Audit Letters
CPS documents and Audit Letters shall not be redacted.
Each CA shall disclose the following certificate information through a publicly accessible Repository:
- CA Certificates
- Revocation status (certificate status services) for all issued certificates
Each CA shall ensure that its Certificate from the Root CA and the certificate status services for issued certificates are available through a repository 24 hours a day, 7 days a week with a minimum of 99.5% availability overall per year.
Web pages that allow for testing certificate validation up to the U.S. Federal Public Trust TLS Root CA shall be published and maintained at:
The FPKIPA and CAs shall update and publish the CP and CPS documents within thirty (30) days after being approved.
Each CA shall post to the Repository any issued CA Certificate as soon as possible after issuance but no later than fifteen (15) days after issuance. The FPKIPA or designee shall disclose and submit the CA Certificate, CPS, and Audit Letter(s) to trust store operators and applicable databases, such as the Common CA Database, as required by the trust store operator policies.
For publication of CRLs and frequency, see Section 4.9.7. For publication of OCSP responses and frequency, see Section 4.9.10.
Each CA shall make its Repository publicly available in a read-only manner. Repository information shall be protected from unauthorized modification.
This policy restricts the subject names of CAs. CAs that issue certificates under this policy shall have distinguished names using geo-political names consisting of country, organization, and common name. Organization units may only be used with approval by the FPKIPA.
Subscriber certificates issued under this policy shall use distinguished names and subject alternative names that comply with Section 7 and the certificate profiles in Appendix D.
Subscriber certificates issued under this policy shall have a common name that is one of the domain names validated in accordance with Section 3.2.2.4.
A CA shall not issue anonymous certificates. CA certificates shall not contain anonymous or pseudonymous identities.
Distinguished names in certificates are interpreted using the X.500 Standard, and URL (RFC 3986) syntax.
The common name attribute for CA Certificates shall be unique from all other CA Certificates.
There is no stipulation for the uniqueness of the Subject information in Subscriber certificates.
CAs shall not issue a certificate that knowingly infringes any trademark. The FPKIPA shall resolve disputes involving names and trademarks.
The CA shall verify the Applicant has possession of the Private Key that corresponds to the Public Key in the certificate request.
As one method to verify possession of the Private Key, the CA may verify the digital signature on a certificate signing request that was created using the Private Key. The FPKIPA may allow other methods that are at least as secure as those cited here.
All Domain Validation TLS Server Authentication certificates issued under this CP shall include Subject Identity Information of commonName and countryName and shall not include any other Subject Identity Information. CAs shall verify the countryName associated with the Subject using a verification process meeting the requirements of Section 3.2.2.3.
All Organization Validation TLS Server Authentication certificates issued under this CP shall include Subject Identity Information of commonName, countryName, organizationName and stateOrProvinceName and shall not include any other Subject Identity Information. If the Applicant requests an Organization Validation TLS Server Authentication certificate, then the CA shall verify the organizationName and stateOrProvinceName using a verification process meeting the requirements in Section 3.2.2.1 and the CA shall verify the countryName using a verification process meeting the requirements of Section 3.2.2.3.
This CP is restricted to the generic Top Level Domains (gTLDs) for .gov and .mil which are registered as the sub-category of sponsored TLDs (sTLDs) with ICANN.
The .gov sTLD is sponsored by the U.S. Government's General Services Administration. The .gov regulations are defined in 41 CFR Part 102-173. Under 41 CFR Part 102-173.30, registration in the .gov domain is only available to official governmental organizations in the United States including Federal (U.S. Government), State and local governments, and Native Sovereign Nations.
The .mil sTLD is sponsored by the U.S. Government's Department of Defense. The .mil domain exists for the exclusive use of the Department of Defense and is referenced in Department of Defense Instruction (DoDI) 8410.01.
The Domain Name Registrars for both .gov and .mil are managed by the U.S. Government.
All three branches of the U.S. Government have primary headquarters located in the city of Washington in the District of Columbia in the United States of America. Any Organization Validation TLS Server Authentication certificate issued under this CP shall be for U.S. Government mission purposes and for consumers, partners, and other relying parties to identify the U.S. Government as the subject. For Organization Validation TLS Server Authentication certificates, the CA shall verify that the Applicant is under authority of one of the three branches of the U.S. Government and this verification is sufficient to assert the organizationName of the U.S. Government (o=U.S. Government) and assert the stateOrProvinceName as District of Columbia.
Verification may rely upon the .gov and .mil Domain Name Registrars.
Subject Identity Information shall not include a DBA or trade name.
All CAs shall verify the inclusion of subject:countryName in Subscriber certificates by one of the following:
- The requested Domain Name is within the .mil or .gov sTLD domain space
- Information provided by the Domain Name Registrar
CAs shall confirm that, as of the date the Certificate was issued, the CA has validated each Fully-Qualified Domain Name (FQDN) listed in the Certificate using at least one of the methods listed in Section 3.2.2.4.x.
This CP allows for procedures adhering to the Baseline Requirements and is limited to three (3) validation methods:
- Section 3.2.2.4.6 Agreed-Upon Change to Website
- Section 3.2.2.4.7 DNS Change
- Section 3.2.2.4.12 Validating Applicant as a Domain Contact
Wildcard FQDNs are not allowed to be validated using Section 3.2.2.4.6 Agreed Upon Change to Website. All wildcard domain names included in a certificate shall require validation by either Section 3.2.2.4.7 DNS Change, or Section 3.2.2.4.12 Validating Applicant as a Domain Contact signed by the Domain Contact authorizing the issuing of a certificate to include the wildcard FQDN.
CAs shall maintain a record of which domain validation method, including the relevant Baseline Requirements version number, was used to validate each domain in a certificate.
Completed confirmations of Applicant authority may be valid for the issuance of multiple certificates over time. In all cases, the confirmation shall have been completed within the time period specified in Section 4.2.1 of this policy prior to certificate issuance.
For purposes of domain validation, the term Applicant includes the Applicant's U.S. Government Department, Agency, Commission, component, or other organizational unit defined in United States Code.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method confirms the Applicant's control over the requested FQDN by confirming one of the following under the "/.well-known/pki-validation" directory, or another path registered with IANA for the purpose of Domain Validation, on the Authorization Domain Name that is accessible by the CA via HTTP/HTTPS over an Authorized Port:
- The presence of Required Website Content contained in the content of a file or on a web page in the form of a meta tag. The entire Required Website Content shall not appear in the request used to retrieve the file or web page, or
- The presence of the Request Token or Random Value contained in the content of a file or on a webpage in the form of a meta tag where the Request Token or Random Value shall not appear in the request.
If a Random Value is used, the CA shall provide a Random Value unique to the certificate request and shall not use the Random Value after 30 days.
A Request Token shall incorporate the key used in the certificate request. A Request Token may include a timestamp to indicate when it was created and other information to ensure its uniqueness. A Request Token that includes a timestamp shall remain valid for no more than 30 days from the time of creation. A Request Token that includes a timestamp shall be treated as invalid if its timestamp is in the future. A Request Token that does not include a timestamp is valid for a single use and the CA shall not re-use it for a subsequent validation.
The binding shall use a digital signature algorithm or a cryptographic hash algorithm at least as strong as that to be used in signing the certificate request.
Examples of Request Tokens include, but are not limited to: (i) a hash of the public key; (ii) a hash of the Subject Public Key Info [X.509]; and (iii) a hash of a PKCS#10 CSR. A Request Token may also be concatenated with a timestamp or other data.
The CA shall define in its CPS the format of Request Tokens it accepts and shall document the "/.well-known/pki-validation/" directory and any other paths registered with IANA.
This validation method confirms the Applicant's control over the FQDN by confirming the presence of a Random Value or Request Token in a DNS CNAME, TXT or CAA record for either:
- An Authorization Domain Name
- An Authorization Domain Name that is prefixed with a label that begins with an underscore character.
If a Random Value is used, the CA shall provide a Random Value unique to the Certificate request and shall not use the Random Value after 30 days.
A Request Token shall incorporate the key used in the certificate request. A Request Token may include a timestamp to indicate when it was created and other information to ensure its uniqueness. A Request Token that includes a timestamp shall remain valid for no more than 30 days from the time of creation. A Request Token that includes a timestamp shall be treated as invalid if its timestamp is in the future. A Request Token that does not include a timestamp is valid for a single use and the CA shall not re-use it for a subsequent validation.
Once the FQDN has been validated using this method, the CA may also issue Certificates for other FQDNs that end with all the labels of the validated FQDN. For example, a validation for the example "myapp.mydomain.gov" may be used during the timeframe permitted for reuse of validation information to issue a certificate that includes "home.myapp.mydomain.gov".
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method confirms the Applicant's control over the FQDN by validating the Applicant is the Domain Contact. This method may only be used if the CA is also the Domain Name Registrar, or an Affiliate of the Registrar, of the Base Domain Name.
Note: Once the FQDN has been validated using this method, the CA MAY also issue Certificates for other FQDNs that end with all the labels of the validated FQDN. This method is suitable for validating Wildcard Domain Names.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
This validation method defined by the Baseline Requirements is not allowed under this CP.
IP Addresses are not allowed in the certificate profiles under this CP.
Before issuing a certificate with a wildcard character (*) in a CN or subjectAltName, the CA shall establish and follow a documented procedure and technical controls that determines if the wildcard character occurs in the first label position to the left of the .gov and .mil suffixes (e.g. *.gov, *.mil). If a wildcard would fall within the label immediately to the left of the .gov and .mil suffixes (e.g. *.gov, *.mil), the CA shall refuse issuance. All CAs are prohibited from issuing any Wildcard Certificate to the entire sTLDs for .gov and .mil.
Wildcard FQDNs are not allowed to be validated using Section 3.2.2.4.6 Agreed Upon Change to Website or Section 3.2.2.4.10 TLS Using a Random Number. All wildcard FQDNs included in a certificate shall require validation by Section 3.2.2.4.7 DNS Change, or Section 3.2.2.4.5 Domain Authorization Document signed by the Domain Contact authorizing the issuing of a certificate to include the wildcard FQDN.
Prior to using any data source as a Reliable Data Source, the CA shall evaluate the source for its reliability, accuracy, and resistance to alteration or falsification. The CA should consider the following during its evaluation:
- The age of the information provided,
- The frequency of updates to the information source,
- The data provider and purpose of the data collection,
- The public accessibility of the data availability, and
- The relative difficulty in falsifying or altering the data.
Databases maintained by the CA or affiliated government agencies do not qualify as a Reliable Data Source if the primary purpose of the database is to collect information for the purpose of fulfilling the validation requirements under Section 3.2 and sub-sections.
For Domain Validation TLS Server Authentication certificates and Organization Validation TLS Server Authentication certificates, CAs shall check and verify CAA records. CAs shall follow the processing instructions found, for each dNSName in the subjectAltName extension of the certificate to be issued, as specified in RFC 6844 as amended by Errata 5065. If the CA issues, the CA shall issue within the Time to Live (TTL) of the CAA record, or 8 hours, whichever is greater.
When processing CAA records, CAs shall process the issue, issuewild, and iodef property tags as specified in RFC 6844, although they are not required to act on the contents of the iodef property tag. Additional property tags may be supported, but shall not conflict with or supersede the mandatory property tags set out in this policy. CAs shall respect the critical flag and not issue a certificate if they encounter an unrecognized property with this flag set. CAs may treat a non-empty CAA Resource Record Set that does not contain any issue property tags (and also does not contain any issuewild property tags when performing CAA processing for a Wildcard Domain Name) as permission to issue, provided that no records in the CAA Resource Record Set otherwise prohibit issuance.
CAs are permitted to treat a record lookup failure as permission to issue only if all the following are true:
- The failure is outside the CA’s infrastructure
- The lookup has been retried at least once
- The domain’s zone does not have a DNSSEC validation chain to the ICANN root
CAs shall document potential issuances that were prevented by a CAA record in sufficient detail to provide feedback on the circumstances, and should dispatch reports of such issuance requests to the contact(s) stipulated in the CAA iodef record(s), if present. CAs are not expected to support URL schemes in the iodef record other than mailto: or https:.
Subscriber certificates identifying and authenticating natural born persons or individual identity shall not be issued under this policy.
Non-verified subscriber information shall not be asserted in any certificates under this Certificate Policy.
A CA may use the sources listed in Section 3.2.2.1 to verify the Applicant is under authority of the U.S. Government and assert organizationName of U.S. Government.
In addition, a CA may establish a process that allows an Authorizing Authority of a .gov or .mil subdomain to specify the individuals who may request Certificates. If an Authorizing Authority specifies, in writing, the individuals who may request a Certificate, then the CA shall not accept any certificate requests that are outside this specification. The CA shall provide an Authorizing Authority with a list of its authorized certificate requesters upon the Authorizing Authority's verified written request.
CAs shall not have Cross Certificate(s) that identify the CA as the Subject without explicit written permission of the FPKIPA. Any Cross Certificates shall be disclosed publicly, submitted to one or more Certificate Transparency Logs, published to the Repository, and identified in the update to the CPS.
Re-key requests are not allowed under this policy. All requests are treated as new certificate requests.
Revocation requests shall be authenticated. Requests to revoke a certificate may be authenticated using that certificate's associated private key, regardless of whether or not the private key has been compromised.
An application for a CA Certificate shall be submitted by an authorized representative of the applicant CA.
An application for a Subscriber Certificate shall be submitted to the CA by the Applicant, an Applicant Representative, or an RA on behalf of the Applicant.
In accordance with Section 5.5.2, all CAs shall maintain an internal database of all previously revoked Certificates and previously rejected certificate requests due to suspected phishing or other fraudulent usage or concerns. All CA shall use this information to identify subsequent suspicious certificate requests.
The FPKIPA is responsible for approving or denying requests for CA certificate issuances by any CA.
Prior to the issuance of any Certificate, all CAs shall obtain the following documentation from the Applicant:
- A certificate request, which may be electronic; and
- An executed Subscriber Agreement or Terms of Use, which may be electronic.
The certificate request shall contain a request from, or on behalf of, the Applicant for the issuance of a Certificate, and a certification by, or on behalf of, the Applicant that all of the information contained therein is correct.
The CA shall be responsible for validating the information in the certificate request and the identity evidence to ensure the information is:
- Properly formed
- Accurate
- Meets the requirements for the type of certificate requested such as a Domain Validation TLS Server Authentication certificate, an Organization Validation TLS Server Authentication certificate, an OCSP Delegated Responder certificate, or a CA Certificate
All communications supporting the certificate application and issuance process shall be authenticated and protected from modification; any electronic transmission of shared secrets shall be protected. Communications may be electronic or out-of-band. Where electronic communications are used, cryptographic mechanisms commensurate with the strength of the requested public/private key pair shall be used. Out-of-band communications shall protect the confidentiality and integrity of the data.
All CAs shall specify the procedures for validating information and identity evidence in the CA CPS.
All CAs shall establish and follow a documented procedure for verifying all data requested for inclusion in the Certificate by the Applicant.
For Domain Validation TLS Server Authentication certificates and Organization Validation TLS Server Authentication certificates:
- The Applicant information shall include at least one Fully-Qualified Domain Name.
- All Fully-Qualified Domain Names shall be verified in accordance with Section 3.2 before issuance of the certificate.
- CAA records for .gov and .mil domains shall be checked prior to issuance of any certificate and the CA shall act in accordance to the requirements in Section 3.2.2.8.
The CA shall identify in Section 4.2 of the CPS the Issuer Domain Name to be used for CAA records. For example, the CA CAA domain is 'pki.gov'.
With the exception of Section 3.2.2.8 CAA Record checking, the CA may reuse the documents and data provided in Section 3.2 to verify certificate information, provided that the CA obtained the data or document from a source specified under Section 3.2 no more than 395 days prior to issuing the Certificate.
All Subordinate CAs shall develop, maintain, and implement documented procedures that identify and require additional verification activity for High Risk Certificate Requests for .gov and .mil assets prior to the Certificate's approval.
Delegated Third Parties are not allowed under this policy and shall not participate in the performance of identification functions.
This CP is restricted to .gov and .mil assets. CAs shall reject all certificate applications containing any FQDNs that are not under the sTLDs for .gov and .mil.
Approval of certificate applications requires successful completion of validation per Section 3.2.
In accordance with Section 5.5.2, all CAs shall maintain an internal database of all previously revoked Certificates and previously rejected certificate requests due to suspected phishing or other fraudulent usage or concerns. All CAs shall use this information to identify subsequent suspicious certificate requests and may use it as the basis for rejecting a certificate request.
No stipulation.
Issuance of a CA Certificate shall require an individual authorized by the CA to deliberately issue a direct command in order for the CA to perform a certificate signing operation. Issuance of a CA certificate shall require written authorization by the FPKIPA.
The CA shall issue the certificate according to the certificate requesting protocol used by the Applicant (this may be automated) and, if the protocol does not provide inherent notification, also notify the Applicant of the issuance.
Failure of the Subscriber to object to a requested certificate or its contents shall constitute acceptance of the certificate.
As specified in Section 2.1, all CA certificates shall be published in repositories.
CAs shall notify the FPKIPA of CA Certificate issuances.
See Section 9.6.3.
The intended scope of usage for a private key shall be in accordance with the Certificate Profiles defined in Appendix D and Section 7 of this CP.
See Section 4.9.6
Renewal is defined as the re-issuance of a certificate with no changes to the public key, no changes to the identity information, and a new validity period for the certificate.
CA certificates shall not be renewed. Domain Validation TLS Server Authentication and Organizational Validation TLS Server Authentication certificates shall not be renewed. Certificate renewal requests shall be treated as new applications and information verified in accordance with Section 4.2.1
OCSP Delegated Responder certificates may be renewed.
No stipulation.
The CA shall verify that the OCSP Delegated Responder certificate expiration date shall not exceed 395 days from the date of initial certificate issuance.
No stipulation.
No stipulation.
No stipulation.
No stipulation.
Re-key is defined as the issuance of a certificate with a new public key, no changes to the identity information, and a new validity period for the certificate.
Certificates under this policy shall not be re-keyed. Certificate re-key requests shall be treated as new applications and information verified in accordance with Section 4.2.1.
Not applicable.
Not applicable.
Not applicable.
Not applicable.
Not applicable.
Not applicable.
Modification is defined as the re-issuance of a certificate with the same public key, same validity period, and changes made to the identity information or information in the certificate such as policies and key usage.
Domain Validation TLS Server Authentication and Organization Validation TLS Server Authentication certificates shall not be modified. OCSP Delegated Responder certificates shall not be modified.
CA certificates may be modified to update attributes other than the public key. A CA certificate shall not be modified to add restrictions not in the original certificate unless all Subscriber certificates previously issued by the CA conform to the new restrictions.
An authorized representative of either the Root CA or Subordinate CA may request certificate modifications.
Certificate issuance by the Root CA shall require an individual authorized by the CA to deliberately issue a direct command in order for the Root CA to perform a certificate signing operation. Modification of a CA certificate by the Root CA shall require written authorization by the FPKIPA.
See Section 4.3.2.
See Section 4.4.1.
See Section 4.4.2.
See Section 4.4.3.
The CA shall revoke a Certificate within 24 hours if one or more of the following occurs:
- The Subscriber requests in writing that the CA revoke the Certificate;
- The Subscriber notifies the CA that the original certificate request was not authorized and does not retroactively grant authorization;
- The CA obtains evidence that the Subscriber's Private Key corresponding to the Public Key in the Certificate suffered a Key Compromise; or
- The CA obtains evidence that the Certificate was misused or the validation of the domain authorization or control for any Fully-Qualified Domain name or IP address in the Certificate should not be relied upon.
The CA should revoke a certificate within 24 hours and shall revoke a Certificate within 5 days if one or more of the following occurs:
- The Certificate no longer complies with the requirements of Sections 6.1.5 and 6.1.6;
- The CA is made aware that a Subscriber has violated one or more of its material obligations under the Subscriber Agreement or Terms of Use;
- The CA is made aware of any circumstance indicating that use of a Fully-Qualified Domain Name in the Certificate is no longer legally permitted;
- The CA is made aware that a Wildcard Certificate has been used to authenticate a fraudulently misleading subordinate Fully-Qualified Domain Name;
- The CA is made aware of a material change in the information contained in the Certificate;
- The CA is made aware that the Certificate was not issued in accordance with this CP or the CA's Certification Practice Statement;
- The CA determines that any of the information appearing in the Certificate is inaccurate;
- The CA ceases operations for any reason and has not made arrangements for another CA to provide revocation support for the Certificate;
- The CA's right to issue Certificates under this CP expires or is revoked or terminated, unless the CA has made arrangements to continue maintaining the CRL/OCSP Repository;
- The CA is made aware of a possible compromise of the Private Key of the Subordinate CA used for issuing the Certificate;
- The CA is made aware of a demonstrated or proven method that exposes the Subscriber’s Private Key to compromise, methods have been developed that can easily calculate it based on the Public Key (such as a Debian weak key, see http://wiki.debian.org/SSLkeys), or if there is clear evidence that the specific method used to generate the Private Key was flawed;
- Revocation is required by this CP and/or the CA's CPS;
- The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties; or
- The CA received a lawful and binding order from a government, judicial or regulatory body to revoke the Certificate.
The Issuing CA shall revoke a Subordinate CA Certificate within seven (7) days if one or more of the following occurs:
- The Subordinate CA requests revocation in writing;
- The Subordinate CA notifies the Issuing CA that the original certificate request was not authorized and does not retroactively grant authorization;
- The Issuing CA obtains evidence that the Subordinate CA's Private Key corresponding to the Public Key in the Certificate suffered a Key Compromise or no longer complies with the requirements of Sections 6.1.5 and 6.1.6;
- The Issuing CA obtains evidence that the Certificate was misused;
- The Issuing CA is made aware that the Certificate was not issued in accordance with or that Subordinate CA has not complied with this CP or the CA's CPS;
- The Issuing CA determines that any of the information appearing in the Certificate is inaccurate or misleading;
- The Issuing CA or Subordinate CA ceases operations for any reason and has not made arrangements for another CA to provide revocation support for the Certificate;
- The Issuing CA's or Subordinate CA's right to issue Certificates under this CP expires or is revoked or terminated, unless the Issuing CA has made arrangements to continue maintaining the CRL/OCSP Repository;
- Revocation is required by this CP and/or the Issuing CA's CPS;
- The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties; or
- The CA received a lawful and binding order from a government, judicial or regulatory body to revoke the Certificate.
The Subscriber, RA, or CA can initiate revocation of Subscriber or CA certificates. The FPKIPA may also direct any revocation of a CA certificate.
Subscribers, Relying Parties, Application Software Suppliers, and other third parties may submit Certificate Problem Reports informing the CA of reasonable cause to revoke the certificate.
CAs shall provide a process for Subscribers to request revocation of their own Certificates. The process shall be described in the CA's CPS. The CA shall maintain a continuous 24x7 ability to accept and respond to revocation requests and related inquiries. A request from Subscribers to revoke a certificate shall identify the certificate to be revoked, explain the reason for revocation, and allow the request to be authenticated.
The CA shall provide Subscribers, Relying Parties, Application Software Suppliers, and other third parties with clear instructions for submitting Certificate Problem Reports. The CA shall publicly disclose the instructions through a readily accessible online means and in section 1.5.2 of the CPS.
There is no revocation grace period.
The CA shall begin investigation of a Certificate Problem Report immediately upon receipt, and decide whether revocation or other appropriate action is warranted based on at least the following criteria:
- The nature of the alleged problem;
- The consequences of revocation (direct and collateral impacts to Subscribers and Relying Parties);
- The number of Certificate Problem Reports received about a particular Certificate or Subscriber;
- The entity making the complaint (for example, a complaint from a law enforcement or Inspector General official that a Web site violates U.S. Federal regulation should carry more weight than a complaint from a user alleging that they were unable to complete their transaction); and
- Relevant legislation.
The CA shall work with the Subscriber and entity who submitted the Certificate Problem Report to decide if and when a certificate shall be revoked. Within 24 hours after receiving the report, the CA shall provide a preliminary report on its findings to the Subscriber and entity who submitted the Certificate Problem Report (if different than the subscriber). If a revocation related to the Certificate Problem Report is warranted, the period from the receipt of the Certificate Problem Report to the published revocation shall not exceed the timeline defined in Section 4.9.1.1.
All revocation requests shall be published within the timelines defined in Section 4.9.1.1 or Section 4.9.1.2.
All CAs operating under this policy provide revocation information in accordance with Section 4.9.7 and Section 4.9.9.
It is recommended that relying parties process the expiration date of the certificate and perform certificate revocation checking, and comply with this information, whenever using a U.S. Federal Public Trust TLS PKI certificate in a transaction.
For the status of Domain Validation TLS Server Authentication and Organization Validation TLS Server Authentication certificates, CAs shall publish revocations using OCSP services and/or CRLs. For CRLs, the CA shall update and reissue CRLs at least once every 24 hours and the value of the nextUpdate field shall not be more than seven days beyond the value of the thisUpdate field.
For the status of Subordinate CA Certificates, the Root CA shall update and reissue CRLs at least (i) once every 31 days and (ii) within 24 hours after revoking a Subordinate CA Certificate, and the value of the nextUpdate field shall not be more than 32 days beyond the value of the thisUpdate field.
CRLs shall be published within 4 hours of generation. Furthermore, each CRL shall be published no later than the time specified in the nextUpdate field of the previously issued CRL for same scope.
OCSP responses shall conform to RFC 6960 and/or RFC 5019. OCSP responses shall either:
- Be signed by the CA that issued the Certificates whose revocation status is being checked, or
- Be signed by a Delegated OCSP Responder Certificate signed by the CA that issued the Certificate whose revocation status is being checked.
The CA shall support an OCSP capability using the GET method for Certificates.
For the status of Domain Validation TLS Server Authentication and Organization Validation TLS Server Authentication certificates, the CA shall update information provided via OCSP every 24 hours. OCSP responses shall have a maximum expiration time of seven (7) days and the value of the nextUpdate field shall not be more than seven (7) days beyond the value of the thisUpdate field.
For the status of Subordinate CA Certificates, the Root CA shall update information provided via OCSP at least (i) every 31 days and (ii) within 24 hours after revoking a Subordinate CA Certificate.
If the OCSP responder receives a request for status of a certificate that has not been issued, then the responder shall not respond with a "good" status. The CA shall monitor the responder for such requests as part of its security response procedures.
Subscribers may rely on stapling, in accordance with RFC 6066, to distribute OCSP responses. The CA shall be responsible for supporting OCSP status responses.
See Section 4.9.1
In the case of a compromise of a CA certificate, the CA must immediately notify the FPKI PA that the CA certificate has been compromised. See Section 5.7.1 for incident handling procedures.
Certificates issued under this policy shall not be suspended.
Not applicable.
Not applicable.
Not applicable.
Revocation entries on a CRL or OCSP Response shall not be removed until after the Expiry Date of the revoked Certificate.
The CA shall operate and maintain its OCSP and/or CRL capability with resources sufficient to provide a response time of ten seconds or less under normal operating conditions.
The CA shall maintain an online Repository 24 hours a day, 7 days a week with a minimum of 99.5% availability overall per year that application software can use to automatically check the current status of all unexpired Certificates issued by the CA.
The CA shall maintain a 24 hours a day, 7 days a week ability to respond internally to a high-priority Certificate Problem Report, and where appropriate, forward such a complaint to law enforcement authorities, and/or revoke a Certificate that is the subject of such a complaint.
No stipulation.
No stipulation.
Private keys for certificates issued under this policy shall not be escrowed.
Not applicable.
CA equipment shall be protected from unauthorized access while the cryptographic module is installed and activated. The CA shall implement physical access controls to reduce the risk of equipment tampering even when the cryptographic module is not installed and activated. CA cryptographic tokens shall be protected against theft, loss, and unauthorized use.
All the physical control requirements specified below apply equally to the Root CA and Subordinate CAs, and any remote workstations used to perform administration activities for the CAs, except where specifically noted.
The location and construction of the facility housing the CA equipment, as well as sites housing remote workstations used to administer the CAs, shall be consistent with facilities used to house high-value, sensitive information. The site location and construction, when combined with other physical security protection mechanisms such as guards, high security locks, and intrusion sensors, shall provide robust protection against unauthorized access to the CA equipment and records.
At a minimum, the physical access controls for CA equipment, as well as remote workstations used to administer the CAs, shall:
- Ensure that no unauthorized access to the hardware is permitted.
- Ensure that all removable media and paper containing sensitive plain-text information is stored in secure containers.
- Be manually or electronically monitored for unauthorized intrusion at all times.
- Ensure an access log is maintained and inspected periodically.
- Require two-person physical access control to both the cryptographic module and computer systems.
When not in use, removable cryptographic modules, activation information used to access or enable cryptographic modules, and CA equipment shall be placed in secure containers. Activation data shall be either memorized or recorded and stored in a manner commensurate with the security afforded the cryptographic module, and shall not be stored with the cryptographic module or removable hardware associated with remote workstations used to administer the CA.
A security check of the facility housing the CA equipment or remote workstations used to administer the CAs shall occur if the facility is to be left unattended. At a minimum, the check shall verify the following:
- The equipment is in a state appropriate for the current mode of operation
- That cryptographic modules are in place when “open,” and secured when “closed”
- Any security containers are properly secured
- Physical security systems are functioning properly
- The area is secured against unauthorized access
A person or group of persons shall be made explicitly responsible for making such checks. When a group of persons is responsible, a log identifying the person performing a check at each instance shall be maintained. If the facility is not continuously attended, the last person to depart shall initial a sign-out sheet that indicates the date and time and asserts that all necessary physical protection mechanisms are in place and activated.
The CA shall have backup capability sufficient to lock out input, finish any pending actions, and record the state of the equipment automatically before lack of power causes a shutdown.
All Repositories shall be provided with uninterrupted power sufficient for a minimum of 6 hours operation in the absence of commercial power, to maintain availability and avoid denial of service.
CA equipment shall be installed such that it is not in danger of exposure to water. Potential water damage from fire prevention and protection measures are excluded from this requirement.
CA equipment shall use facilities equipped with fire suppression mechanisms.
Media shall be stored so as to protect it from accidental damage, such as water, fire, or electromagnetic damage. Media shall be stored to protect it from unauthorized physical access.
Sensitive media and documentation that are no longer needed for operations shall be destroyed in a secure manner and rendered unrecoverable.
Full system backups sufficient to recover from system failure shall be made on a periodic schedule. Backups are to be performed and stored off-site not less than once per week for Subordinate CAs. At least one full backup copy shall be stored at an off-site location separate from CA equipment. Only the latest full backup is required to be retained. The backup shall be stored at a site with physical and procedural controls commensurate to that of the operational CA.
A trusted role is one whose incumbent performs functions that can introduce security problems if not carried out properly, whether accidentally or maliciously.
The requirements of this policy are defined in terms of three roles:
- Administrator
- Officer
- Security
These three roles are employed at the CA. Separation of duties shall comply with Section 5.2.4, and requirements for two-person control with Section 5.2.2, regardless of the titles and numbers of trusted roles.
The Administrator shall be responsible for:
- Installation, configuration, and maintenance of the CA
- Establishing and maintaining CA system accounts
- Configuring certificate profiles or templates and audit parameters
- Generating and backing up CA keys
- Routine operation of the CA equipment and operations such as system backups and recovery or changing recording media
Administrators shall not issue certificates to Subscribers.
The Officer shall be responsible for:
- Approving and executing the issuance of the certificates where inspection of the validation information is required
- Requesting, approving and executing the revocation of certificates
- Performing internal self-audits at least every quarter in accordance with Section 8.7
The Security trusted role shall be responsible for:
- Reviewing, maintaining, and archiving audit logs
- Overseeing internal compliance and self-audits to ensure that the CA is operating in accordance with its CPS
Each CA shall maintain lists, including names, contact information, and copies of appointment memoranda of those who act in these trusted roles, and shall make them available during audits. The CA shall make this information a part of the permanent records of the CA. However, the CA shall not maintain personnel records or investigative records requiring protection under the Privacy Act.
The CA Private Key shall be backed up, stored, and recovered only by personnel in trusted roles using, at least, dual control in the physically secured environment described in 5.1.2.
Where multi-party control is required, at least one of the participants shall be an Administrator. All participants shall serve in a trusted role as defined in Section 5.2.1. Multi-party control shall not be achieved using personnel that serve in the Security trusted role.
An individual shall be identified and authenticated before being permitted to perform any actions set forth above for that role or identity. All trusted roles shall use a unique credential created by or assigned to a single individual for identification and authentication. CAs shall implement multi-factor or multi-party authentication for all Administrator trusted role access to Certificate System Components including operating system and software. All CAs shall implement multi-factor authentication for the Officer trusted role.
Individuals may only assume one of the Administrator, Officer, and Security roles. The CA software and hardware shall identify and authenticate its users and enforce least privilege. The CA software and hardware shall ensure that no user can assume both the Administrator and Officer roles, assume both the Administrator and Security roles, or assume both the Security and Officer roles.
All persons filling trusted roles shall be selected on the basis of loyalty, trustworthiness, and integrity, and shall be U.S. citizens. The requirements governing the qualifications, selection and oversight of individuals who operate, manage, oversee, and audit the CA shall be set forth in the CPS.
Trusted role personnel shall, at a minimum, pass a background investigation covering:
- Employment
- Education
- Place of residence
- Law Enforcement
- References
The period of investigation shall cover at least the last five years for each area, excepting the residence check which shall cover at least the last three years. Adjudication of the background investigation shall be performed by a competent adjudication authority using a process consistent with Executive Order 13467 or equivalent.
All individuals in trusted roles shall receive comprehensive training. Training shall be conducted in the following areas:
- Basic Public Key Infrastructure knowledge
- CA security principles and mechanisms
- All trusted role duties
- Disaster recovery and business continuity procedures
- Understanding and knowledge of this CP
The CA shall provide all Officers with additional skills-training that covers:
- Authentication and identity verification policies and procedures including the procedures allowed by this CP and the CA's CPS
- Common threats to the identity verification process including phishing and other social engineering tactics
The CA shall require all Officers to pass an examination provided by the CA on the information verification requirements outlined in this CP and the CA's CPS. The CA shall ensure that individuals with Officer duties maintain a skill level that enables them to perform such duties satisfactorily.
The CA shall maintain records of training for all individuals in trusted roles. The CA shall document that each individual in a trusted role possesses the skills required by a task before allowing the individual to perform that task.
All personnel in trusted roles shall maintain skill levels consistent with the CA's training and performance programs.
All personnel in trusted roles shall be made aware of changes in the CA operation. Any significant change to the operations shall have a training (awareness) plan, and the execution of such plan shall be documented. Examples of such changes are CA software or hardware upgrade, changes in automated security systems, and relocation of equipment.
No stipulation.
The CA shall take appropriate administrative and disciplinary actions against personnel who have performed actions involving the CA that are not authorized in this CP, the CA CPS, or other published procedures.
Direct contractor personnel employed to operate any part of the CAs or perform functions pertaining to the infrastructure shall be subject to the same personnel requirements set forth in this CP.
Documentation sufficient to define duties and procedures for each trusted role shall be provided to the personnel filling that trusted role.
The CA shall record details of the actions taken to process a certificate request and to issue a Certificate, including all information generated and documentation received in connection with the certificate request, the time and date, any CA Officer roles involved, and the domain validation method used for each FQDN for Domain Validation TLS Server Authentication certificates and Organization Validation TLS Server Authentication certificates. The CA shall make these records available to its Qualified Auditor as proof of the CA's compliance with this CP and the CA's CPS.
The CA shall record CA key lifecycle management events, including:
- Key generation, backup, storage, recovery, archival, and destruction
- Cryptographic device lifecycle management events
The CA shall record CA and Subscriber Certificate lifecycle management events, including:
- Certificate requests and revocation requests
- All verification activities stipulated in this CP and the CA's CPS
- Acceptance and rejection of certificate requests
- Issuance of Certificates
- Generation of Certificate Revocation Lists and OCSP entries
The CA shall record Security events, including:
- Successful and unsuccessful PKI system access attempts
- PKI and security system actions performed
- Security profile changes
- Clock adjustments
- System crashes, hardware failures, and other anomalies
- Firewall and router activities
- Entries to and exits from the CA facility
Log entries shall include the following elements:
- Date and time of entry
- Identity of the person performing the action if a person is involved in the action
- Description of the entry
Audit logs shall be reviewed at least once every thirty (30) days. Audit log reviews shall include verifying that the logs have not been tampered with, inspecting log entries, and performing a root cause analysis for any alerts or irregularities in the logs.
All significant events and the root cause analysis shall be explained in an audit log summary. Actions taken as a result of the audit log reviews shall be documented.
Audit logs shall be retained on-site until reviewed, in addition to being archived as described in Section 5.5. The Security trusted role shall be responsible for overseeing the migration of audit logs from the CA to the archives.
The CA shall retain any audit logs generated for at least seven years. The CA shall make these audit logs available to its Qualified Auditor upon request.
The CA shall ensure audit logs are unalterable or maintain an integrity mechanism to identify any changes.
The security audit data shall not be open for reading or modification by any human, or by any automated process, other than those that perform security audit processing. CA system configuration and procedures shall be implemented to ensure that only authorized people archive or delete security audit data. Procedures shall be implemented to protect archived data from deletion or destruction before the end of the security audit data retention period.
Audit logs and audit summaries shall be backed up at least monthly. Copies of the audit logs shall be sent off-site on a monthly basis.
The audit log collection system may or may not be external to the CA system. Automated audit processes shall be invoked at system or application startup, and cease only at system or application shutdown. Audit collection systems shall be configured such that security audit data is protected against loss (e.g. overwriting or overflow of automated log files). Should it become apparent that an automated audit system has failed, and the integrity of the system or confidentiality of the information protected by the system is at risk, operations shall be suspended until the problem has been remedied.
There is no requirement to notify a subject that an event was audited. Real-time alerts are neither required nor prohibited by this policy.
The CA's security program shall include an annual Risk Assessment that:
- Identifies foreseeable internal and external threats that could result in unauthorized access, disclosure, misuse, alteration, or destruction of any Certificate data or Certificate management processes
- Assesses the likelihood and potential damage of these threats, taking into consideration the sensitivity of the Certificate data and Certificate management processes
- Assesses the sufficiency of the policies, procedures, information systems, technology, and other arrangements that the CA has in place to counter such threats
All CAs shall undergo or perform a Vulnerability Scan:
- At least every thirty (30) days, Hardware and software on public and private IP addresses identified as within the CA's system boundaries
- Within one week of receiving a request from the FPKIPA or the U.S. Government Federal Information Security Modernization Act Authorizing Official for the CA
- After any system or network changes that the CA determines are significant
For Subordinate CAs, and the Root CA Repository and system support services, penetration testing shall be performed at least every 365 days, and after infrastructure of application upgrades or modifications that the CA determines are significant.
CAs shall:
- Record evidence that each Vulnerability Scan and Penetration Test was performed by a person or entity with the skills, tools, proficiency, code of ethics, and independence necessary to provide a reliable Vulnerability Scan or Penetration Test.
- High vulnerabilities shall be patched within sixty (60) days or less
- Critical vulnerabilities shall be patched within ninety-six (96) hours of the discovery of a critical vulnerability not previously addressed
If remediation of a critical vulnerability within ninety-six (96) hours is not possible, the CA shall create and implement a plan to mitigate the vulnerability or document the factual basis for a risk determination that the vulnerability does not require remediation.
CAs shall archive records separately from the CA backups. In addition to the archive requirements specified in this CP, archive procedures shall follow either the General Records Schedules established by the National Archives and Records Administration (NARA) or an agency-specific general records schedule as applicable.
CA archive records shall be sufficiently detailed to determine the proper operation of the CA and the validity of any certificate issued by the CA. At a minimum, the following data shall be recorded for archive:
- CA accreditation
- Certificate Policy
- Certification Practice Statement(s)
- Contractual obligations and other agreements concerning operations of the CA
- Security events, as specified in Section 5.4.1
- CA key lifecycle management events, as specified in Section 5.4.1
- Subscriber Certificate lifecycle management events, as specified in Section 5.4.1
- Subscriber agreements and / or Terms of use agreements
- All certificates issued
- All CRLs issued
- Qualified Auditor reports
- Any changes to the Audit parameters
- Appointment of an individual to a trusted role
- Other data or applications to verify archive contents
- All certificate compromise notifications
- Violations of Certificate Policy
- Violations of Certification Practice Statement
The CA shall retain all documentation relating to certificate requests and the verification thereof, and all Certificates and revocation information thereof, for a minimum of seven years without any loss of data after any Certificate based on that documentation ceases to be valid.
No unauthorized user shall be permitted to write to, modify, or delete the archive records. Records of transactions may be released upon request of any subscribers involved in the transaction or their legally recognized agents.
Archive media shall be stored in a safe, secure storage facility separate from the CA. If the original media cannot retain the data for the required archived period, a mechanism to periodically transfer the archived data to new media shall be defined by the archive site.
Alternatively, a CA operating under this policy may retain data using whatever procedures have been approved by NARA for that category of documents. Applications required to process the archive data shall be maintained for a period that equals or exceeds the archive requirements for the data.
No stipulation.
Archive records maintained in digital format shall be time-stamped as the records are created. The system clocks used for time-stamping shall be maintained in synchrony with an authoritative time standard.
Archive data may be collected in any expedient manner.
No stipulation.
Key changeovers are not applicable for any CAs operating under this CP and shall not be done. A new CA signing key constitutes a new CA and a new CA Subject Name shall be used.
CAs shall have an Incident Response Plan and a Disaster Recovery Plan. The CA shall document the business continuity and disaster recovery procedures designed to notify and reasonably protect Application Software Suppliers, Subscribers, and Relying Parties in the event of a disaster, security compromise, or business failure. The CA is not required to publicly disclose the Incident Response Plan and Disaster Recovery Plan but shall make the plans available to the CA's Qualified Auditor upon request.
The CA shall test, review, and update the Disaster Recovery Plan at least once every 365 days. The Disaster Recovery Plan shall include:
- Responsibilities for individuals and roles
- The conditions for activating the plan
- Emergency, fallback and resumption procedures
- A maintenance schedule for the plan
- Awareness and education requirements
- Recovery time objective
- Regular testing of contingency plans
- The CA’s plan to maintain or restore the CA’s business operations in a timely manner following interruption to or failure of critical business processes
- A requirement to store critical cryptographic materials (i.e., secure cryptographic device and activation materials) at an alternate location
- What constitutes an acceptable system outage and recovery time
- How frequently backup copies of essential business information and software are taken
- The distance of recovery facilities to the CA’s main site
- Procedures for securing its facility to the extent possible during the period of time following a disaster and prior to restoring a secure environment either at the original or a remote site
The FPKIPA shall be notified by the CAs operating under this policy of any incident. An incident is defined as a violation or imminent threat of violation of this CP, the CA's CPS, government memoranda of agreements, or any other document that governs the operations of the CA. An incident may include but is not limited to the following:
- CA private key compromise
- Suspected or detected compromise of the CA including the certificate status services required of the CA Repository
- Physical or electronic penetration of the CA including the certificate status services required of the CA Repository
- Successful denial of service attacks on the CA including the certificate status services required of the CA Repository
- Suspected or detected issuance of certificates used for unethical purposes such as (but not limited to) promoting malware or illegal software
- A known or reasonably known, publicly reported compromise of the CA including the certificate status services required of the CA Repository
- Any certificate issuance not in compliance with this CP, this CP's certificate profiles, or the CA's CPS
The CA shall notify the FPKIPA within 24 hours from the time the incident was discovered. An initial security incident report shall be submitted to the FPKIPA and shall include the following information:
- Which CA was affected by the incident
- When the incident was discovered
- How the incident was discovered
- If available and applicable, any evidence of attribution for the incident
- The CA's interpretation of the incident
- A complete list of all certificates that were either mis-issued or not compliant with this CP and the CA's CPS as a result of the incident.
A final security incident report shall be submitted at a date specified by the FPKIPA and shall include the following information:
- A complete timeline of events
- A root cause analysis
- Remediation actions implemented to address the underlying root cause including specific technical or procedural changes, and any updates to the CA's CPS
- Proof the mis-issued certificates were revoked
- A statement that the incident has been fully remediated
In coordination with the CA, the FPKIPA may conduct the following activities as part of an incident response:
- Publicly publish a final incident report in one or more internet-accessible locations, with information redacted as necessary
- Report incidents to the individual trust store operators
When computing resources, software, and/or data are corrupted, CAs shall ensure the system's integrity has been restored before returning to operation.
If the CA signature keys are not destroyed, CA operation shall be re-established, giving priority to the ability to generate certificate status information.
In the event of a Subordinate CA private key compromise, the following operations shall be performed:
- The FPKIPA shall be immediately notified
- All subscriber certificates shall be revoked within twenty-four (24) hours
- The Root CA shall revoke the Subordinate CA certificate within seven (7) days
If the CA publishes revocation information via CRLs:
- A final long term CRL with a nextUpdate time past the validity period of all issued subscriber certificates shall be generated
- The final CRL shall be available for all relying parties until the validity period of all issued certificates has passed
If the Root Certificate private key is compromised, the CA shall notify the FPKIPA immediately.
In all cases, the CA and the FPKIPA shall initiate procedures to notify subscribers and trust store operators of the compromise.
CA disaster recovery procedures shall be in place to reconstitute the CA including the certificate status services required of the CA Repository within six (6) hours of failure.
In the case of a disaster whereby the CA installation is damaged and all copies of the CA signature key are destroyed as a result, the FPKIPA shall be notified at the earliest feasible time, and the FPKIPA shall take whatever action it deems appropriate.
This Section does not apply to CAs that have ceased issuing new certificates but are continuing to provide OCSP responses and / or issue CRLs until all certificates have expired. Such CAs are required to continue to conform with all relevant aspects of this policy.
When a CA operating under this policy terminates operations before all certificates have expired, any issued certificates that have not expired shall be revoked.
If the CA publishes revocation information via CRLs, the CA shall generate a final long term CRL with a nextUpdate time past the validity period of all issued certificates. This final CRL shall be available for all relying parties until the validity period of all issued certificates has expired. Once the final CRL has been issued, the private signing key(s) of the CA to be terminated shall be destroyed.
If the CA only publishes revocation information via OCSP, the CA shall operate the OCSP services for the validity period of all issued certificates.
The terminated CA certificate shall be revoked.
If the terminated CA is the Root CA, the FPKIPA shall notify the trust store operator of the need to remove the Root Certificate from the applicable trust stores.
Prior to CA termination, the CA shall provide archived data to an archive facility.
The CA shall:
- Prepare and follow a Key Generation Script
- Have a Qualified Auditor witness the CA Key Pair generation process or review a video of the entire CA Key Pair generation process
- Have a Qualified Auditor issue a report opining that the CA followed its key ceremony during its Key and Certificate generation process and the controls used to ensure the integrity and confidentiality of the Key Pair
- Generate the CA keys in a physically secured environment as described in the CA's CPS
- Generate the CA keys using personnel in trusted roles under the principles of multiple person control and split knowledge
- Generate the CA keys within cryptographic modules that meet or exceed FIPS 140 Level 3 validation
- Log its CA key generation activities
- Maintain effective controls to provide reasonable assurance that the Private Key was generated and protected in conformance with the procedures described in this CP and the CA's CPS and its Key Generation Script
The documentation of the procedure shall be detailed enough to show that appropriate role separation was used and the CA key pair generation shall create a verifiable audit trail that the security requirements for procedures were followed.
Registration Authorities as a function of the CA shall not generate Subscriber key pairs.
Subscribers shall generate their own keys in compliance with Sections 6.1.5 and 6.1.6 and the Subscriber Agreement or Terms of Use.
The CA shall reject a certificate request if the requested Public Key does not meet the requirements set forth in Sections 6.1.5 and 6.1.6 or if it has a known weak Private Key due to Debian weak key (see https://wiki.debian.org/SSLkeys) or a ROCA weak key (see Common Vulnerabilities and Exposures identifier CVE-2017-15361).
Subscribers shall generate their own keys. This section is not applicable.
The public key shall be delivered securely to the Issuing CA for certificate issuance. The certificate request process shall ensure that the Applicant possesses the private key associated with the public key presented for certification.
A Root CA certificate shall be conveyed to trust store operators and relying parties in a secure fashion to preclude substitution attacks. Acceptable methods for the self-signed Root CA certificate delivery are:
- Loading a self-signed certificate onto tokens delivered to trust store operators or relying parties via secure mechanisms
- Secure distribution of the self-signed certificate through secure out-of-band mechanisms
- Comparison of the hash of the self-signed certificate against a hash value made available via authenticated out-of-band sources
- Secure mechanisms used by the trust store operators to distribute Publicly-Trusted Root CA certificates to relying parties
Certificates shall meet the following requirements for algorithm type and key size.
(1) Root CA Certificates
Digest algorithm | SHA-256 |
Minimum RSA modulus size (bits) | 4096 |
(2) Subordinate CA Certificates
Digest algorithm | SHA-256 |
Minimum RSA modulus size (bits) | 2048 |
(3) Subscriber Certificates
Digest algorithm | SHA-256, SHA-384 or SHA-512 |
Minimum RSA modulus size (bits) | 2048 |
ECC curve | NIST P-256, P-384 |
For RSA moduli, the CA shall confirm that the value of the public exponent e is an odd positive integer such that:
- 216 < e < 2256
The CA shall perform partial public key validation as specified in Section 5.3.3 of NIST SP 800-89 to confirm that the modulus is an odd number, is not the power of a prime, and has no factors smaller than 752.
For ECC, the CA should confirm the validity of all keys using either the ECC Full Public Key Validation Routine or the ECC Partial Public Key Validation Routine as specified in NIST SP 800-56A.
Root CA Private Keys shall not be used to sign Certificates except in the following cases:
- Self-signed Certificates to represent the Root CA itself
- Certificates for Subordinate CAs
- Certificates for infrastructure purposes (Delegated OCSP Responder certificates, administrative role certificates, internal CA operational device certificates)
The CA shall implement physical and logical safeguards to prevent unauthorized certificate issuance. Protection of the CA Private Key outside the validated system or device specified above shall consist of physical security, encryption, or a combination of both, implemented in a manner that prevents disclosure of the Private Key. The CA shall encrypt its Private Key with an algorithm and key-length that, according to the state of the art, are capable of withstanding cryptanalytic attacks for the residual life of the encrypted key or key part.
The relevant standard for cryptographic modules is Security Requirements for Cryptographic Modules specified in FIPS 140-2.
Cryptographic modules for CAs, including any cryptographic modules used in certificate status services required of the CA Repository such as OCSP responders, shall be hardware modules validated as meeting FIPS 140-2 Level 3 or above.
Subscribers should use modules validated as meeting FIPS 140-2 Level 1 or above to generate key pairs.
For all CAs:
- A single person shall not be permitted to activate or access any cryptographic module that contains the complete CA private signing key
- CA signature keys may be backed up only under at least two-person control
- Access to CA signing keys backed up for disaster recovery shall be under at least two-person control
- The names of the parties used for two-person control shall be made available for inspection during Qualified Audits
- Multi-person control shall not be achieved using personnel that serve in the Security trusted role
There is no stipulation for Subscriber private key multi-person control.
Private keys shall not be escrowed.
For all CAs:
- The private key shall be backed up under the same multi-person control as the original signature key
- At least one copy of the CA private key shall be stored off-site in a secure storage facility separate from the CA
- All copies of the CA private key shall be accounted for and protected in the same manner as the original
- Backup procedures shall be included in the CA’s CPS
Subscriber private keys may be backed up or copied by the Subscriber, but shall be held in the Subscriber’s control.
Private keys may only be archived by the parties represented by the Subject identified in the corresponding public key certificate.
CAs shall generate their own keys in FIPS 140 validated cryptographic modules, in compliance with Sections 6.1.5 and 6.1.6. CA private keys may be exported from the cryptographic module only to perform CA key backup procedures as described in Section 6.2.4. At no time shall the CA private key exist in plaintext outside the cryptographic module. Private or symmetric keys used to encrypt other private keys for transport shall be protected from disclosure.
There is no stipulation for Subscriber private key transfers into or from a cryptographic module.
CAs shall protect their private key in a system or device that has been validated as meeting at least FIPS 140 Level 3.
There is no stipulation for Subscriber private key storage.
For all CAs, private key activation shall implement multiparty control as specified in Section 5.2.2.
There is no stipulation for Subscriber private key activation.
For all CAs:
- Cryptographic modules that have been activated shall not be available to unauthorized access.
- After use, the cryptographic module shall be deactivated, e.g., via a manual logout procedure or automatically after a period of inactivity as defined in the CA's CPS.
- CA cryptographic modules shall be removed and stored in a secure container when not in use.
There is no stipulation for Subscriber private key deactivation.
Individuals in trusted roles shall destroy all CA Certificate and Delegated OCSP Responder Certificate private keys when the keys are no longer needed. All CAs shall document the private key destruction methods in the CPS.
There is no stipulation for Subscriber private key destruction.
See Section 6.2.1
For all CAs, the CA Certificate and public key shall be archived in accordance with Section 5.5.1.
There is no stipulation for Subscriber public key archival.
Root CA Certificates shall have a Validity Period no greater than 20 years. Subordinate CA Certificates shall have a Validity Period no greater than 10 years. All certificates signed by a CA key pair shall expire before the end of that key pair’s usage period.
Domain Validation TLS Server Authentication Certificates and Organization Validation TLS Server Authentication Certificates shall have a Validity Period no greater than 395 days.
Delegated OCSP Responder Certificates shall have a Validity Period no greater than 45 days.
For all CAs, CA activation data may be user-selected by each of the multiple parties holding that activation data. If the activation data shall be transmitted, it shall be via a channel protected commensurate with the protection supplied by the key itself, and distinct in time and place from the associated cryptographic module.
There is no stipulation for Subscriber activation data.
For all CAs, this CP makes no further stipulation beyond that specified in FIPS 140.
There is no stipulation for Subscriber activation data.
No stipulation.
For all CAs and Certificate System Components including certificate status services, the computer security functions listed below are required. These functions may be provided by the operating system, or through a combination of operating system, software, and physical safeguards. The Certificate System Components shall include the following functionality:
- Be configured to remove or disable all accounts, applications, services, protocols, and ports that are not used in the CA's operations
- Authenticate the identity of users before permitting access to the system or applications
- Manage privileges of users to limit users to their assigned roles and implement least privilege controls
- Enforce separation of duties for roles
- Generate and archive audit records for all transactions (see Section 5.4)
- Enforce domain integrity boundaries for security critical processes
- Provide process isolation
- Support recovery from key or system failure
When CA and Certificate System Components including certificate status services, are hosted on evaluated platforms in support of computer security assurance requirements then the system (hardware, software, and operating system) shall, when possible, operate in an evaluated configuration. At a minimum, such platforms shall use the same version of the computer operating system that received the evaluation rating.
Two-person control shall be enforced (using physical and/or technical means) on functions performed to administer the hardware, operating system, and applications.
The number of accounts and personnel assigned for CA equipment and the administration thereof shall be the minimum number necessary to accomplish the required functions. Any management of the PKI equipment shall be performed from a single administrative domain.
For CA components, remote management and login shall be disabled. Network protocols not required for CA operation shall be disabled. Telnet and File Transfer Protocol (FTP) shall never be enabled.
No stipulation.
The system development controls for all CAs and Certificate System Components functions listed below are required:
- The CA hardware and software shall be dedicated to performing one task: the CA
- There shall be no other applications, hardware devices, network connections, or component software installed that are not part of the CA operation
- Where the CA operation supports multiple CAs, the hardware platform may support multiple CAs
The security management controls for all CAs and all Certificate System Components listed below shall be implemented:
- Configurations, modifications, and upgrades shall be documented and controlled
- Configurations shall be reviewed on at least a weekly basis to determine whether any changes violated the CA’s security policies.
- There shall be a mechanism for detecting unauthorized modification to the software or configuration
- All system accounts and trusted role accounts shall be reviewed at least every ninety (90) days, and any account that is no longer in use or necessary for operations shall be deactivated
- A process shall be implemented that disables physical and logical access to Certificate Systems by any trusted role within 24 hours upon termination of the individual's employment or contracting relationship with the CA
- All authentication credentials for any account or trusted role on Certificate Systems shall be changed whenever authorization to access the account is changed or revoked
- All system accounts and trusted role accounts shall be configured to lockout access after five (5) failed access attempts
- There shall be an automated mechanism to process logged system activity and alert personnel, using notices provided to multiple destinations, of possible Critical Security Events
- A policy that requires trusted roles to log out of or lock workstations when no longer in use
- A procedure to configure workstations with inactivity time-outs to log off a trusted role account or lock the workstation after a set time of inactivity
The security management controls for all CAs and Certificate System Components listed below shall be implemented:
- Hardware and software procured to operate the CA shall be purchased in a fashion to reduce the likelihood that any particular component was tampered with (e.g. by ensuring the random selection of material at the time of purchase or installation)
- Hardware and software shall be similarly limited and scanned for malicious code on first use and continuously thereafter
Secure Zones are a physical or logical separation of Certificate Systems while a High Security Zone is a physical area where a private key or cryptographic equipment is stored. Each Zone is protected commensurate with its level of assurance. A High Security Zone may exist within a Secure Zone that is physically or logically separated from other Secure Zones.
For the Root CA, the CA shall be operated in a High Security Zone and in an offline (powered off, disconnected) or air-gapped (powered on, disconnected) state from all other networks.
For all CAs and Certificate System Components, the network security controls listed below are required:
- Secure Zones shall be implemented to secure Certificate Systems based on functional, logical, and physical (including location) relationships.
- The same security controls shall be applied to all systems co-located in the same Zone with a Certificate System.
- Security support systems shall be configured to protect systems and communications between systems inside Secure Zones and High Security Zones as well as Public Networks (Internet).
- Only trusted roles shall have access to Secure and High Security Zones.
- A network guard or firewall shall protect network access to CA equipment, and limit services allowed to and from the CA equipment to those required to perform CA functions.
- Protection of CA equipment shall be provided against known network attacks.
- All unused network ports and services shall be turned off.
- Any network software present shall be necessary to the functioning of the equipment.
- Any boundary control devices used to protect the network on which equipment is hosted shall deny all but the necessary services to the equipment.
- Repositories, and certificate status services shall employ appropriate network security controls.
The CA shall not be remotely administered.
Asserted times shall be accurate to within three minutes. Electronic or manual procedures may be used to maintain system time. Clock adjustments are auditable events (see Section 5.4.1).
Certificates issued by a CA under this policy shall conform to the Certificate Profiles included as Appendix D.
Certificates shall be of type X.509 v3.
Rules for the certificate content and extensions are included as Appendix D.
CAs shall not issue a Certificate with:
- Extensions that do not apply in the context of the public Internet (such as an extendedKeyUsage value for a service that is only valid in the context of a privately managed network)
- Semantics that, if included, will mislead a Relying Party about the certificate information verified by the CA
A Pre-certificate, as described in RFC 6962 - Certificate Transparency, shall not be considered to be a "certificate" subject to the requirements of RFC 5280 under this CP.
The Certificate Profiles in Appendix D describe algorithms used in signing certificates and algorithms for the subject public key information, aligned with Section 6.1.5.
Signature Algorithm | Object Identifier |
---|---|
sha256WithRSAEncryption | 1.2.840.113549.1.1.11 |
sha384WithRSAEncryption | 1.2.840.113549.1.1.12 |
sha512WithRSAEncryption | 1.2.840.113549.1.1.13 |
Public Key Algorithm | Object Identifier |
---|---|
rsaEncryption | 1.2.840.113549.1.1.1 |
ecPublicKey | 1.2.840.10045.2.1 |
The content of the Certificate Issuer Distinguished Name field shall match the Subject Distinguished Name of the Issuing CA to support Name chaining as specified in RFC 5280, Section 4.1.2.4.
CA Subject Distinguished Name shall conform to PrintableString string type in ASN.1 notation.
By issuing the Certificate, the CA represents that it followed the procedure set forth in this CP and the CA CPS to verify that, as of the Certificate's issuance date, all of the Subject Information was accurate.
CAs shall not include a Domain Name in a Subject attribute except as validated under Section 3.2.2.4.
Underscore characters (“_”) shall not be present in dNSName entries of the Subject Alternative Name Extension.
By issuing a Subordinate CA Certificate, the CA represents that it followed the procedure set forth in this CP and the CA's CPS to verify that, as of the Certificate's issuance date, all of the Subject Information was accurate.
All Subordinate CA Certificates shall be Technically Constrained. For a Subordinate CA Certificate to be considered Technically Constrained, the certificate shall include an Extended Key Usage (EKU) extension specifying all extended key usages that the Subordinate CA Certificate is authorized to issue certificates for. The anyExtendedKeyUsage KeyPurposeId shall not appear within this extension.
The Subordinate CA Certificate(s) shall include the id-kp-serverAuth extended key usage, and the Subordinate CA Certificate(s) shall include the Name Constraints X.509v3 extension with constraints on dNSName as follows:
- Shall include at least one dNSName in permittedSubtrees
- The permittedSubtrees for dNSName shall be within the constraints of the sTLDs for .gov and .mil
- The permittedSubtrees for dNSName shall not contain any other dNSName ranges outside of the .gov or .mil sTLDs
For ipAddress, Subordinate CAs shall not issue subscriber certificates with an iPAddress. The Subordinate CA Certificate shall:
- Specify the entire IPv4 and IPv6 address ranges in excludedSubtrees
- Include within excludedSubtrees an iPAddress GeneralName of 8 zero octets (covering the IPv4 address range of 0.0.0.0/0)
- Include within excludedSubtrees an iPAddress GeneralName of 32 zero octets (covering the IPv6 address range of ::0/0)
For DirectoryName, the Subordinate CA Certificates shall:
- Include a single DirectoryName in permittedSubtrees specifying c=US
A decoded example for issuance to the domain and subdomains of .mil by a Subordinate CA would be:
X509v3 Name Constraints:
Permitted:
DNS:mil
DirName: C = US
Excluded:
IP:0.0.0.0/0.0.0.0
IP:0:0:0:0:0:0:0:0/0:0:0:0:0:0:0:0
A decoded example for issuance to the domain and subdomains of both .gov and .mil by a Subordinate CA would be:
X509v3 Name Constraints:
Permitted:
DNS:mil
DNS:gov
DirName: C = US
Excluded:
IP:0.0.0.0/0.0.0.0
IP:0:0:0:0:0:0:0:0/0:0:0:0:0:0:0:0
Certificates issued under this policy shall not contain a critical certificate policies extension.
This section describes the content requirements for the Root CA, Subordinate CA, and Subscriber Certificates, as they relate to the identification of Certificate Policy.
The following Certificate Policy identifiers are registered under the National Institute of Standards and Technology (NIST) Computer Science Object Registry (CSOR) OID arc and reserved for use by the U.S. Government for this CP. These Certificate Policy Identifiers are a required means of asserting compliance with this CP as follows:
-
Domain Validated:
- {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) pki(2) certificate-policies(1) arcfbca-policies(3) domain-validated(43) } (2.16.840.1.101.3.2.1.3.43),
- If the Certificate complies with this CP but lacks Subject Identity Information that is verified in accordance with Section 3.2.2.1 or Section 3.2.3.
-
Organization Validated:
- {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) pki(2) certificate-policies(1) arcfbca-policies(3) organization-validated(44)} (2.16.840.1.101.3.2.1.3.44),
- If the Certificate complies with this CP and includes Subject Identity Information that is verified in accordance with Section 3.2.2.1.
The following Certificate Policy identifiers are registered under the CAB Forum and reserved for use. These Certificate Policy Identifiers are a required means of asserting compliance with the CAB Forum Baseline Requirements as follows:
-
Domain Validated:
- {joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140) certificate-policies(1) baseline-requirements(2) domain-validated(1)} (2.23.140.1.2.1),
- If the Certificate complies with the Baseline Requirements but lacks Subject Identity Information that is verified in accordance with Section 3.2.2.1 or Section 3.2.3
-
Organization Validated:
- {joint-iso-itu-t(2) international-organizations(23) ca-browser-forum(140) certificate-policies(1) baseline-requirements(2) organization-validated(2)} (2.23.140.1.2.2),
- If the Certificate complies with the Baseline Requirements and includes Subject Identity Information that is verified in accordance with Section 3.2.2.1.
If the Certificate asserts the policy identifiers for Domain Validated, then the certificate shall not include organizationName and stateOrProvinceName in the Subject field. If the Certificate asserts the policy identifiers for Organization Validated, then the certificate shall include organizationName, stateOrProvinceName and countryName in the Subject field.
A Root CA Certificate shall not contain the certificatePolicies extension.
All Subordinate CAs shall be an Affiliate as defined in this CP.
A Certificate issued to a Subordinate CA shall contain in the Certificate's certificatePolicies extension:
- One or more of the U.S. Government reserved policy object identifiers defined in Section 7.1.6.1 to indicate the Subordinate CA's compliance with this CP, and
- One or more of the CAB Forum reserved policy object identifiers in Section 7.1.6.1 to indicate the Subordinate CA's compliance with the CAB Forum Baseline Requirements
A Domain Validation TLS Server Authentication Certificate or Organization Validation TLS Server Authentication Certificate issued to a Subscriber shall contain in the Certificate's certificatePolicies extension:
- One of the U.S. Government reserved policy object identifiers defined in Section 7.1.6.1 that indicates adherence to and compliance with this CP
- One of the CAB Forum reserved policy object identifiers defined in Section 7.1.6.1 that indicates adherence to and compliance with the CAB Forum Baseline Requirements
The certificates shall contain certificate policy identifier(s) for either Domain Validated policies or Organization Validated policies but shall not assert certificate policy identifiers for both.
The CA shall document in its CPS that the Certificates it issues containing the specified policy identifier(s) are managed in accordance with the CAB Forum Baseline Requirements and this CP.
Delegated OCSP Responder Certificates shall contain all the certificate policy OIDs defined in Section 7.1.6.1 for all certificates issued by the CA and covered by the OCSP responses.
Subordinate CA certificates may assert policy constraints.
Certificates issued under this CP may contain policy qualifiers.
Certificate Revocation Lists (CRLs) created by a CA under this policy shall conform to the Certificate Revocation List extensions profile included as Appendix D.
OCSP Responses under this policy shall conform to the OCSP Response profile included as Appendix D.
OCSP responses operated under this policy shall use OCSP version 1.
The CAs operated under this CP are Technically Constrained (see Section 7.1.5). CAs shall be audited in accordance with Section 8.7.
The period during which the CA issues Certificates shall be divided into an unbroken sequence of audit periods. An audit period shall not exceed one year in duration.
Before issuing Subscriber certificates or Subordinate CA certificates, any CA shall successfully complete a point-in-time readiness assessment performed in accordance with applicable standards under one of the audit schemes listed in Section 8.4. The point-in-time readiness assessment shall be completed no earlier than twelve (12) months prior to issuing Certificates and shall be followed by a complete audit under such scheme within ninety (90) days of issuing the first Publicly-Trusted Certificate.
CA audits shall be performed by a Qualified Auditor. A Qualified Auditor means a natural person, Legal Entity, or group of natural persons or Legal Entities that collectively possess the following qualifications and skills:
- Independence from the subject of the audit
- The ability to conduct an audit that addresses the criteria specified in an Eligible Audit Scheme (see Section 8.4)
- Employs individuals who have proficiency in examining Public Key Infrastructure technology, information security tools and techniques, information technology and security auditing, and the third-party attestation function
- For audits conducted in accordance with the WebTrust standard, licensed by WebTrust
- Bound by law, government regulation, or professional code of ethics, and
- Except in the case of an Internal Government Auditing Agency, maintains Professional Liability/Errors & Omissions insurance with policy limits of at least one million US dollars in coverage.
The Qualified Auditor either shall be a private firm that is independent from the CA being audited, or it shall be sufficiently organizationally separated from the CA to provide an unbiased, independent evaluation. An example of the latter situation may be a Federal agency Inspector General. To insure independence and objectivity, the Qualified Auditor may not have served the CA in developing or maintaining the CPS. The FPKIPA shall determine whether the Qualified Auditor meets the requirements for independence and objectivity.
The CAs shall undergo an audit in accordance with all of the following:
- WebTrust for Certification Authorities, Version 2.0 or later
- WebTrust for Certification Authorities - SSL Baseline with Network Security, Version 2.2 or later
- Compliance of the CA's CPS against this CP
Audits shall incorporate periodic monitoring and/or accountability procedures to ensure that the audits continue to be conducted in accordance with the requirements of the scheme. The audit shall be conducted by a Qualified Auditor, as specified in Section 8.2.
When the Qualified Auditor finds a discrepancy between the requirements of this CP or the stipulations in the CPS and the design, operation, or maintenance of the CAs, the following actions shall be performed:
- The Qualified Auditor shall note the discrepancy
- The Qualified Auditor shall notify the CA promptly
- The CA shall propose a remedy, including expected time for completion, to the FPKIPA
Depending upon the nature and severity of the discrepancy, and how quickly it can be corrected, the FPKIPA may decide to temporarily halt operation of the CA, to revoke a certificate issued to the CA, or take other actions it deems appropriate.
The Audit Letter shall state explicitly that it covers the relevant systems and processes used in the issuance of all Certificates that assert one or more of the policy identifiers listed in Section 7.1.6.1.
The Audit Letter shall include:
- Name and address of the organization performing the audit
- Name of the auditor(s)
- Distinguished name and SHA256 fingerprint of each CA that was included in the audit
- Audit criteria, with version number, that was used to audit each of the CAs
- A list of the CA policy documents, with version numbers, referenced during the audit
- Whether the audit is for a period of time or a point in time
- For a period of time audit: the start and end date of the period
- For a point in time audit: the point-in-time date
- The date the Audit Letter was issued
The CA shall make the Audit Letter publicly available in accordance with Section 2.1. The CA shall make its Audit Letter publicly available no later than three months after the end of the audit period. In the event of a delay greater than three months, and if so requested by the FPKIPA or an Application Software Supplier, the CA shall provide an explanatory letter signed by the Qualified Auditor.
During the period in which the CA issues Certificates, the CA shall monitor adherence to this CP and the CA's CPS and strictly control its service quality by performing self-audits on at least a quarterly basis against a randomly selected sample of the greater of one certificate or at least three percent of the Certificates issued by it during the period commencing immediately after the previous self-audit sample was taken.
During the period in which a Subordinate CA issues Certificates, the Root CA shall monitor adherence to this CP and the Subordinate CA's CPS. On at least a quarterly basis, against a randomly selected sample of the greater of one certificate or at least three percent of the Certificates issued by the Subordinate CA, during the period commencing immediately after the previous audit sample was taken, the CA shall ensure all applicable CP requirements are met.
No stipulation.
Section 2 of this policy requires that Repositories including CA Certificates are publicly available. CAs operating under this policy shall not charge additional fees for access to CA Certificates.
Section 2 of this policy requires that Repositories including certificate status services (CRLs and OCSP) are publicly available. CAs operating under this policy shall not charge additional fees for access to CRLs and OCSP services.
CAs shall not charge Subscribers a fee to revoke a certificate.
No stipulation.
No stipulation.
This CP contains no limits on the use of certificates issued by CAs under this policy. Rather, entities, acting as relying parties, shall determine what financial limits, if any, they wish to impose for certificates used to consummate a transaction.
No stipulation.
No stipulation.
No stipulation.
CA information not requiring protection shall be made publicly available.
No stipulation.
No stipulation.
A CA shall not disclose non-certificate information to any third party unless authorized by this policy, required by U.S. law, U.S. government rule or regulation, or order of a U.S. court of competent jurisdiction. The contents of the archives maintained by CAs operating under this policy shall not be released except as required by this policy, required by U.S. law, U.S. government rule or regulation, or order of a U.S. court of competent jurisdiction. The FPKI Policy Authority must authenticate any request for release of information.
CAs shall conduct a Privacy Threshold Assessment, and implement and maintain any required Privacy Impact Assessments and Privacy Plans in accordance with the requirements of the Privacy Act of 1974, as amended.
The CAs shall protect any subscriber personally identifying information from unauthorized disclosure.
Records of individual transactions may be released upon request of any subscribers.
Information included in certificates and certificate status information are not private information and are not subject to the protections outlined in Section 9.4.2.
Sensitive information shall be stored securely, and may be released only in accordance with other stipulations in Section 9.4.
The CA is not required to provide any notice or obtain the consent of the Subscriber in order to release private information in accordance with other stipulations of Section 9.4.
The FPKIPA or CAs shall not disclose private information to any third party unless authorized by this policy, required by law, government rule or regulation, or order of a court of competent jurisdiction. Any request for release of information shall be processed according to 41 CFR 105-60.605.
None.
The FPKIPA and CAs shall not knowingly violate intellectual property rights held by others.
CAs shall warrant that their procedures are implemented in accordance with this CP and that all certificates issued were issued in accordance with the stipulations of this policy.
A CA that issues certificates under this policy shall conform to the stipulations of this policy, including:
- Providing to the FPKIPA a CPS, as well as any subsequent changes, for conformance assessment
- Ensuring a Terms of Service or Subscriber Agreement is agreed to with the Subscribers
- Maintaining its operations in conformance to the stipulations of the approved CPS.
- Including only valid and appropriate information in certificates
- Maintaining evidence that due diligence was exercised in validating the information contained in the certificates.
- Revoking the certificates of subscribers found to have acted in a manner counter to their obligations in accordance with Section 9.6.3
- Operating or providing for the services of an on-line repository, and informing the repository service provider of their obligations if applicable.
An RA, as the party described in Section 1.3.4, may perform registration functions as described in this policy. An RA shall comply with the stipulations of this policy, and comply with the CA CPS approved by the FPKIPA for use with this policy. An RA who is found to have acted in a manner inconsistent with these obligations is subject to revocation of RA responsibilities.
The CA shall require, as part of the Subscriber Agreement or Terms of Use, that the Applicant make the commitments and warranties in this Section for the benefit of the CA and the Certificate Beneficiaries.
A Subscriber shall be required to sign a document containing the requirements the subscriber shall meet respecting protection of the private key and use of the certificate before being issued the certificate. The Subscriber Agreement or Terms of Use shall require the Subscriber to:
- Provide accurate and complete information in the transactions with the CA
- Protect the private key(s) at all times, in accordance with this policy
- Promptly notify the CA upon suspicion of loss or compromise of the private key(s)
- Cease use of the private key corresponding to the Public Key included in the Certificate upon revocation of that Certificate for reasons of Key Compromise
- Abide by all the terms, conditions, and restrictions levied on the use of their private key(s) and certificate(s)
- Use certificates provided by the CAs only for transactions related to U.S. Government business
The CA may use electronic or "click-through" agreements provided that the CA has determined that such agreements are legally enforceable. A separate agreement may be used for each certificate request, or a single agreement may be used to cover multiple future certificate requests and the resulting Certificates, so long as each Certificate that the CA issues to the Applicant is clearly covered by that Subscriber Agreement or Terms of Use.
This CP does not specify the steps a relying party should take to determine whether to rely upon a certificate. The relying party decides, pursuant to its own policies, what steps to take.
No stipulation.
CAs operating under this policy may not disclaim any responsibilities described in this CP.
The U.S. Government shall not be liable to any party, except as determined pursuant to the Federal Tort Claims Act (FTCA), 28 U.S.C. 2671-2680, or as determined through a valid express written contract between the Government and another party.
No stipulation.
This CP becomes effective when approved by the FPKIPA. This CP has no specified term.
Termination of this CP is at the sole discretion of the FPKIPA.
The requirements of this CP remain in effect through the end of the archive period for the last certificate issued.
The FPKIPA shall establish appropriate procedures for communications with CAs operating under this policy via memoranda of agreements as applicable.
The FPKIPA shall review and update this Certificate Policy at least every 365 days.
The review and update shall include any changes needed to address source requirements, including but not limited to:
- U.S. Federal Government mission needs and changes to support the missions
- Baseline Requirements
- Trust store operator requirements
- Browser software vendor requirements
The FPKIPA is responsible for monitoring source requirements, and initiating necessary changes to ensure continued compliance within the required timeframes. After review and approval, the CP document version number and a dated changelog entry shall be added even if no changes were made to the document.
Errors, updates, or suggested changes to this CP can be communicated to the contact in Section 1.5.2. Such communication shall include a description of the change, a change justification, and contact information for the person requesting the change.
Proposed changes to this CP shall be distributed electronically to FPKIPA members and observers in accordance with the Charter and By-laws, and posted publicly for review by any interested party. The FPKIPA shall make any subsequent changes publicly available within 30 days of approval (see Section 2.3).
No stipulation.
The FPKIPA shall facilitate the resolution between entities when conflicts arise as a result of the use of certificates issued under this policy. If a dispute is between U.S. Federal government entities, and the FPKIPA is unable to facilitate resolution, dispute resolution may be escalated to the White House Office of Management and Budget or to the U.S. Department of Justice, Office of Legal Counsel as necessary.
The construction, validity, performance and effect of certificates issued under this CP for all purposes shall be governed by United States Federal law (statute, case law, or regulation).
All CAs operating under this policy are required to comply with applicable law.
No stipulation.
No stipulation.
Should it be determined that one section of this CP is incorrect or invalid, the other sections of this CP shall remain in effect until the CP is updated. The process for updating this CP is described in Section 9.12.
No stipulation.
No stipulation.
No stipulation.
Affiliate: An agency, department, political subdivision, or any entity operating under the direct control of a U.S. Government Entity.
Air-Gapped: Certificate Systems or components that are physically and logically disconnected from other networks.
Applicant: The natural person or Legal Entity that applies for (or seeks renewal of) a Certificate. Once the Certificate is issued, the Applicant is referred to as the Subscriber. For Certificates issued to devices, the Applicant is the entity that controls or operates the device named in the Certificate, even if the device is sending the actual certificate request.
Applicant Representative: A natural person or human sponsor who is either the Applicant, employed by the Applicant, or an authorized agent who has express authority to represent the Applicant: (i) who signs and submits, or approves a certificate request on behalf of the Applicant, and/or (ii) who signs and submits a Subscriber Agreement on behalf of the Applicant, and/or (iii) who acknowledges the Terms of Use on behalf of the Applicant when the Applicant is an Affiliate of the CA or is the CA.
Application Software Supplier: A supplier of Internet browser software or other relying-party application software that displays or uses Certificates and incorporates Root Certificates.
Attestation Letter: A letter attesting that Subject Information is correct written by an accountant, lawyer, government official, or other reliable third party customarily relied upon for such information.
Audit Period: In a period-of-time audit, the period between the first day (start) and the last day of operations (end) covered by the auditors in their engagement. (This is not the same as the period of time when the auditors are on-site at the CA.) The coverage rules and maximum length of audit periods are defined in Section 8.1.
Audit Letter: A report from a Qualified Auditor stating the Qualified Auditor's opinion on whether an audited entity's processes and controls comply with the mandatory provisions of the Baseline Requirements, this Certificate Policy and the Certification Practice(s) Statements.
Authorization Domain Name: The Domain Name used to obtain authorization for certificate issuance for a given FQDN. The CA may use the FQDN returned from a DNS CNAME lookup as the FQDN for the purposes of domain validation. If the FQDN contains a wildcard character, then the CA shall remove all wildcard labels from the left most portion of requested FQDN. The CA may prune zero or more labels from left to right until encountering a Base Domain Name and may use any one of the intermediate values for the purpose of domain validation.
Authorized Port: One of the following ports: 80 (http), 443 (https), 25 (smtp), 22 (ssh).
Base Domain Name: The portion of an applied-for FQDN that is the first domain name node left of a registry-controlled or public suffix plus the registry-controlled or public suffix (e.g. "example.co.uk" or "example.com"). For FQDNs where the right-most domain name node is a gTLD having ICANN Specification 13 in its registry agreement, the gTLD itself may be used as the Base Domain Name.
Baseline Requirements: The Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates as published by the CAB Forum (https://cabforum.org).
Certification Authority Authorization: From RFC 6844 (https://tools.ietf.org/html/rfc6844): "The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify the Certification Authorities (CAs) authorized to issue certificates for that domain. Publication of CAA Resource Records allows a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue."
Certificate: An electronic document that uses a digital signature to bind a public key and an identity.
Certificate Data: Certificate requests and data related thereto (whether obtained from the Applicant or otherwise) in the CA's possession or control or to which the CA has access.
Certificate Management Process: Processes, practices, and procedures associated with the use of keys, software, and hardware, by which the CA verifies Certificate Data, issues Certificates, maintains a Repository, and revokes Certificates.
Certificate Policy: A set of rules that indicates the applicability of a named Certificate to a particular community and/or PKI implementation with common security requirements.
Certificate Problem Report: Complaint of suspected Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, or inappropriate conduct related to Certificates.
Certificate Revocation List: A regularly updated time-stamped list of revoked Certificates that is created and digitally signed by the CA that issued the Certificates.
Certificate System: The system used by a CA in providing identity verification, registration and enrollment, certificate approval, issuance, validity status, support, and other PKI related services.
Certificate System Component: An individual element of a larger Certificate System used to process, approve issuance of, or store certificates or certificate status information. This includes the database, database server, storage devices, certificate hosting services, registration authority systems, and any other element used in certificate management.
Certification Authority: An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Roots CAs and Subordinate CAs.
Certification Practice Statement: One of several documents forming the governance framework in which Certificates are created, issued, managed, and used.
Certificate Transparency (CT): Publicly operated record of certificate issuance.
Country: Either a member of the United Nations OR a geographic region recognized as a Sovereign State by at least two UN member nations.
Cross Certificate: A certificate that is used to establish a trust relationship between two Root CAs.
CSPRNG: A random number generator intended for use in cryptographic system.
Delegated Third Party: A natural person or Legal Entity that is not the CA but is authorized by the CA to assist in the Certificate Management Process by performing or fulfilling one or more of the CA requirements found herein.
DNS CAA Email Contact: The email address placed in the CAA contactemail property.
DNS TXT Record Email Contact: The email address placed on the “_validation-contactemail” of the DNS TXT record.
DNS TXT Record Phone Contact: The phone number placed on the “_validation-contactphone” of the DNS TXT record.
Domain Authorization Document: Documentation provided by, or a CA's documentation of a communication with, a Domain Name Registrar, the Domain Name Registrant, or the person or entity listed in WHOIS as the Domain Name Registrant (including any private, anonymous, or proxy registration service) attesting to the authority of an Applicant to request a Certificate for a specific Domain Namespace.
Domain Contact: The Domain Name Registrant, technical contact, or administrative contact (or the equivalent under a ccTLD) as listed in the WHOIS record of the Base Domain Name or in a DNS SOA record.
Domain Name: The label assigned to a node in the Domain Name System.
Domain Namespace: The set of all possible Domain Names that are subordinate to a single node in the Domain Name System.
Domain Name Registrant: Sometimes referred to as the "owner" of a Domain Name, but more properly the person(s) or entity(ies) registered with a Domain Name Registrar as having the right to control how a Domain Name is used, such as the natural person or Legal Entity that is listed as the "Registrant" by WHOIS or the Domain Name Registrar.
Domain Name Registrar: A person or entity that registers Domain Names under the auspices of or by agreement with: (i) the Internet Corporation for Assigned Names and Numbers (ICANN), (ii) a national Domain Name authority/registry, or (iii) a Network Information Center (including their affiliates, contractors, delegates, successors, or assigns).
Effective Date: The date, as specified in Section 1.2.1, by which entities need to conform to the specified revision of this policy.
Embedded SCT: An SCT delivered via an X.509v3 extension within the certificate.
Enterprise RA: An employee or agent of an organization unaffiliated with the CA who authorizes issuance of Certificates to that organization.
Expiry Date: The "Not After" date in a Certificate that defines the end of a Certificate's validity period.
Fully-Qualified Domain Name: A Domain Name that includes the labels of all superior nodes in the Internet Domain Name System.
Government Entity: A government-operated legal entity, agency, department, ministry, branch, or similar element of the government of a country, or political subdivision within such country (such as a state, province, city, county, etc.).
High Risk Certificate Request: A Request that the CA flags for additional scrutiny by reference to internal criteria and databases maintained by the CA, which may include names at higher risk for phishing or other fraudulent usage, names contained in previously rejected certificate requests or revoked Certificates, names listed on the Miller Smiles phishing list or the Google Safe Browsing list, or names that the CA identifies using its own risk-mitigation criteria.
High Security Zone: An area (physical or logical) protected by physical and logical controls that appropriately protect the confidentiality, integrity, and availability of the CA's Private Key or cryptographic hardware.
Infrastructure Certificate: A certificate that is not a CA Certificate and issued in support of the CA System.
Internal Name: A string of characters (not an IP address) in a Common Name or Subject Alternative Name field of a Certificate that cannot be verified as globally unique within the public DNS at the time of certificate issuance because it does not end with a Top Level Domain registered in IANA's Root Zone Database.
Issuing CA: In relation to a particular Certificate, the CA that issued the Certificate. This could be either a Root CA or a Subordinate CA.
Key Compromise: A Private Key is said to be compromised if its value has been disclosed to an unauthorized person, an unauthorized person has had access to it, or there exists a practical technique by which an unauthorized person may discover its value. A Private Key is also considered compromised if methods have been developed that can easily calculate it based on the Public Key (such as a Debian weak key, see https://wiki.debian.org/SSLkeys) or if there is clear evidence that the specific method used to generate the Private Key was flawed.
Key Generation Script: A documented plan of procedures for the generation of a CA Key Pair.
Key Pair: The Private Key and its associated Public Key.
Legal Entity: An association, corporation, partnership, proprietorship, trust, government entity or other entity with legal standing in a country's legal system.
Object Identifier: A unique alphanumeric or numeric identifier registered under the International Organization for Standardization's applicable standard for a specific object or object class.
OCSP Responder: An online server operated under the authority of the CA and connected to its Repository for processing Certificate status requests. See also, Online Certificate Status Protocol.
Offline: An air-gapped Certificate System or component that is only turned on to conduct certificate activity (i.e. issue / revoke a certificate, issue certificate revocation list, etc.).
Online: Certificate Systems or components that are physically and logically connected to the public and/or a private internet.
Online Certificate Status Protocol: An online Certificate-checking protocol that enables relying-party application software to determine the status of an identified Certificate. The protocol is defined in RFC 6960. See also OCSP Responder.
Pre-Certificate: An X.509 object constructed from the certificate intended to be issued and submitted to Certificate Transparency logging services, to receive a signed certificate timestamp (SCT). A Pre-certificate is defined in RFC 6962.
Private Key: The key of a Key Pair that is kept secret by the holder of the Key Pair, and that is used to create Digital Signatures and/or to decrypt electronic records or files that were encrypted with the corresponding Public Key.
Public Key: The key of a Key Pair that may be publicly disclosed by the holder of the corresponding Private Key and that is used by a Relying Party to verify Digital Signatures created with the holder's corresponding Private Key and/or to encrypt messages so that they can be decrypted only with the holder's corresponding Private Key.
Public Key Infrastructure: A set of hardware, software, people, procedures, rules, policies, and obligations used to facilitate the trustworthy creation, issuance, management, and use of Certificates and keys based on Public Key Cryptography.
Publicly-Trusted Certificate: A Certificate that is trusted by virtue of the fact that its corresponding Root Certificate is distributed as a trust anchor in widely-available application software.
Qualified Auditor: A natural person or Legal Entity that meets the requirements of Section 8.2.
Random Value: A value specified by a CA to the Applicant that exhibits at least 112 bits of entropy.
Registered Domain Name: A Domain Name that has been registered with a Domain Name Registrar.
Registration Authority (RA): Any Legal Entity that is responsible for identification and authentication of subjects of Certificates, but is not a CA, and hence does not sign or issue Certificates. An RA may assist in the certificate application process or revocation process or both. When "RA" is used as an adjective to describe a role or function, it does not necessarily imply a separate body, but can be part of the CA.
Reliable Data Source: An identification document or source of data used to verify Subject Identity Information that is generally recognized among commercial enterprises and governments as reliable, and which was created by a third party for a purpose other than the Applicant obtaining a Certificate.
Reliable Method of Communication: A method of communication, such as a postal/courier delivery address, telephone number, or email address, that was verified using a source other than the Applicant Representative.
Relying Party: Any natural person or Legal Entity that relies on a Valid Certificate. An Application Software Supplier is not considered a Relying Party when software distributed by such Supplier merely displays information relating to a Certificate.
Repository: An online database containing publicly-disclosed PKI governance documents (such as Certificate Policies and Certification Practice Statements) and Certificate status information, either in the form of a CRL or an OCSP response.
Request Token: A value derived in a method specified by the CA which binds this demonstration of control to the certificate request.
Required Website Content: Either a Random Value or a Request Token, together with additional information that uniquely identifies the Subscriber, as specified by the CA.
Reserved IP Address: An IPv4 or IPv6 address that the IANA has marked as reserved:
- https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xml
- https://www.iana.org/assignments/ipv6-address-space/ipv6-address-space.xml
Root CA: The top level Certification Authority whose Root Certificate is distributed by Application Software Suppliers and that issues Subordinate CA Certificates.
Root Certificate: The self-signed Certificate issued by the Root CA to identify itself and to facilitate verification of Certificates issued to its Subordinate CAs.
Secure Zone: An area (physical or logical) protected by physical and logical controls that appropriately protect the confidentiality, integrity, and availability of Certificate Systems.
Security Support Systems: A system used to provide security support functions, such as authentication, network boundary control, audit logging, audit log reduction and analysis, vulnerability scanning, and anti-virus.
Signed Certificate Timestamp (SCT): A timestamp and promise from a Certificate Transparency operator to add the submitted certificate to the log within a specified time period.
Sovereign State: A state or country that administers its own government, and is not dependent upon, or subject to, another power.
Subject: The device, system, unit, or Legal Entity identified in a Certificate as the Subject. The Subject is a device under the control and operation of the Subscriber.
Subject Identity Information: Information that identifies the Certificate Subject. Subject Identity Information does not include a domain name listed in the subjectAltName extension or the Subject commonName field.
Subordinate CA: A Certification Authority whose Certificate is signed by the Root CA, or another Subordinate CA.
Subscriber: A Legal Entity to whom a Certificate is issued and who is legally bound by a Subscriber Agreement or Terms of Use.
Subscriber Agreement: An agreement between the CA and the Applicant/Subscriber that specifies the rights and responsibilities of the parties.
Technically Constrained Subordinate CA Certificate: A Subordinate CA certificate which uses a combination of Extended Key Usage settings and Name Constraint settings to limit the scope within which the Subordinate CA Certificate may issue Subscriber or additional Subordinate CA Certificates.
Terms of Use: Provisions regarding the safekeeping and acceptable uses of a Certificate issued when the Applicant/Subscriber is an Affiliate of the CA or is the CA.
Test Certificate: A Certificate with a maximum validity period of 30 days and which: (i) includes a critical extension with the specified Test Certificate CABF OID (2.23.140.2.1), or (ii) is issued under a CA where there are no Certificate paths/chains to a root Certificate subject to this Certificate Policy or the Baseline Requirements.
Trustworthy System: Computer hardware, software, and procedures that are: reasonably secure from intrusion and misuse; provide a reasonable level of availability, reliability, and correct operation; are reasonably suited to performing their intended functions; and enforce the applicable security policy.
Valid Certificate: A Certificate that passes the validation procedure specified in RFC 5280.
Validation Specialists: Someone who performs the information verification duties specified by the Baseline Requirements, this Certificate Policy and the Certification Practice(s) Statements under which a CA operates.
Validity Period: The period of time measured from the date when the Certificate is issued until the Expiry Date.
WHOIS: Information retrieved directly from the Domain Name Registrar or registry operator via the protocol defined in RFC 3912, the Registry Data Access Protocol defined in RFC 7482, or an HTTPS website.
Wildcard Certificate: A Domain Name consisting of a single asterisk character followed by a single full stop character (“*.”) followed by a Fully-Qualified Domain Name.
Zone: A subset of Certificate Systems created by the logical or physical partitioning of systems from other Certificate Systems.
Acronym | Meaning |
---|---|
ACME | Automated Certificate Management Environment |
CA | Certification Authority |
CAA | Certification Authority Authorization |
CFR | Code of Federal Regulations |
ccTLD | Country Code Top-Level Domain |
CP | Certificate Policy |
CPS | Certification Practice Statement |
CRL | Certificate Revocation List |
CT | Certificate Transparency |
DBA | Doing Business As |
DNS | Domain Name System |
FIPS | (U.S. Government) Federal Information Processing Standard |
FQDN | Fully Qualified Domain Name |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IANA | Internet Assigned Numbers Authority |
ICANN | Internet Corporation for Assigned Names and Numbers |
ISO | International Organization for Standardization |
NIST | (U.S. Government) National Institute of Standards and Technology |
OCSP | Online Certificate Status Protocol |
OID | Object Identifier |
PKI | Public Key Infrastructure |
RA | Registration Authority |
SCT | Signed Certificate Timestamp |
S/MIME | Secure MIME (Multipurpose Internet Mail Extensions) |
SSL | Secure Sockets Layer |
TLD | Top-Level Domain |
TLS | Transport Layer Security |
Automatic Certificate Management Environment (ACME), https://datatracker.ietf.org/doc/draft-ietf-acme-acme/
FIPS 140-2, Federal Information Processing Standards Publication - Security Requirements For Cryptographic Modules, Information Technology Laboratory, National Institute of Standards and Technology, May 25, 2001.
ISO 21188:2006, Public key infrastructure for financial services -- Practices and policy framework.
NIST SP 800-89, Recommendation for Obtaining Assurances for Digital Signature Applications, https://doi.org/10.6028/NIST.SP.800-89.
NIST SP 800-56-A, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, https://doi.org/10.6028/NIST.SP.800-56Ar2
RFC 2119, Request for Comments: 2119, Key words for use in RFCs to Indicate Requirement Levels, Bradner, March 1997.
RFC 3647, Request for Comments: 3647, Internet X.509 Public Key Infrastructure: Certificate Policy and Certification Practices Framework, Chokhani, et al, November 2003.
RFC 3912, Request for Comments: 3912, WHOIS Protocol Specification, Daigle, September 2004.
RFC 5019, Request for Comments: 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments, A. Deacon, et al, September 2007.
RFC 5280, Request for Comments: 5280, Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile, Cooper et al, May 2008.
RFC 5752, Request for Comments: 5752, Multiple Signatures in Cryptographic Message Syntax (CMS), Turner et al, January 2010.
RFC 6066, Request for Comments: 6066, Transport Layer Security (TLS) Extensions: Extension Definitions, Eastlake 3rd, et al, January 2011.
RFC 6844, Request for Comments: 6844, DNS Certification Authority Authorization (CAA) Resource Record, Hallam-Baker, et al, January 2013.
RFC 6960, Request for Comments: 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. Santesson, Myers, Ankney, Malpani, Galperin, Adams, June 2013.
RFC 6962, Request for Comments: 6962, Certificate Transparency, Laurie, et al, June 2013.
RFC 7482, Request for Comments: 7482, Registration Data Access Protocol (RDAP) Query Format, Newton, et al, March 2015.
WebTrust for Certification Authorities, SSL Baseline with Network Security, Version 2.0, available at https://www.webtrust.org/homepage-documents/item79806.pdf.
X.509, Recommendation ITU-T X.509 (10/2012) | ISO/IEC 9594-8:2014 (E), Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks.
This section specifies the X.509 version 3 certificate profiles, version 2 Certificate Revocation List (CRL) profile, and Online Certificate Status Protocol (OCSP) Response profile for the U.S. Federal Public Trust TLS PKI Certificate Policy. In cases where the profiles and Section 7 of this CP are in conflict, Section 7 takes precedence and is authoritative.
Certificates issued under this policy are categorized as CA Certificates, Subscriber Certificates or Infrastructure Certificates. This Certificate Policy defines five (5) different types of certificates (See Section 1.1.3) and four associated certificate profiles.
Category | Certificate Type | Profile |
---|---|---|
CA Certificate | Root CA Certificate | Self-Signed Root CA Certificate Profile |
CA Certificate | Subordinate CA Certificate | Subordinate CA Certificate Profile |
Subscriber Certificate | Domain Validation TLS Server Authentication Certificates | Server Authentication Certificate Profile |
Subscriber Certificate | Organization Validation TLS Server Authentication Certificates | Server Authentication Certificate Profile |
Infrastructure Certificate | Delegated OCSP Responder Certificates | Delegated OCSP Responder Certificate Profile |
There are two profiles covering the Certificate Revocation Lists and OCSP Responses.
Type | Profile |
---|---|
Certificate Revocation Lists | CRL Profile |
Online Certificate Status Protocol (OCSP) Responses | OCSP Response Profile |
{% include_relative certificate-profile-root-CA.md %}
{% include_relative certificate-profile-subordinate-CA.md %}
{% include_relative certificate-profile-server-authentication.md %}
{% include_relative certificate-profile-OCSP-responder.md %}
{% include_relative crl-profile.md %}
{% include_relative ocsp-response-profile.md %}