United Kingdom Ministry of Defence: Defence Public Key Infrastructure X.509 Certificate Policy
United Kingdom Ministry of Defence: Defence Public Key Infrastructure X.509 Certificate Policy
United Kingdom Ministry of Defence: Defence Public Key Infrastructure X.509 Certificate Policy
DRAFT
United Kingdom
Ministry of Defence
Defence Public Key Infrastructure
X.509 Certificate Policy
Version 3.0
DRAFT
UK UNCLASSIFIED
UK UNCLASSIFIED
a. This document is controlled and managed by the DPMA under the authority of the United
Kingdom Ministry of Defence (MOD). Queries should be addressed to: -
b. The information contained in this document is intended for personnel charged with the
management and operation of the Defence Public Key Infrastructure (DPKI) owned by the
MOD.
c. © Crown Copyright 2008
The text in this document may be reproduced free of charge in any format or media without
requiring specific permission. This is subject to the material not being used in a derogatory
manner or in a misleading context. The source of the material shall be acknowledged as
Crown copyright and the title of the document shall be included when being reproduced as
part of another publication or service.
Serial Number: 47 EC BA B5
UK UNCLASSIFIED 2
UK UNCLASSIFIED
DOCUMENT INFORMATION
Document Title Defence Public Key Infrastructure X.509 Certificate Policy
Object Identifier (OID) 1.2.826.0.1310.100.3
Issue Number 3.0
Issue Date 7th July 2008
Issued By Defence Interoperable Network Services Authority
Defence Equipment & Support \ Information Systems & Services
Room 9, Building H21
JSU Corsham, Copenacre Site
Park Lane
Corsham
Wiltshire
SN13 9NR
Author(s) DES ISS Sols-C4 TechArch Cons 1 (Peter Curran)
a. This document uses RFC 3647 (Certificate Policy and Certification Practices Framework) as
a template. Some section titles have been amended to use terminology consistent with HMG
practice, although section numbering is consistent with RFC 3647.
DOCUMENT HISTORY
UK UNCLASSIFIED 3
UK UNCLASSIFIED
REFERENCES
a. The following documents contain information that has been required by reference or which
otherwise describe or govern the Ministry of Defence Public Key Infrastructure operation.
UK UNCLASSIFIED 4
UK UNCLASSIFIED
TABLE OF CONTENTS
1 INTRODUCTION .........................................................................................................11
1.1 Overview .............................................................................................................................................. 11
1.1.1 Assurance Levels .......................................................................................................................... 12
UK UNCLASSIFIED 5
UK UNCLASSIFIED
UK UNCLASSIFIED 7
UK UNCLASSIFIED
UK UNCLASSIFIED 9
UK UNCLASSIFIED
9.12 Amendments.................................................................................................................................... 69
9.12.1 Procedure for amendments ........................................................................................................... 69
9.12.2 Notification mechanism and period ............................................................................................... 70
9.12.3 Circumstances in which a new OID must be issued ..................................................................... 70
UK UNCLASSIFIED 10
UK UNCLASSIFIED
1 INTRODUCTION
a. This Defence Certificate Policy (DCP) defines the X.509 Certificate Policy for all certificates
issued within the Defence Public Key Infrastructure (DPKI) for systems and networks
operating at SECRET and below. Certificates identify an entity (a person, role or device)
named in the certificate and state what the certificate (and corresponding public key) can be
used for. The certificate binds an entity to a particular public key and in effect therein a
particular public/private key pair.
1.1 Overview
a. The MOD has established the DPKI Policy Management Authority (DPMA) to control the
policies of the DPKI and to audit compliance with these policies. The role of the DPMA is
detailed in section 1.3 of this policy. This Certificate Policy is the statement by the DPMA of
the policies to be implemented and used within the DPKI, it may be supplemented by other
more detailed policies that are subordinate to this policy. The manner in which this policy is
maintained is defined in section 1.5.
b. This document identifies the unified policy under which a Defence Certificate Management
Authority (DCMA) and associated processes, operated by a MOD authorised element, is
established and operates. The Defence Information Infrastructure (DII) Integrated Project
Team (IPT), operating as directed by the DCMA, is responsible for delivery of the DPKI to the
MOD. Any other body approved by the DPMA to deliver DPKI functionality shall comply with
these policies.
c. The DII IPT may use a Delivery Partner to deliver some aspects of certificate generation,
revocation, storage, publishing and management.
d. The DPMA will decide all trust relationships within the DPKI and is responsible for
determining cross-certification and other relationships with external parties. The DCMA,
through the Defence Root Certification Authority (DRCA), will provide the technical
mechanisms to create cross-certification; the DII IPT will provide the technical infrastructure
to support these trust relationships including cross-certification, mutual recognition and all
other forms of interoperability of the DPKI with all internal and external parties.
e. This document defines the creation and management of X.509 public key certificates for use
in applications requiring communication between networked (and possibly stand-alone)
computer-based systems. Such uses may include, but are not limited to, the following:
i. Authentication of users to applications and infrastructure
ii. Message signing and/or encryption
iii. Signing and/or encryption of electronic forms/files/contracts
iv. Authentication of infrastructure devices and services such as Routers, Web Servers,
Firewalls, VPNs and Directories
v. Support for auditing and accountability
f. MOD requires authentication, confidentiality, integrity, non-repudiation, and access control to
support activities within and across the organisation. Public key certificates from the DPKI
will complement and support existing security systems for MOD activities. Amongst other
things, the reliability of a PKI depends on its secure and trustworthy operation, including
equipment, facilities, personnel, procedures, a robust registration system and a trusted time
source.
g. Security management services provided by the DPKI shall include, but are not limited to the
following:
i. Key generation, archival, recovery, and destruction
UK UNCLASSIFIED 11
UK UNCLASSIFIED
UK UNCLASSIFIED 12
UK UNCLASSIFIED
c. It is explicitly prohibited to assert any policy OID not listed above within any certificate.
1.3 DPKI participants
a. This section describes the identity or types of entities that fill the roles of participants within
the DPKI, along with a brief description of their roles and/or responsibilities. A detailed
description of some of these bodies, along with their terms of reference, is contained in DPKI
Programme Board: Management Structure Terms of Reference. The relationship between
1
See JSP 457 volume 2.
2
OID assignment within the arc managed by the DPMA is described in the DPKI Interface Specification.
3
Entities of type ‘Admin’ are PKI Roles, as defined elsewhere in the policy.
UK UNCLASSIFIED 13
UK UNCLASSIFIED
Request Status
Local
Handling
Request
Registration
Local
Service
Handling
Request
Authority
Registration
Local Issue Service
Handling
Authority
Registration
Revoke Service
Authority
UK UNCLASSIFIED 14
UK UNCLASSIFIED
UK UNCLASSIFIED 16
UK UNCLASSIFIED
b. All LRA procedures will be compliant with the appropriate Registration CPS.
c. The MOD may operate one or more LRAs.
d. The DII IPT may operate one or more LRAs to support internal operation of the DII – for the
purposes of registration of certificates for PKI administration roles, TLS/SSL certificates for
servers, code signing certificates and any other purpose identified by the DII IPT and
approved by the DPMA
1.3.10 Subscribers
a. A Subscriber is the entity whose name appears as the subject in a certificate, and who
asserts that the use of the key and certificate are in accordance with this policy. The
targeted DPKI Subscribers include but are not limited to the following categories of entities:
i. MOD service and civilian personnel and eligible contractors.
ii. Personnel of, and approved contractors to, other UK government departments.
iii. MOD approved Foreign Government and Foreign organisation personnel, and eligible
contractors.
iv. Devices (e.g. Workstations, Firewalls, Routers, Trusted Servers and other
infrastructure components). These components may be operated by the MOD or
third parties on behalf of the MOD, for example the DII Delivery Partner.
v. Organisational roles associated with individuals, groups of individuals or
organisational entities.
b. CA servers are technically subscribers to the DPKI. In this document, the term Subscriber
refers only to those entities who receive certificates for uses other than signing and issuing
certificates.
UK UNCLASSIFIED 18
UK UNCLASSIFIED
5
All policies relating to TLS apply equally to Secure Sockets Layer version 3.0 (SSL 3.0).
UK UNCLASSIFIED 19
UK UNCLASSIFIED
1.5.5 Waivers
a. There shall be no waivers to this Certificate Policy.
6
Support for TLS/SSL by the DPKI is dependant on compliance with CESG Manual T, as amplified by JSP
440 Part 8, when used at IS1 Impact Level 3.
7
Support for IPsec by the DPKI is dependant on compliance with CESG Manual V, as amplified by JSP 440
Part 8, when used at IS1 Impact Level 3.
UK UNCLASSIFIED 20
UK UNCLASSIFIED
UK UNCLASSIFIED 21
UK UNCLASSIFIED
UK UNCLASSIFIED 22
UK UNCLASSIFIED
8
PKI role certificates are for internal use within the operation of the PKI, examples include RA Operators and
CA server administrators.
UK UNCLASSIFIED 23
UK UNCLASSIFIED
b. Certificates that contain a Subject name that is a pseudonym shall contain a unique
reference that identifies the natural person, who controls the private key that corresponds to
the public key within the certificate. There is no requirement for the reference to be
meaningful to a Relying Party or for multiple certificates associated with the same natural
person to contain the same reference number 9 .
c. Organisation role names are defined as pseudonymous.
d. The DCMA shall not issue anonymous Subscriber certificates without the express consent of
the DPMA.
9
Approved mechanisms for creating references are given in the DPKI Interface Specification. The database
containing the association between a reference and a natural person may be protectively marked, but the
reference value is not.
10
See JSP 457 vol 2.
UK UNCLASSIFIED 24
UK UNCLASSIFIED
adequate biometric is collected and can be linked to the subscriber identity, a digital
signature can be used 11 . Either type of signature shall be applied in the presence of the
person performing the identity authentication.
11
The terms “good” and “adequate” are used advisedly, pending further guidance on the use of biometric
identification from CSIA.
UK UNCLASSIFIED 26
UK UNCLASSIFIED
12
Note that all CA servers require approval by the DPMA for their establishment and continuing operation.
This process requires evidence of accreditation, as well as an approved CPS that describes the operation of
the CA server (see 4.1).
UK UNCLASSIFIED 27
UK UNCLASSIFIED
authenticated using the public key of the certificate to be revoked, regardless of whether or
not the associated private key has been compromised.
b. When the requester of revocation is the Subscriber, other methods may be used to
authenticate revocation requests, such as communication with the Subscriber providing
reasonable assurance that the person or organisation requesting revocation is, in fact, the
Subscriber. The DCMA shall establish, and make publicly available, the process by which it
addresses such revocation requests and the means by which it will establish the validity of
the request.
c. The DRCA shall only accept revocation requests that are authenticated using the digital
signature of the device Sponsor where revocation of a CA server or CA cross certificate is
requested. This process shall be described in the DRCA CPS.
d. Requests for revocation of certificates shall be included in the accounting log, as described in
Section 5.4.
UK UNCLASSIFIED 28
UK UNCLASSIFIED
13
There will also be a requirement for other documentation for security accreditation purposes, which is
beyond the scope of this policy.
14
If databases or other sources are used to confirm Subscriber attributes, then these sources and
associated information sent to a RA/LRA shall be protected from unauthorised modification.
UK UNCLASSIFIED 29
UK UNCLASSIFIED
c. RA/LRAs shall verify all authorisations and other attribute information received from an
Applicant. Information regarding attributes shall be verified via those offices or roles that
have authority to assign the information or attribute.
d. In the circumstance where a request is received as a Certificate Request (e.g., PKCS#10),
the integrity of this request shall be tested by the RA/LRA.
e. On completion of the validation process, the RA/LRA shall create a Certificate Request, or
utilise the one provided by the Applicant. This request shall be either:
i. Signed by the RA/LRA using a signing key previously allocated to the RA/LRA by the
DCMA or,
ii. Submitted to the CMS within a secure session (e.g. TLS) where the RA/LRA endpoint
is authenticated using DPKI credentials previously allocated to the RA/LRA for this
purpose.
f. This authentication attests that the request is correct, authentic and authorised by the DCMA
and is the authority for the CMS to process the request and issue a certificate.
15
These components may be operated by MOD or third parties on behalf of the MOD, for example the DII
Delivery Partner.
UK UNCLASSIFIED 30
UK UNCLASSIFIED
reject a certificate application. The RA/LRA shall work with the appropriate parties to resolve
the problem; final arbitration rests with the DPMA.
b. A certificate application shall not be considered accepted until the RA/LRA has issued an
authenticated Certificate Request and this has been received by the CMS.
UK UNCLASSIFIED 31
UK UNCLASSIFIED
b. In the case of Person and/or Role certificates, issued in conjunction with a smartcard or other
token, the certificate is deemed to be delivered at the point where the token is loaded with
the certificate and associated private key. In the case of a re-key onto an existing token,
certificate acceptance is deemed at the point where the token is loaded with the new
certificate.
c. In the case of device/server certificates (e.g. TLS/SSL certificates) acceptance is deemed at
the point at which the certificate is downloaded from the RA/LRA or issuing CA server.
d. In the case where the Subscriber is responsible for key generation, prior to requesting a
certificate, Subscriber responsibilities commence at the time of key generation. Subscriber
responsibilities to the DPKI may, in some circumstances, commence at the time of certificate
acceptance – for example, if a smartcard is pre-loaded with keys and certificates prior to
issue to a user.
e. In the case of a CA server, acceptance is deemed at the point at which the certificate is
delivered to the server. In all the cases (instantiation and re-key) the DPMA shall be notified
when a CA server certificate has been issued and accepted.
UK UNCLASSIFIED 32
UK UNCLASSIFIED
UK UNCLASSIFIED 33
UK UNCLASSIFIED
this policy to make other changes to the certificate that may be deemed necessary at the
time of issue 16 .
Person certificates 0 2 0
Role certificates 0 2 0
Device certificates 2 2 0
c. Certificate re-key will normally be required following a certificate revocation, unless such a
revocation is performed because the certificate (and therefore the associated key-pair) is no
longer required. The procedure for requesting a re-key following revocation is not the same
as that required for routine re-key – RA/LRA CPSs shall specify a separate process for re-
key following revocation, with due regard being given to the circumstances of revocation.
Normally, such a request should be treated as a new Subscriber request.
c. The original certificate may be revoked once the new certificate has been issued. This
revocation may be delayed to suit the requirements of the Subscriber – this should be
detailed in the Registration CPS. Where the original private key has been irrevocably put
beyond further use 17 there is no requirement to revoke the original certificate – this
circumstance shall never apply to a key that has been, or is capable of being, copied,
backed-up or stored in a retrieval system.
d. In the circumstance where a CA server is to be re-keyed, approval of the DPMA for
continued operation must be confirmed. Under no circumstance shall a certificate supporting
an old CA server key be revoked without the express instruction of the DPMA.
17
E.g., where the key storage area of a smartcard or other token has been overwritten with a new key, or
zeroised using an approved method.
UK UNCLASSIFIED 35
UK UNCLASSIFIED
UK UNCLASSIFIED 36
UK UNCLASSIFIED
e. The DCMA, at its discretion, may revoke a certificate when a Subscriber or CA server fails to
comply with obligations set out in this policy, the relevant CPS, or any other agreement or
applicable law.
f. Where a non-MOD CA is cross-certified with the DPKI, the DPMA shall revoke a cross-
certificate:
i. When any of the information in the External CA certificate changes.
ii. Upon suspected or known compromise of the External CA private key.
iii. Upon suspected or known compromise of the media holding the cross-certified
External CA private key.
iv. When the External CA certificate is revoked.
g. The DPMA, at its discretion, may direct the revocation of a cross-certificate when an external
PKI fails to comply with obligations set out in its CP, CPS, any agreement or any applicable
law.
4.9.5 Time within which the CMS must process the revocation request
a. The CMS shall process 99% of Revocation Requests within 15 minutes of receipt.
Processing is completed when the current revocation status of a certificate is available for
publication in a CRL, or notification to the DPKI Validation Authority.
UK UNCLASSIFIED 38
UK UNCLASSIFIED
b. The service for processing Revocation Requests and subsequently updating OCSP and CRL
information shall be available at all times (subject to the availability of the underlying
infrastructure).
the explicit approval of the DPMA. The DPMA has approved the issuance of certificates that
support both signing and encryption to TLS/SSL servers, where this is deemed necessary.
UK UNCLASSIFIED 41
UK UNCLASSIFIED
source of trust in the PKI, and as such these roles shall be performed by a trustworthy
person with appropriate security clearance.
b. Certain tasks performed by trusted roles require a higher degree of assurance – these are
designated ‘Sensitive Tasks’. Such tasks shall be split across multiple people so that
malicious or inappropriate activity requires collusion.
c. Only those personnel assigned trusted roles shall have access to the functions that control
the CA server operation.
2 3
MAL HAL
Single person 2
UK UNCLASSIFIED 44
UK UNCLASSIFIED
UK UNCLASSIFIED 45
UK UNCLASSIFIED
Event CA VA RA
server server system
Miscellaneous
Appointment of an individual to a trusted role X X X
Designation of personnel for multi-person control X X X
Installation of the operating system X X X
Installation of the PKI application X X X
Installation of hardware cryptographic modules X X X
Removal of hardware cryptographic modules X X X
Destruction of cryptographic modules X X X
System startup X X X
Logon attempts to PKI application X X X
Receipt of hardware/software X X X
Attempts to set passwords X X X
Attempts to modify passwords X X X
Backup of the internal CA database X N/A N/A
Restoration from backup of the internal CA database X N/A N/A
File manipulation (e.g. creation, renaming, modification) X N/A N/A
Posting of any material to a PKI repository X N/A N/A
Access to the internal CA database X X N/A
All certificate compromise notification requests X N/A X
Loading tokens with certificates X N/A X
Shipment of tokens X N/A X
Zeroizing of tokens X N/A X
Re-key of the component X X X
Configuration Changes
Hardware X X N/A
Software X X X
Operating system X X X
Patches X X X
Security profiles X X X
Physical Access/Site Security
Personnel access to room holding component X X N/A
Access to the component X X N/A
Known or suspected violations of physical security X X X
Anomolies
Software error conditions X X X
Software integrity check failures X X X
Receipt of improper messages X X X
Misrouted messages X X X
Network attacks (suspected or confirmed) X X X
Equipment failure X X X
Electrical power outages X X N/A
Uninterruptible Power Supply (UPS) failures X X N/A
Obvious and significant network service or access failures X X N/A
Violations of security policy X X X
Violations of CPS X X X
Resetting operating system clock X X X
UK UNCLASSIFIED 47
UK UNCLASSIFIED
18
I.e. it can be added to, but not changed or deleted.
UK UNCLASSIFIED 48
UK UNCLASSIFIED
UK UNCLASSIFIED 49
UK UNCLASSIFIED
UK UNCLASSIFIED 50
UK UNCLASSIFIED
b. At the termination of service all keys, audit logs and other archived material shall be retained.
All private keys, and their back-ups, shall be destroyed.
c. A CA server shall not be permitted to terminate until it can demonstrate that all certificates in
issue have either been revoked or replaced with an equivalent certificate issued by an
alternative CA server. Wherever possible, all certificates issued by the CA server should be
revoked and that fact published on at least 2 consecutive CRLs, prior to cessation of service.
UK UNCLASSIFIED 51
UK UNCLASSIFIED
b. Entropy sources for cryptographic modules providing key generation shall be approved by
the DPMA on a case-by-case basis, when indicated as ‘Approved’ in the table above.
c. Where a CESG Assisted Products Scheme (CAPS) cryptographic module is required, the
DPMA shall determine if a FIPS 140-2 module may be used as an alternative. The table
above identifies the FIPS 140-2 modules that may be acceptable as alternatives to CAPS.
Details of module selection shall be documented within the appropriate CPS.
containing a private key shall be distributed to the Subscriber securely, not using the same
path as that used for the key delivery.
b. The DCMA shall retain a record of the delivery of all keys and their associated encryption
key/password.
c. These requirements shall apply to delivery of keys following generation, and to delivery of
keys recovered from a Key Recovery Database.
Subscribers CA servers
Symmetric 3-key (168 bit) Triple DES or 3-key (168 bit) Triple DES or
Encryption AES128 AES128
UK UNCLASSIFIED 53
UK UNCLASSIFIED
6.1.7 Key usage purposes (as per X.509 v3 key usage field)
a. For all assurance levels, key usage as asserted in the appropriate certificate shall be for
signing or encryption, but not both. The only exception to this policy is for keys associated
with the use of a TLS/SSL server that may be used for both signing and encryption, but only
for use by the TLS/SSL protocol in conjunction with the TLS/SSL cipher suites defined in JSP
440: Annex B to Part 8, Section 5, Chapter 7.
b. The X.509 keyUsage field (and associated extendedKeyUsage field) shall fully state the
intended purposes of the key, and the DCMA shall not issue certificates that specify both
signing and encryption for the same key (except as noted above).
c. Where certificates, intended for the purpose of signing, are issued to a natural person and
state their certificate policy as either High Hard Person/Role or Medium Hard Person/Role
the non-repudiation bit shall be set in the keyUsage field.
d. Where certificates, intended for the purpose of signing, are issued to a natural person and
state their certificate policy as either High Soft Person/Role or Medium Soft Person/Role the
non-repudiation bit shall be set in the keyUsage field if the key pair was generated by the
Subscriber. If the key pair was generated by a CA server or RA, then the non-repudiation bit
shall not be set.
e. CA server certificates shall set the cRLSign and certSign bits in the keyUsage field.
6.2 Private Key Protection and Cryptographic Module Engineering
Controls
6.2.1 Cryptographic module standards and controls
a. All hardware cryptographic modules used within the DPKI shall meet minimum standards,
identified and approved by the DPMA. The preference is for products accredited via the
CESG Assisted Products Scheme (CAPS), but currently products identified as FIPS 140-2
(Security Requirements for Cryptographic Modules) evaluated (at various levels) have been
approved, pending the availability of CAPS products.
b. All software cryptographic modules used within the DPKI shall meet minimum standards,
identified and approved by the DPMA. The preference is for products accredited via the
CAPS, but products certified to FIPS 140-2 at Level 1 or higher are permitted in the absence
of a suitable CAPS product. All software cryptographic modules shall be approved by the
DPMA, in general the requirement is for support within an evaluated operating system at
EAL3 (or higher).
c. CA and RA server cryptographic module minimum standards:
CAPS or CAPS or
FIPS 140-2 Level 1 FIPS 140-2 Level 2
e. All cryptographic modules shall be operated in such a manner that the private key is never
output in plaintext. No private key shall ever appear unencrypted outside of the module.
UK UNCLASSIFIED 54
UK UNCLASSIFIED
UK UNCLASSIFIED 55
UK UNCLASSIFIED
the same n of m principles used to provide access control. The individual components
should not be stored together, but spread across multiple locations.
UK UNCLASSIFIED 56
UK UNCLASSIFIED
b. Subject to approval by the DPMA, shorter lifetimes may be specified to suit the requirements
of an application or service.
6.4 Activation data
6.4.1 Activation data generation and installation
a. Access to private keys within cryptographic modules is protected by activation data. Section
6.2.8 identifies three permitted mechanisms for activation data. Where non-biometric
mechanisms are adopted an approved password or PIN generator shall be used.
b. PINs shall be a minimum of 6 digits in length.
c. Passwords shall be random strings, not based on a dictionary word and not personally
related to the Subscriber.
d. Support for biometric authentication/activation is under consideration by the DPMA and
further guidance on appropriate mechanism and usage will be promulgated via JSP 457 vol
6.
e. Where the activation data is not generated by the Subscriber directly, the activation data
shall be notified to the Subscriber using a secure mechanism that guards against disclosure
to unauthorised persons. Protective marking of the activation data should be considered by
the system owner or security accreditor, in accordance with the requirements given in JSP
440.
f. The Subscriber agreement shall include instructions to the Subscriber on the correct
handling and protection of activation data.
UK UNCLASSIFIED 57
UK UNCLASSIFIED
UK UNCLASSIFIED 58
UK UNCLASSIFIED
b. Certificates under this policy will use the following OIDs for identifying the algorithm for which
the subject key was generated:
c. The DPKI shall only certify public keys associated with the cryptographic algorithms identified
above, and shall only use the signature algorithms identified above to sign certificates, CRLs
and any other DPKI product.
UK UNCLASSIFIED 59
UK UNCLASSIFIED
b. MAL end entity certificates should normally assert a single policy OID; where a HAL policy is
asserted, the corresponding MAL policy should also be asserted to support interoperability.
c. CA servers shall assert all policy OIDs for which they are authoritative (i.e. for which they
may issue certificates), as defined by the approved CPS.
d. The requirements of cross-certificates for asserting policy, and for policy mapping, are
defined in the DPKI Interface Specification.
b. The CRL profiles defined in the DPKI Interface Specification are the only ones approved for
use with the DPKI. Any variation to the profiles, or a requirement for additional profiles, shall
be approved by the DPMA.
UK UNCLASSIFIED 61
UK UNCLASSIFIED
a full text version of the appropriate CPS, when necessary, for the purposes of any audit,
inspection, accreditation, or cross-certification.
8.5 Actions taken as a result of deficiency
a. If irregularities are found by the audit, the DPMA and DCMA shall be informed in writing
immediately. The DCMA shall submit a report to the auditor or directly to the DPMA, as
determined by the DPMA, as to any remedial action the DCMA will take in response to the
identified deficiencies. This report shall include a time for completion to be approved by the
auditor, or by the DPMA as appropriate. The DPMA shall be kept informed by the DCMA at
all times.
b. Remedial action may include suspension or revocation of CA or RA/LRA certificates, as
defined in Section 4.9.
c. Where a DPKI component fails to take appropriate action in response to the identified
deficiencies, the DPMA shall be informed and shall take the appropriate action, according to
the severity of the deficiencies which shall include:
i. Noting the deficiencies but allowing the DPKI component to continue operations until
the next planned, or newly scheduled, inspection
ii. Allow the DPKI component to continue operations for a maximum of thirty days
pending correction of any problems prior to revocation
iii. Revoking the DPKI component’s certificate
d. The inspection results for external PKI systems shall be submitted to the DPMA. Where the
PMA of a cross-certified PKI fails to take appropriate action to correct irregularities, the
DPMA may revoke the external PKI’s cross-certificate with the DPKI Defence Root CA.
8.6 Communication of results
a. Audit results are to be treated as confidential information. Unless otherwise specified in an
applicable contract, they shall be treated in accordance with Section 9.3.
b. External PKIs cross-certified with the DPKI Defence Root CA shall provide the DPMA with a
copy of the results of the compliance inspection. The DPMA shall provide the DPKI
compliance audit results to the PMA of cross-certified PKIs if required by the cross-
certification agreement. These results shall remain confidential.
c. The method and detail of notification of inspection results to PKIs cross-certified with the
DPKI shall be defined within the cross-certification agreement between the two parties.
UK UNCLASSIFIED 63
UK UNCLASSIFIED
c. Audit information shall be protectively marked and, save as provided by law, shall not be
disclosed to anyone for any purpose except to the duly authorised Audit Authority for audit
purposes and the appropriate MoD Security Authority.
d. Save as provided by law, information relating to the DCMA’s management of a Subscriber’s
certificate may only be disclosed to the Subscriber, the duly authorised Audit Authority for
audit purposes or the relevant MoD Security Authority.
9.4 Privacy of Personal Information
a. Personal information used in connection with this DCP shall be dealt with in accordance with
the Data Protection Act 1998 and the Human Rights Act 1998.
b. The DCMA and repositories within the DPKI shall implement and maintain a privacy policy, in
accordance with the Data Protection Act 1998, the Human Rights Act 1998 and the Freedom
of Information Act 2000.
c. A certificate will contain such personal information as is relevant and necessary to effect
secure transactions using the certificate. Such information may include, the following
concerning a Subscriber:
i. Subscriber name
ii. Subscriber organisation
iii. Subscriber e-mail address
iv. Person Unique Identifier
d. Certificates, CRLs and repositories shall not contain any further personal information. If it is
necessary to include any further personal information in a certificate or repository to enable
the DPKI to operate, it will be necessary to obtain the consent of that person to the inclusion
or use of any such further personal information. JSP 440, Part 9 provides guidance on the
procedures to be adopted.
e. All participants shall have a duty to protect all personal information in their possession,
custody or control. Personal information shall not be used or disclosed without the consent of
the owner or as required by law. 21
9.5 Intellectual Property Rights (IPR)
b. Subject to any existing rights of third parties and as otherwise provided in this Section 9.5, all
Intellectual Property Rights, including any database rights and copyright in all certificates,
OIDs, repositories and documents (electronic or otherwise) comprising the DPKI (including
but not limited to this DCP) belong to and are and will remain the property of the Crown.
c. No certificate, OID, repository or document shall be copied, used or dealt with otherwise than
as provided for in this DCP.
d. A certificate applicant retains all rights it has (if any) in any trademark, service mark or trade
name contained in any certificate application and Distinguished Name with any certificate
issued to the certificate applicant. The applicant warrants that in receiving and processing
the applicant’s application, and in issuing any certificate or DPKI documentation, the DPKI
Authorities, the DCMA and their component parts are not infringing any third party intellectual
property rights.
e. Where the DPKI relies upon any pre-existing third party proprietary information, the Crown
will be granted a perpetual irrevocable royalty free licence to use or have used any such
information for DPKI purposes.
21
JSP 440 provides guidance.
UK UNCLASSIFIED 65
UK UNCLASSIFIED
UK UNCLASSIFIED 66
UK UNCLASSIFIED
i. The DPKI Authorities shall have no liability whatsoever in relation to any decision not to issue
a certificate under this DCP to any entity.
j. The DPKI Authorities shall have no liability whatsoever in relation to the revocation of a
certificate issued under this DCP if it is revoked in accordance with this DCP.
k. The DPKI Authorities shall have no liability whatsoever in relation to either (1) a certificate
issued under this DCP, or (2) the associated public/private key pairs, to any entity which has
not used them strictly in accordance with this DCP and any agreements pertaining to their
use.
l. The DPKI Authorities shall have no liability whatsoever in relation to any reliance on either
(1) a certificate issued under this DCP, or (2) the associated public/private key pairs, if at the
time these are relied on the certificate has expired.
m. The DPKI Authorities shall have no liability whatsoever in relation to any reliance on either
(1) a certificate issued under this DCP, or (2) the associated public/private key pairs, if at the
time these are relied on the certificate is identified in the latest revocation information.
n. The DPKI Authorities shall have no liability whatsoever in relation to any reliance on either
(1) a certificate issued under this DCP, or (2) the associated public/private key pairs, if at the
time these are relied on the DCMA should have published the revocation of the certificate in
accordance with this DCP, but has not done so due to reasons beyond its reasonable control
(including the failure of any person to provide any relevant information in accordance with
this DCP).
o. The DPKI Authorities shall have no liability whatsoever in relation to any person's reliance on
either (1) a certificate issued under this DCP, or (2) the associated public/private key pairs,
unless that person has complied fully with this DCP and the Relying Party Agreement.
p. The DPKI Authorities shall have no liability whatsoever in relation to any person's reliance on
either (1) a certificate issued under this DCP, or (2) the associated public/private key pairs,
unless the Subject of that certificate and the Subscriber have both complied fully with this
DCP and the Subscriber Agreement.
q. The DPKI Authorities shall have no liability whatsoever for any loss, damage, costs or
expenses (including legal costs and expenses) which would not have arisen if the Relying
Party had done what a reasonable person would have done in the circumstances.
r. The DPKI Authorities shall have no liability whatsoever for any loss, damage, costs or
expenses (including legal costs and expenses) resulting from the reliance of a Relying Party
of a body which has cross-certified with the DRCA upon a certificate issued under this DCP
or upon the associated public/private key pairs.
s. The total aggregate liability of the DPKI Authorities in connection with a transaction in which
either (1) a certificate issued under this DCP, or (2) the associated public/private key pairs,
have been relied on, is limited to £1,000. If two or more DPKI Authorities would otherwise be
liable for more than this amount, either individually or collectively, they are only liable to pay
this amount between them. For these purposes, a series of connected transactions is
deemed to be a single transaction.
t. The total aggregate liability of the DPKI Authorities to each End Entity in respect of all claims
notified by that End Entity during any one calendar year (running from 1st January to 31st
December) is limited to £10,000. If two or more DPKI Authorities would otherwise be liable
for more than this amount, either individually or collectively, they are only liable to pay this
amount between them.
u. The total aggregate liability of the DPKI Authorities to all claimants in respect of all claims
notified during any one calendar year (running from 1st January to 31st December) is limited
to £100,000. Their liability for each claim shall be apportioned pro rata according to the value
of each claim.
UK UNCLASSIFIED 67
UK UNCLASSIFIED
9.9 Indemnities
9.9.1 Subscriber Indemnities
a. External Subscribers shall and Subscriber Agreements shall require external Subscribers to
compensate a Relying Party which suffers or incurs loss, damage, liability, costs or
expenses as a result of the Subscriber’s breach of this DCP or its negligence (including the
Subscriber’s failure to keep its Private Key private) and to indemnify the DPKI Authorities
against all and any loss, damage, liability, costs and expenses of any kind (including legal
costs and expenses) suffered or incurred by them in connection with any claim brought
against them by a Relying Party.
b. External Subscribers shall, and Subscriber Agreements shall require external Subscribers
to, indemnify the DPKI Authorities against any loss, damage, liability, costs and expenses
of any kind (including legal costs and expenses) that they incur as a result of or arising
from:-
i. any false, inaccurate or misleading information supplied by the Subscriber or its
servants, employees, agents or contractors;
ii. any failure of the Subscriber to disclose any material fact, or any misrepresentation
of any material fact;
iii. failure by the Subscriber to adequately protect the Subscriber’s Private Key, to use a
trustworthy system to ensure the protection of the Private Key, or to take adequate
precautions to prevent the compromise, loss, disclosure, modification or
unauthorised use of the Subscriber’s Private Key – each Subscriber should take
precautions appropriate to the level of threat facing that Subscriber and should
comply with the requirements of this DCP and the guidance provided by the DPMA,
as specified in this DCP;
iv. the Subscriber contravening any applicable laws in the UK and/or the Subscriber’s
country or territory (if not the UK), including but not limited to those relating to
intellectual property rights, use of computer systems, and data protection;
v. any unauthorised or unlawful use of the Subscriber’s Private Key or a certificate by a
Subscriber, its servants, agents, employees or contractors;
vi. any breach of this DCP by a Subscriber, a Subject or a Sponsor.
c. Subscriber Agreements may require an external Subscriber to acknowledge that when the
replacement of a Subscriber’s Private Keys is required, the Subscriber shall be liable for the
cost of replacing such keys and the related certificates.
UK UNCLASSIFIED 68
UK UNCLASSIFIED
9.10.2 Termination
a. This DCP may only be terminated or withdrawn by the DPMA.
UK UNCLASSIFIED 69
UK UNCLASSIFIED
UK UNCLASSIFIED 70
UK UNCLASSIFIED
UK UNCLASSIFIED 71
UK UNCLASSIFIED
Approved The default approval authority for anything related to the DPKI is the DPMA;
other approval authorities are identified by name in DPKI documentation.
ARL Authority Revocation List – a file containing the serial numbers, and
revocation date, of revoked CA certificates. (See CRL).
Asymmetric A cryptographic technique such that an object that has been encrypted
encryption using one key of a key-pair may only be decrypted with the other key of the
key-pair.
Attribute Authority An entity recognised by the DCMA as having the authority to verify the
association of attributes to an identity.
Audit Independent review and examination of records and activities to assess the
adequacy of system controls, to ensure compliance with established
policies and operational procedures, and to recommend necessary changes
in controls, policies, or procedures.
Audit log The repository for records produced as a result of an audit process.
Certificate Status A trusted entity that provides on-line verification to a Relying Party of a
Authority subject certificate's trustworthiness, and may also provide additional
attribute information for the subject certificate.
Certification Authority An authority trusted by one or more users to create and assign certificates.
(CA)
CA facility The collection of equipment, personnel, procedures and structures that are
used by a Certification Authority to perform certificate issuance and
revocation.
UK UNCLASSIFIED 72
UK UNCLASSIFIED
CA server The equipment used in the process of issuing and revoking certificates.
Part of the CA facility.
Certificate chain A series of certificates that are linked together such that the subject of
certificate n is the issuer of the certificate n+1.
Certificate The process of replacing an existing certificate, retaining the existing public
modification key, subject and key usage but changing minor details within the certificate.
Certificate re-key The process of replacing an existing certificate whilst creating a new key-
pair such that the connection between old and new certificates is only the
subject name.
Certificate renewal The process of replacing an existing certificate whilst retaining the existing
public key value and subject name and with an expiry date after that of the
original certificate.
Client (application) A system entity, usually a computer process acting on behalf of a human
user that makes use of a service provided by a server.
CRL Certificate Revocation List – a file containing the serial numbers (and
revocation date) of revoked CA and/or end-entity certificates. (See ARL).
Cryptographic The set of hardware, software, firmware, or some combination thereof that
Module implements cryptographic logic or processes, including cryptographic
algorithms, and is contained within the cryptographic boundary of the
module.
Crypto period Time span during which each key setting remains in effect.
Digital Signature The hash of a data object encrypted using a private key. Where non-
repudiation is required the private key should be under the sole control of a
single entity.
UK UNCLASSIFIED 73
UK UNCLASSIFIED
Dual-use certificate A certificate that is intended for use with both digital signature and data
encryption services.
End-entity The final (lowest) object in a chain of certificates; a Subscriber to a PKI that
is not a CA.
Encryption certificate A certificate containing a public key that is used to encrypt electronic
messages, files, documents, or data transmissions, or to establish or
exchange a session key for these same purposes.
Firewall Gateway that limits access between networks in accordance with local
security policy.
Intellectual property Useful artistic, technical, and/or industrial information, knowledge or ideas
that convey ownership and control of tangible or virtual usage and/or
representation.
Intermediate CA A CA that is located in the path between an end-entity certificate and a trust
anchor.
Hash function An algorithm that computes a fixed size value based on a data object of
arbitrary size.
Key escrow The retention of the private component of the key pair associated with a
subscriber’s encryption certificate to support key recovery.
Key exchange The process of exchanging public keys (and other information) in order to
establish secure communication.
Local Registration A type of Registration Authority with responsibility for a local community.
Authority (LRA)
OCSP Responder A trusted entity that provides on-line revocation status of certificates to
Relying Parties. The OCSP Responder is either explicitly trusted by the
Relying Party, or through a CA that Relying Party trusts, or through the CA
that issued the certificate whose revocation status is being sought.
UK UNCLASSIFIED 74
UK UNCLASSIFIED
Outside threat An unauthorised entity from outside the domain perimeter that has the
potential to harm an Information System through destruction, disclosure,
modification of data, and/or denial of service.
Path A series of certificates that are linked together such that (from the top of the
path) each certificate subject is the issuer of the certificate immediately
below it in the path. See also certificate chain.
Path discovery The process of determining the list (chain) of certificates that lie between an
entity certificate and a trust anchor. This path is influenced by the presence
of multiple constraints indicated in the certificate chain or established by the
initial conditions set in the client.
Path processing Path discovery followed by path validation for a given entity certificate.
Path validation The process of testing each certificate in a path to ensure that it has not
expired or been revoked. The integrity of the issuing CA digital signature is
also tested for each certificate.
PKI Sponsor Fills the role of a subscriber for non-human system components or
organisations that are named as public key certificate subjects, and is
responsible for meeting the obligations of subscribers as defined throughout
this document.
Privacy State in which data and system access is restricted to the intended user
community and target recipient(s).
Private key One key of a key-pair that is used in association with an asymmetric
encryption algorithm. Normally the value of a private key is known, or
accessible, only to a small group of entities (often the group size is 1).
Public key One key of a key-pair that is used in association with an asymmetric
encryption algorithm. Normally the value of a public key is widely
distributed.
Public Key Framework established to issue, distribute, maintain, and revoke public key
Infrastructure (PKI) certificates and their associated key-pairs.
Root CA In a hierarchical PKI, the CA whose public key serves as the trust anchor
for subordinate CAs and end-entities.
Relying Party A person who has received a certificate and a digital signature verifiable
with reference to a public key listed in the certificate, and is in a position to
UK UNCLASSIFIED 75
UK UNCLASSIFIED
rely on them.
Revoke The cancellation of a certificate prior to its expiry; certificates are self-
revoking as they are cancelled once their expiry date has passed.
Risk tolerance The level of risk an entity is willing to assume in order to achieve a potential
desired result.
Server A system entity that provides a service in response to requests from clients.
Signing (signature) A certificate that contains a public key intended for verifying digital
certificate signatures or authenticating the identity of an entity.
Subject The recipient of a certificate; the identity of the entity that knows the value of
a private key that is from the same pair as the public key contained in a
certificate.
Subscriber An entity that (1) is the subject named or identified in a certificate issued to
such an entity, and (2) holds a private key that corresponds to a public key
listed in that certificate.
Superior CA In a hierarchical PKI, a CA who has certified the certificate signing key of a
subordinate CA, and who constrains the activities of that CA.
Trust anchor A public key that is known (trusted) by a Relying Party. The mechanism of
path discovery establishes a trusted path between a certificate and a trust
anchor. A common trust anchor is a self-signed (root) certificate.
Trust list Collection of trusted certificates used by relying parties as trust anchors
during path processing.
Trusted A relationship between a certificate user and a CA in which the user acts
according to the assumption that the CA creates only valid certificates.
Trusted certificate A certificate that is trusted by the relying party on the basis of secure and
authenticated delivery. A trust anchor is contained in a trusted certificate.
UK UNCLASSIFIED 76
UK UNCLASSIFIED
Trusted timestamp A digitally signed assertion by a trusted authority that a specific digital
object existed at a particular time.
Two person control Continuous surveillance and control of positive control material at all times
by a minimum of two authorised individuals, each capable of detecting
incorrect and/or unauthorised procedures with respect to the task being
performed, and each familiar with established security and safety
requirements.
Validation Authority That part of the DCMA responsible for confirming the status of a certificate
(VA) (via OCSP) or providing access to CRLs.
UK UNCLASSIFIED 77
UK UNCLASSIFIED
ANNEXE B: ACRONYMS
ARL Authority Revocation List
CA Certification Authority
CAPS CESG Assisted Products Scheme
CIS Communication and Information Systems
DCMA Certificate Management Authority
DINSA Defence Interoperable Network Services Authority
DPKIPB Defence PKI Programme Board
CP Certificate Policy
CPS Certification Practice Statement
CRL Certificate Revocation List
DCMA Defence Certificate Management Authority
DCP Defence Public Key Infrastructure X.509 Certificate Policy
D-H Diffie-Hellman Key Exchange Algorithm
DII Defence Information Infrastructure
DII(F) Defence Information Infrastructure (Future)
DN Distinguished Name
DPKI Defence Public Key Infrastructure
DPMA Defence Policy Management Authority
DRCA Defence Root Certificate Authority
DTAG DPKI Technical Advisory Group
FIPS Federal Information Processing Standard
FQDN Fully Qualified Domain Name
IETF Internet Engineering Task Force
IPT Integrated Project Team
JSP Joint Services Publication
JSyCC Joint Security Coordination Centre
LRA Local Registration Authority
MOD Ministry of Defence
OCSP Online Certificate Status Protocol
OID Object Identifier
PDS PKI Disclosure Statement
PIN Personal Identification Number
PKCS Public-Key Cryptography Standard
RA Registration Authority
RFC Request For Comment
RP Relying Party
RSA Rivest, Shamir, Adleman (encryption algorithm)
SSL Secure Sockets Layer
TLS Transport Layer Security
UK United Kingdom
VA Validation Authority
UK UNCLASSIFIED 78