Cca Calic
Cca Calic
Cca Calic
Version 2.1
01 April 2024
The CCA issues Licences to Certifying Authorities (CA) under section 24 of the IT Act, after
duly processing their applications as provided for under the Act. A Certifying Authority can
issue Digital Signature Certificates (DSC) only after being duly licensed by the CCA as per
provisions of the IT Act.
The potential CA aspirants should consult & present the business plan, location of facilities,
expertise etc to the Office of CCA before submitting the application & fee, construction of
technical infrastructure etc. The CA Licence application shall be received only after the
satisfactory clearance of the business plan.
Before submitting the application, the CA technical infrastructure of the applicant should be
ready.
Overview of the process followed by the office of CCA on receiving an application for a grant of
license to operate as a CA under the IT Act
Application Form
Eligibility Criteria
The eligibility criteria for becoming a CA shall be as per rule 8 of IT(CA)Rules 2000.
(Annexure III)
Note: In the case of renewal, The condition in the second proviso of 8(b) (ii)&second
proviso of 8(b) will not be applicable
Supporting Documents
Along with the application in the format given in Annexure 2, an applicant has to submit
all the documents that are essential to substantiate the claim for the award of a licence to
operate as a CA. It is the responsibility of the applicant to submit all documents required
under the IT Act, Rules, and Regulations.
(i) Company Profile/Experience of Individuals
(ii) For an individual, proof of capital of Rs. 5 crores or more in his business or
profession
(iii) For a company/firm,
(a) proof of paid-up capital not less than Rs. 5 crores
(b) proof of net worth not less than Rs. 50 crores
(iv) Proof of Equity (Proof that equity share capital held in aggregate by NRIs, FIIs or
foreign companies does not exceed 49% of its capital)
(viii) Original business profile report with certification from the Registrar of
Companies.
(ix) Audited accounts for the past 3 years (if applicable).
(x) The CA’s Certification Practice Statement (CPS) as laid down in Annexure I to
these Guidelines.
(xi) Technical specifications of the CA system and CA security policies, standards,
and infrastructure available/proposed and locations of facilities.
(xii) Information Technology and Security Policy proposed to be followed by the CA
in its operations under rule 19 of IT(CA) rules.
(xiii) Statement addressing the manner in which the CA shall comply with the
requirements stipulated in the IT Act, Rules, and Regulations.
(xiv) The organizational chart and details of all trusted personnel.
(xv) Date by which the applicant will be ready for the audit to start. The application
shall be deemed to have been received on this date for processing purposes.
(xvi) Date by which commencement of CA operations is proposed. Operations can
only commence after due compliance with Rule 20 of IT(CA) rules.
(xvii) An undertaking by the applicant that they will make payment to the Auditor.
The Controller reserves the right to call for any other information that may be required
to process the application.
Note:
The application for a licence to operate as a Certifying Authority, including all
supporting documents, must be submitted in duplicate. These should be in the form of
two identical sets numbered 1 and 2.
CPS
The CA Certification Practice Statement (CPS) should state how the PKI component(s) meet
the assurance requirements. The CA’s Certification Practice Statement (CPS) should be
prepared as per the CPS framework laid down in Annexure I to these Guidelines also in line
with CPS template published on the website of CCA
Information Technology Security Guidelines and Security Guidelines for Certifying Authorities
aimed at protecting the integrity, confidentiality, and availability of service of Certifying
Authority are given in Schedule II and Schedule III respectively. The information on the
physical site can be seen in the CA site preparation Guidelines published on the website.
A license issued to a CA will be subject to terms and conditions under Section 21(3)(c). The
detailed Terms and Conditions are available in Regulation 3 of the Regulations under the IT
Act, 2000.
Processing of an Application
License Issuance
On successful completion of evaluation of the application for grant of Licence with respect to
qualification, expertise, manpower, financial resources other infrastructural facilities, and
legal and regulatory requirements, the CCA will commence the process of issuance of
Licence. Each Licence issued will be accompanied by a public key certificate digitally signed
by the CCA. The licence is valid for a period of five years from the date of its issue and is not
transferable
Information in Licence
Suspension of Licence
Licences can be suspended by the CCA under Section 25 of the IT Act. The CCA
shall suspend a Licence if the CCA has reasons to believe that the CA has
o made a statement in, or in relation to, the application for the issue or renewal
of the licence, which is incorrect or false in material particulars;
o failed to comply with the terms and conditions subject to which the licence
was granted;
o contravened any provisions of the IT Act, Rule, Regulation or orders made
thereunder,
o Failed to maintain the procedures and standards specified in section 30 of
the IT Act.
The licence granted to the persons referred to in clauses (a) to (c) of sub-rule (1) of
rule 8 of IT(CA) rules shall also stand suspended when the performance bond in the
form of banker's guarantee furnished by such persons is invoked under sub-rule (2)
of that rule.
An investigation into the need for suspension will take place which validate the need
for suspension and obtain authorisation for the suspension. On completion of an
investigation into the need for suspension, either the License will be further
suspended or reinstated as valid.
Pending the completion of any inquiry ordered by the CCA during this suspension,
the CA will not issue any certificates.
Revocation of Licence
The licence issued by the CCA can remain suspended for a maximum period of ten working
days. Upon termination or prior to termination of suspension, CCA will determine whether it
should be revoked or reinstated as valid. The Controller or any officer authorised by him on
this behalf shall take up for investigation any contravention of the provisions of this Act, rules
or regulations made thereunder. If on completion of the inquiry, any of the above is
established beyond doubt then the Licence may be revoked by the CCA. An Authorized
signatory of the Licensed CA can also request for revocation
Audit
The overall scope of the audit will be as follows, however, the applicability of the
scope may depend on a fresh Licence or renewal of Licence or yearly audit or
services offered by CA.
(i) Security policy and planning;
(ii) Physical security;
(iii) Technology evaluation;
(iv) Certifying Authority's services administration;
(v) Relevant Certification Practice Statement;
(v) Compliance with relevant Certification Practice Statement;
(vi)Contracts/agreements;
(vii) Regulations prescribed by the Controller;
(ix) Policy requirements of Certifying Authorities Rules, 2000.
(x) Adherence to the IT Act, 2000, the Rules and Regulations thereunder and
Guidelines issued by the Controller from time to time.
(xi) Compliance of Verification method, Services, and DSCsto relevant
Guidelines issued by the Controller based on the sample provided to Auditors
(xiii) The subject matter or specific cases as provided by the Controller
(xiv) Audit with respect to Web trust operating standards.
(xv) Security Evaluation Requirements as per Annexure VI
(xvi) CA Software, and website requirements as per Annexure V
(xvii) Financial Status Verification as per Annexure VIII
The audit report will be submitted to the Controller within 21 days after such audit
and where irregularities are found, the Certifying Authority shall take immediate
appropriate action to remove such irregularities.
In the case of the audit after the cessation of CA operation for a period of seven years,
the availability and usability of records of DSC issuance, CRL generation, and DSC
application forms shall be mandatorily included in the audit apart from other
requirements under IT Act
2. SSL CA
Notwithstanding the requirements mentioned for a Licenced CA, if the CA setup is only
for the purpose of issuance of SSL& code signing certificates, the CPS, CP, manpower,
technical, physical, procedural, and audit requirements of the CA shall be in line with
Webtrust/CAB Forum guidelines to enable enrollment in browser forum guidelines,
however, organizational and financial requirements shall be as per the provisions under
the IT Act.
The application for renewal of the Certifying Authority's licence shall be submitted 45
days before the expiry of the licence. The process for the renewal of the Licence will be
similar to a fresh licence in respect of audit and supporting documents.
The Controller may refuse to grant or renew a licence any of the provisions under IT(CA)
Rules rule 17.
Re-location of CA Site
*****************
ANNEXURE I
CERTIFICATION PRACTICE STATEMENT
The CPS framework given below is based on RFC-2527: Internet X.509 Public
KeyInfrastructure Certificate Policy and Certification Practices Framework. All the
components listed in the framework must be specified in the CPS.
GENERAL PROVISIONS
This component specifies any applicable presumptions on a range of legal and general
practice topics and shall contain,-
(a) Obligations
This sub-component shall contain the type of entity, and the provisions relating to the
entity’s obligations to other entities and may include:
1. Certifying Authority (CA) obligations,
2. Subscriber obligations,
3. Relying party obligations,
4. Repository obligations
(b) Liability
This sub-component shall contain provisions regarding apportionment of liability for
each type of entity such as, -
1. Warranties and limitations on warranties;
2. Kinds of damages covered (e.g., indirect, special, consequential, incidental,
punitive, liquidated damages, negligence and fraud) and disclaimers;
3. Loss limitations (caps) per certificate or per transaction;
4. Other exclusions (e.g., Acts of God, other party responsibilities, etc).
(c) Financial Responsibility
This sub-component shall consist of provisions relating to financial responsibilities
of the Certifying Authority and repository such as:
1. Indemnification of Certifying Authority by relying parties;
2. Fiduciary relationships (or lack thereof) between the various entities;
3. Administrative processes (e.g., accounting, audit, etc.).
(d) Interpretation and Enforcement
This sub-component will contain provisions relating to the interpretation and
enforcement of the Certificate Policy and the Certification Practice Statement and shall
address the following topics:
1. Governing laws;
2. Severability of provisions, survival, merger, and notice; and
3. Dispute resolution procedures.
(e) Fees
This sub-component shall consist of provisions relating to the fees charged by the
Certifying Authorities and repositories such as:
1. Certificate issuance or renewal fees;
2. Certificate access fee;
3. Revocation or status information access fee;
4. Fees for other services such as policy information; and
5. Refund Policy.
Note.-
(i) In respect of issuance, renewal, access, revocation, and status information the
fee structure shall be based on the class of certificate.
(ii) The different classes of certificates issued must be specified.
(iii) The details of Classes are as given in section 1.2 Document Identification of
X.509 Certificate Policy for India PKI. CAs will issue DSCs with assurance
classes only in accordance with the X.509 Certificate Policy for India PKI.
3. Address
A.Residential Address *
Flat/Door/Block No
Name of Premises/Building/Village
Road/Street/Lane/Post Office
Area/Locality/Taluka/Sub-Division
Town/City/District
State/Union Territory Pin
Telephone No
Fax
Mobile Phone No.
B. Office Address *
Name of Office
Flat/Door/Block No.
Name of Premises/Building/Village
Road/Street/Lane/Post Office
Area/Locality/Taluka/Sub-Division
Town/City/District
State/Union TerritoryPin :
Telephone No.
Fax
1. Any Certifying Authority which intends to shift the CA site of its operations, either
Primary site or Disaster Recovery site, must inform the Office of CCA 45 days in advance
(before the proposed date of shifting). The location and address of the new site must be
provided along with the layout plan of the facilities at the proposed site.
2. The selection of the new site by the Certifying Authority should be made keeping in
view the requirements specified in the document ‘CA Site Specification’ published on the
website of CCA. The physical infrastructure at the proposed site will have to be audited by an
Auditor empanelled with the Office of CCA.
3. In-principle approval for the shifting will be provided by the Office of CCA after
receiving a satisfactory report on the audit of physical infrastructure at the proposed site, till
which time operations at the old site should continue.
4. After obtaining in-principle approval from the Office of CCA, shifting of technical
infrastructure will be undertaken. The Certifying Authority must get the audit of the technical
infrastructure at the new site done by an empanelled auditor. The audit report submitted by
the Auditor will be examined by the Office of CCA and after ascertaining compliance,
approval for starting operations at the new site will be given by the Office of CCA to the
Certifying Authority.
5. The shifting and audit of the technical infrastructure at the new site should be
completed in a time frame so as to ensure that the operations at the new site commence
within 45 days of its closure at the old site.
Annexure V
The applicant software provides external access to users. The compliance requirements for
the software are below.
S.NO Control
Compliance(Y/N)
The applicant interface software
1. The verification requirements shall be as per CCA-IVG. The applicant
software should have strictly implemented the functions as mentioned in
the Guidelines issued by CCA
Audit Logs and Evidence requirements
1. The applicant software must generate audit logs for user actions, user
failures, and modifications to the configuration
2. The audit logs shall be secured in the CA facility with physical and system
access controls as required for CA operations.
3. The audit logs should be stored in the CA facility.
4. The audit logs are to be protected for data integrity preferably using Syslog
servers
5. The applicant interface access shall be periodically reviewed.
Session Time Out
1. In the eKYC account creation process, inactivity time limits shall be
enforced. The activity time limits shall be as per the following
1. eSign-based Signature - Immediate
2. eKYC account Information submission - 20 minutes
3. OTP authentication - 5 minutes
4. DSC applicant Login - 20 Minutes
5. Exit upon inactivity - 5 minutes
For the applicable requirements as specified under the Guidelines issued by CCA, the CA
management software is expected to be certified as CC EAL4 or higher in consistent with the
Certificate Issuing and Management Components Protection Profile, Version 1.5. (NIST) or
Protection Profile for Certification Authorities or both. The CAs are encouraged to obtain
Common Criteria EAL4+ certification ASAP. In case the CA software does not have
certification at present, as an interim measure, a security audit of the CA software shall be
carried out as per “4. Security Evaluation Requirements for CA”. The compliance report in
this regard should be made available to the empanelled auditors. The broad areas to be
covered but not limited to the security audit of CA software are below:
S.NO Control
Compliance(Y/N)
1. Security Policy
2. Roles (Administration Officers, Registration Officers, Authentication
Officers )
3. Access Control and Authorization
4. Identification and Authentication
5. Remote Data Entry and Export
6. Key Management: Key Generation, Key Storage, Key Destruction, and
Key Export
7. Cryptographic module requirements
8. Profile Management(Certificate, CRL, OCSP)
9. Certificate applicant data registration
10. Certificate Registration
11. Certificate Preparation
12. Certificate approval
13. Certificate Signing
14. Certificate Activation
15. Certificate storage & delivery
16. Certificate Publication
17. Certificate Revocation
18. Certificate Status Information Provision – OCSP, CRL
19. CA Policy Administration
20. Key Archiving and Recovery
21. PIN Management
22. Audit and Log Review
23. Batch Processing
24. Initial Boot Process
25. Threats(Authorised user threats, System related threats, Cryptography-
related threats, External attacks)
3. Compliance Requirements for the CA Website
CA shall have a dedicated website for the Licenced CA-related requirements. The website
should meet the following requirements
S.NO Control
Compliance(Y/N)
1. CA website shall display current past versions of CPS
2. The repository of CA shall be made available to the public
3. CA website shall provide a direct interface to applicants. CA website
shall make available the direct payment options to the DSC applicants.
4. CA website shall publish CRL and CA certificate details
5. A help desk for subscribers and application owners shall be provided
and the details should be available on the website of CA
6. Contact details & email shall be published on the CA website
7. The website shall provide a Grievance & Redressal interface
8. The certificate fees shall be made available on the website
9. The list of empanelled token providers shall be published by CA on their
website.
10. CA shall provide a certificate search option for a subscriber based on
authentication
11. The website shall provide eKYC account-related information access as
mentioned in the IVG
12. Provision for submitting the certificate revocation request by a
subscriber shall be provided
13. The website should display the list of directors and the authorised
representative details
14. Ensure that no confidential information is available publically through
the CA website
15. Ensure high availability of the CA website at all levels
16. If outsourced, CA shall maintain all agreements related to development
and hoisting.
17. Role-wise access control mechanism implemented for the access to the
website for updation and administration
18. CA shall record the non-availability/hacking/other failure-related
incidents and the same shall be made available to auditors.
Annexure VI
Security Evaluation Requirements for CA
The overall scope of this security evaluation shall include System architecture, Design,
Network, operating system and Software applications (internal & external). Software
application audit includes all the software hosted by the organisation such as CA software,
website, eSign Application, OCSP, Time Stamping, external eKYC interface (UID, Banking,
PAN, GST etc), Mobile Apps, DLL, etc. The only exception is in case CA software and any of
the software is already CC EAL 4+ certified. In case of any change, CA should analyse the
impact due to change(s) and get a security evaluation concerning the applicable area where
there is a significant impact due to the change.
The final audit report shall contain the status of every round of testing/audit and also the final
status after the remedial action taken by CAs. These remedial actions shall be verified and
accepted by the auditor. A maximum of 10 calendar days shall be permitted for remedial
action. The auditor shall submit its report within 30 days of the initiation of the audit. Any
subsequent closure of the audit observation shall be verified by the auditor before submitting
it to the Office of CCA.
Annexure VII
Conditions for Appointment of Auditor
1. For annual audits, CAs shall not be allowed to engage the same auditor in
consecutive years. However, there is no restriction in other types of audits related to
pre-licence audit, Site shifting, enabling new eKYC mode, ESP empanelment,
Infrastructure change(hardware, software, application, new DR site) etc
3. Cert-in/STQC empanelled auditors shall carry out the annual security audit as per the
scope mentioned in Annexure VI
4. The annual audit and security audit shall not be carried out by the same audit
agencies.
5. In case the auditor firm is engaged in any manner in respect of the set-up of CA,
then the same auditor shall not audit the CA for the next 3 years.
6. In the case of the CA internal audit by an empanelled auditor, the same auditor shall
not be allowed to perform the annual audit of that CA in the same year.
7. The auditor should provide an undertaking for compliance with these conditions at
the time of submitting the annual audit report.
Annexure VIII
Financial Status Verification
The financial status verification shall be carried out by the qualified resource of the
empanelled auditor or the agency nominated by CCA
* ****