[To be published in the Gazette of India, Extraordinary, Part II, Section 3, Sub-section (i)]
Government of India
Ministry of Information Technology
New Delhi, the 17th October, 2000
NOTIFICATION
G.S.R 789(E) In exercise of the powers conferred by section 87 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules regulating the application and other guidelines for Certifying Authorities, namely:-
Short
title and commencement.- (1) These Rules may be called Information Technology
(Certifying Authorities) Rules, 2000.
(2)They shall come into force on the date of their publication in the Official
Gazette.
Definitions.- In these Rules, unless the context otherwise requires,
(m) words and expressions used herein and not defined but defined in Schedule-IV shall have the meaning respectively assigned to them in that schedule.
The manner in which information be authenticated by means of Digital Signature.- A Digital Signature shall,-
(a) be created and verified by cryptography that concerns itself with transforming electronic record into seemingly unintelligible forms and back again;
(b) use what is known as "Public Key Cryptography", which employs an algorithm using two different but mathematical related "keys" one for creating a Digital Signature or transforming data into a seemingly unintelligible form, and another key for verifying a Digital Signature or returning the electronic record to original form,
the process termed as hash function shall be used in both creating and verifying a Digital Signature.
Explanation: Computer equipment and software utilizing two such keys are often termed as "asymmetric cryptography".
Creation of Digital Signature.- To sign an electronic record or any other item of information, the signer shall first apply the hash function in the signers software; the hash function shall compute a hash result of standard length which is unique (for all practical purposes) to the electronic record; the signers software transforming the hash result into a Digital Signature using signers private key; the resulting Digital Signature shall be unique to both electronic record and private key used to create it; and the Digital Signature shall be attached to its electronic record and stored or transmitted with its electronic record.
Verification of Digital Signature.- The verification of a Digital Signature shall be accomplished by computing a new hash result of the original electronic record by means of the hash function used to create a Digital Signature and by using the public key and the new hash result, the verifier shall check-
- the signers private key was used to digitally sign the electronic record, which is known to be the case if the signers public key was used to verify the signature because the signers public key will verify only a Digital Signature created with the signers private key; and
- the electronic record was unaltered, which is known to be the case if the hash result computed by the verifier is identical to the hash result extracted from the Digital Signature during the verification process.
Standards.-The Information Technology (IT) architecture for Certifying Authorities may support open standards and accepted de facto standards; the most important standards that may be considered for different activities associated with the Certifying Authoritys functions are as under:
The product | The standard |
Public Key Infrastructure | PKIX |
Digital
Signature Certificates
and Digital Signature revocation list |
X.509. version 3 certificates as specified in ITU RFC 1422 |
Directory (DAP and LDAP) | X500 for publication of certificates and Certification Revocation Lists (CRLs) |
Database Management Operations | Use of generic SQL |
Public Key algorithm | DSA and RSA |
Digital Hash Function | MD5 and SHA-1 |
RSA Public Key Technology | PKCS#1
RSA Encryption Standard (512, 1024, 2048 bit)
PKCS#5 Password Based Encryption Standard PKCS#7 Cryptographic Message Syntax standard PKCS#8 Private Key Information Syntax standard PKCS#9 Selected Attribute Types PKCS#10 RSA Certification Request PKCS#12 Portable format for storing/transporting a users private keys and certificates |
Distinguished name | X.520 |
Digital Encryption and Digital Signature | PKCS#7 |
Digital Signature Request Format | PKCS#10 |
Digital Signature Certificate Standard.- All Digital Signature Certificates issued by the Certifying Authorities shall conform to ITU X.509 version 3 standard as per rule 6 and shall inter alia contain the following data, namely:-
Licensing of Certifying Authorities.- (1) The following persons may apply for grant of a licence to issue Digital Signature Certificates, namely :-
(i)paid up capital of not less than five crores of rupees; and
(ii) net worth of not less than fifty crores of rupees:
Provided that no company in which the equity share capital held in aggregate by the Non-resident Indians, Foreign Institutional Investors, or foreign companies, exceeds forty-nine per cent of its capital, shall be eligible for grant of licence:
Provided further that in a case where the company has been registered under the Companies Act, 1956 (1 of 1956) during the preceding financial year or in the financial year during which it applies for grant of licence under the Act and whose main object is to act as Certifying Authority, the net worth referred to in sub-clause (ii) of this clause shall be the aggregate net worth of its majority shareholders holding at least 51% of paid equity capital, being the Hindu Undivided Family, firm or company:
Provided also that the majority shareholders referred to in the second proviso shall not include Non-resident Indian, foreign national, Foreign Institutional Investor and foreign company:
Provided also that the majority shareholders of a company referred to in the second proviso whose net worth has been determined on the basis of such majority shareholders, shall not sell or transfer its equity shares held in such company-
(i) unless such a company acquires or has its own net worth of not less than fifty crores of rupees;
(ii) without prior approval of the Controller;
Provided that no firm, in which the capital held in aggregate by any Non-resident Indian, and foreign national, exceeds forty-nine per cent of its capital, shall be eligible for grant of licence:
Provided further that in a case where the firm has been registered under the Indian Partnership Act, 1932 (9 of 1932) during the preceding financial year or in the financial year during which it applies for grant of licence under the Act and whose main object is to act as Certifying Authority, the net worth referred to in sub-clause (ii) of this clause shall be the aggregate net worth of all of its partners:
Provided also that the partners referred to in the second proviso shall not include Non-resident Indian and foreign national:
Provided also that the partners of a firm referred to in the second proviso whose net worth has been determined on the basis of such partners, shall not sell or transfer its capital held in such firm-
(i) unless such firm has acquired or has its own net worth of not less than fifty crores of rupees;
(ii) without prior approval of the Controller;
(d) Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments.
Explanation.- For the purpose of this rule,-
(2) The applicant being an individual, or a company, or a firm under sub-rule (1), shall submit a performance bond or furnish a bankers guarantee from a scheduled bank in favour of the Controller in such form and in such manner as may be approved by the Controller for an amount of not less than five crores of rupees and the performance bond or bankers guarantee shall remain valid for a period of six years from the date of its submission:
Provided that the company and firm referred to in the second proviso to clause (b) and the second proviso to clause (c) of sub-rule (1) shall submit a performance bond or furnish a bankers guarantee for ten crores of rupees:
Provided further that nothing in the first proviso shall apply to the company or firm after it has acquired or has its net worth of fifty crores of rupees.
(3) Without prejudice to any penalty which may be imposed or prosecution may be initiated for any offence under the Act or any other law for the time being in force, the performance bond or bankers guarantee may be invoked
- when the Controller has suspended the licence under sub-section (2) of section 25 of the Act; or
- for payment of an offer of compensation made by the Controller; or
- for payment of liabilities and rectification costs attributed to the negligence of the Certifying Authority, its officers or employees; or
- for payment of the costs incurred in the discontinuation or transfer of operations of the licensed Certifying Authority, if the Certifying Authority's licence or operations is discontinued; or
- any other default made by the Certifying Authority in complying with the provisions of the Act or rules made thereunder.
Explanation.- "transfer of operation" shall have the meaning assigned to it in clause (47) of section 2 of the Income-tax Act, 1961 (43 of 1961).
Location of the Facilities.-The infrastructure associated with all functions of generation, issue and management of Digital Signature Certificate as well as maintenance of Directories containing information about the status, and validity of Digital Signature Certificate shall be installed at any location in India.
Submission of Application.- Every application for a licensed Certifying Authority shall be made to the Controller,-
Fee.-
(1) The application for the grant of a licence shall be accompanied
by a non-refundable fee of twenty-five thousand rupees payable by a bank
draft or by a pay order drawn in the name of the Controller.
(2) The application submitted to the Controller for renewal of Certifying
Authoritys licence shall be accompanied by a non-refundable fee of
five thousand rupees payable by a bank draft or by a pay order drawn in
the name of the Controller.
(3) Fee or any part thereof shall not be refunded if the licence is suspended
or revoked during its validity period.
Cross
Certification.- (1) The licensed Certifying Authority shall have arrangement
for cross certification with other licensed Certifying Authorities within
India which shall be submitted to the Controller before the commencement
of their operations as per rule 20:
Provided that any dispute arising as a result of any such arrangement between
the Certifying Authorities; or between Certifying Authorities or Certifying
Authority and the Subscriber, shall be referred to the Controller for arbitration
or resolution.
(2) The arrangement for Cross Certification by the licensed Certifying Authority
with a Foreign Certifying Authority along with the application, shall be
submitted to the Controller in such form and in such manner as may be provided
in the regulations made by the Controller; and the licensed Certifying Authority
shall not commence cross certification operations unless it has obtained
the written or digital signature approval from the Controller.
Validity
of licence.- (1) A licence shall be valid for a period of five years
from the date of its issue.
(2) The licence shall not be transferable.
Suspension
of Licence.- (1) The Controller may by order suspend the licence
in accordance with the provisions contained in sub-section (2) of section
25 of the Act.
(2) The licence granted to the persons referred to in clauses (a) to (c)
of sub-rule (1) of rule 8 shall stand suspended when the performance bond
submitted or the bankers guarantee furnished by such persons is invoked
under sub-rule (2) of that rule.
Renewal
of licence.- (1) The provisions of rule 8 to rule 13, shall apply in
the case of an application for renewal of a licence as it applies to a fresh
application for licensed Certifying Authority.
(2) A Certifying Authority shall submit an application for the renewal of
its licence not less than forty-five days before the date of expiry of the
period of validity of licence.
(3) The application for renewal of licence may be submitted in the form
of electronic record subject to such requirements as the Controller may
deem fit.
Issuance
of Licence.- (1) The Controller may, within four weeks from the date
of receipt of the application, after considering the documents accompanying
the application and such other factors, as he may deem fit, grant or renew
the licence or reject the application:
Provided that in exceptional circumstances and for reasons to be recorded
in writing, the period of four weeks may be extended to such period, not
exceeding eight weeks in all as the Controller may deem fit.
(2) If the application for licensed Certifying Authority is approved, the
applicant shall -
Refusal of Licence.- The Controller may refuse to grant or renew a licence if-
(i)The Certifying Authority shall formulate its Information Technology and Security Policy for operation complying with these guidelines and submit it to the Controller before commencement of operation:
(ii)Provided that any change made by the Certifying Authority in the Information Technology and Security Policy shall be submitted by it within two weeks to the Controller.
Commencement of Operation by Licensed Certifying Authorities.- The licensed Certifying Authority shall commence its commercial operation of generation and issue of Digital Signature only after -
(a) it has confirmed to the Controller the adoption of Certification Practice Statement;
(b) it has generated its key pair, namely, private and corresponding public key, and submitted the public key to the Controller;
(a) give notice to the Controller of its intention to cease acting as a Certifying Authority:
Provided that the notice shall be made ninety days before ceasing to act as a Certifying Authority or ninety days before the date of expiry of licence;
(b) advertise sixty days before the expiry of licence or ceasing to act as Certifying Authority, as the case may be, the intention in such daily newspaper or newspapers and in such manner as the Controller may determine;
(c) notify its intention to cease acting as a Certifying Authority to the subscriber and Cross Certifying Authority of each unrevoked or unexpired Digital Signature Certificate issued by it :
Provided that the notice shall be given sixty days before ceasing to act as a Certifying Authority or sixty days before the date of expiry of unrevoked or unexpired Digital Signature Certificate, as the case may be;
(d) the notice shall be sent to the Controller, affected subscribers and Cross Certifying Authorities by digitally signed e-mail and registered post;
(e) revoke all Digital Signature Certificates that remain unrevoked or unexpired at the end of the ninety days notice period, whether or not the subscribers have requested revocation;
(f) make a reasonable effort to ensure that discontinuing its certification services causes minimal disruption to its subscribers and to persons duly needing to verify digital signatures by reference to the public keys contained in outstanding Digital Signature Certificates;
(g) make reasonable arrangements for preserving the records for a period of seven years;
(h) pay reasonable restitution (not exceeding the cost involved in obtaining the new Digital Signature Certificate) to subscribers for revoking the Digital Signature Certificates before the date of expiry;
(i) after the date of expiry mentioned in the licence, the Certifying Authority shall destroy the certificatesigning private key and confirm the date and time of destruction of the private key to the Controller.
Database of Certifying Authorities.- The Controller shall maintain a database of the disclosure record of every Certifying Authority, Cross Certifying Authority and Foreign Certifying Authority, containing inter alia the following details:
Digital Signature Certificate.- The Certifying Authority shall, for issuing the Digital Signature Certificates, while complying with the provisions of section 35 of the Act, also comply with the following, namely:-
(a) the Digital Signature Certificate shall be issued only after a Digital Signature Certificate application in the form provided by the Certifying Authority has been submitted by the subscriber to the Certifying Authority and the same has been approved by it:
Provided that the application Form contains, inter alia, the particulars given in the modal Form given in Schedule-IV;
(b) no interim Digital Signature Certificate shall be issued;
(c) the Digital Signature Certificate shall be generated by the Certifying Authority upon receipt of an authorised and validated request for:-
(i) new Digital Signature Certificates;
(ii) Digital Signature Certificates renewal;
(d) the Digital Signature Certificate must contain or incorporate, by reference such information, as is sufficient to locate or identify one or more repositories in which revocation or suspension of the Digital Signature Certificate will be listed, if the Digital Signature Certificate is suspended or revoked;
(e) the subscriber identity verification method employed for issuance of Digital Signature Certificate shall be specified in the Certification Practice Statement and shall be subject to the approval of the Controller during the application for a licence;
Issue of Digital Signature Certificate.- Before the issue of the Digital Signature Certificate, the Certifying Authority shall:-
- confirm that the users name does not appear in its list of compromised users;
- comply with the procedure as defined in his Certification Practice Statement including verification of identification and/or employment;
- comply with all privacy requirements;
- obtain a consent of the person requesting the Digital Signature Certificate, that the details of such Digital Signature Certificate can be published on a directory service.
Archival of Digital Signature Certificate.- A Certifying Authority shall archive -
for a minimum period of seven years or for a period in accordance with legal requirement.
Compromise
of Digital Signature Certificate.- Digital Signature Certificates in
operational use that become compromised shall be revoked in accordance with
the procedure defined in the Certification Practice Statement of Certifying
Authority.
Explanation : Digital Signature Certificates shall,-
(a) be deemed to be compromised where the integrity of:-
(i) the private key associated with the Digital Signature Certificate is in doubt;
(ii) the Digital Signature Certificate owner is in doubt, as to the use, or attempted use of his key pairs, or otherwise, for malicious or unlawful purposes;
(b) remain in the compromised state for only such time as it takes to arrange for revocation.
Revocation of Digital Signature Certificate.- (1) Digital Signature Certificate shall be revoked and become invalid for any trusted use, where -
(2) The revoked Digital Signature Certificate shall be added to the Certificate Revocation List (CRL).
Fees
for issue of Digital Signature Certificate.- (1) The Certifying Authority
shall charge such fee for the issue of Digital Signature Certificate as
may be prescribed by the Central Government under sub-section (2) of section
35 of the Act.
(2) Fee may be payable in respect of access to Certifying Authoritys
X.500 directory for certificate downloading. Where fees are payable, Certifying
Authority shall provide an up-to-date fee schedule to all its subscribers
and users, this may be done by publishing fee schedule on a nominated website.
(3) Fees may be payable in respect of access to Certifying Authoritys
X.500 directory service for certificate revocation or status information.
Where fees are payable, Certifying Authority shall provide an up-to-date
fee schedule to all its subscribers and users, this may be done by publishing
the fee schedule on a nominated website.
(4) No fee is to be levied for access to Certification Practice Statement
via Internet. A fee may be charged by the Certifying Authority for providing
printed copies of its Certification Practice Statement.
Audit.- (1) The Certifying Authority shall get its operations audited annually by an auditor and such audit shall include inter alia,-
(2) The Certifying Authority shall conduct,-
(a) half yearly audit of the Security Policy, physical security and planning of its operation;
(b) a quarterly audit of its repository.
(3) The Certifying Authority shall submit copy of each audit report to the Controller within four weeks of the completion of such audit and where irregularities are found, the Certifying Authority shall take immediate appropriate action to remove such irregularities.
Auditors
relationship with Certifying Authority.- (1) The auditor shall be independent
of the Certifying Authority being audited and shall not be a software or
hardware vendor which is, or has been providing services or supplying equipment
to the said Certifying Authority.
(2) The auditor and the Certifying Authority shall not have any current
or planned financial, legal or other relationship, other than that of an
auditor and the audited party.
Access
to Confidential Information.- (1) Access to confidential information
by Certifying Authoritys operational staff shall be on a "need-to-know"
and "need-to-use" basis.
(2) Paper based records, documentation and backup data containing all confidential
information as prescribed in rule 33 shall be kept in secure and locked
container or filing system, separately from all other records.
(3) The confidential information shall not be taken out of the country except
in a case where a properly constitutional warrant or other legally enforceable
document is produced to the Controller and he permits to do so.
SCHEDULE-I
[See rule 10]
Form for Application for grant of Licence to be a Certifying Authority
For Individual
1. Full Name *
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
2. Have you ever been known by any other name? If Yes,
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
3. Address
A. Residential Address *
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________________________
State/Union Territory __________________ Pin : __________ Telephone No. ___________________________________
Fax ___________________________________
Mobile Phone No. ___________________________________
B. Office Address *
Name of Office ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________________________
State/Union Territory __________________ Pin : __________
Telephone No. ___________________________________
Fax ___________________________________
4. Address for Communication * Tick Ö as applicable A or B
5. Fathers Name *
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
6. Sex * (For Individual Applicant only) Tick Ö as applicable : Male / Female
7. Date of Birth (dd/mm/yyyy) * --/--/----
8. Nationality * ___________________________________
9. Credit Card Details
Credit Card Type ___________________________________
Credit Card No. ___________________________________
Issued By ___________________________________
10. E-mail Address ___________________________________
11. Web URL address ___________________________________
12. Passport Details #
Passport No. ___________________________________
Passport issuing authority ___________________________________
Passport expiry date (dd/mm/yyyy) --/--/----
13. Voters Identity Card No. # ___________________________________
14. Income Tax PAN no. # ___________________________________
15. ISP Details
ISP Name * ___________________________________
ISPs Website Address, if any ___________________________________
Your User Name at ISP, if any ___________________________________
16. Personal Web page URL address, if any ___________________________________
17. Capital in the business or profession * Rs. ________________________________
(Attach documentary proof)
For Company /Firm/Body of Individuals/Association of Persons/ Local Authority
18. Registration Number * ___________________________________
19. Date of Incorporation/Agreement/Partnership * --/--/----
20. Particulars of Business, if any: *
Head Office ___________________________________
Name of Office ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ______________________ Pin _________
State/Union Territory ___________________________________
Telephone No. ___________________________________
Fax ___________________________________
Web page URL address, if any ___________________________________
No. of Branches ___________________________________
Nature of Business ___________________________________
___________________________________
21. Income Tax PAN No.* ___________________________________
22. Turnover in the last financial year Rs. ________________________________
23. Net worth * Rs. ________________________________
(Attach documentary proof)
24. Paid up Capital * Rs. ________________________________
(Attach documentary proof)
25. Insurance Details
Insurance Policy No.* ___________________________________
Insurer Company * ___________________________________
26. Names, Addresses etc. of Partners/Members/Directors (For Information about more persons, please add separate sheet(s) in the format given in the next page) *
No. of Partners/Members/Directors ___________________________________
Details of Partners/Members/Directors
A. Full Name
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
B. Address
Flat/Door/Block No. ________________________________
Name of Premises/Building/Village ________________________________
Road/Street/Lane/Post Office ________________________________
Area/Locality/Taluka/Sub-Division ________________________________
Town/City/District ________________________________
State/Union Territory Pin ________________________________
Telephone No. ________________________________
Fax No. ________________________________
Mobile Phone No. ________________________________
C. Nationality ________________________________
In case of foreign national, Visa details_______________________________
D. Passport Details #
Passport No. ___________________________________
Passport issuing authority ___________________________________
Passport expiry date ___________________________________
E. Voters Identity Card No. # ___________________________________
F. Income Tax PAN no. # ___________________________________
G. E-mail Address ___________________________________
H. Personal Web page URL, if any ___________________________________
27. Authorised Representative *
Name ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________ Pin ____________
State/Union Territory ___________________________________
Telephone No. ___________________________________
Fax ___________________________________
Nature of Business ___________________________________
For Government Ministry/Department/Agency/Authority
28. Particulars of Organisation: *
Name of Organisation ___________________________________
Administrative Ministry/Department ___________________________________
Under State/Central Government ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ____________________ Pin __________
State/Union Territory ___________________________________
Telephone No. ___________________________________
Fax No. ___________________________________
Web page URL Address ___________________________________
Name of the Head of Organisation ___________________________________
Designation ___________________________________
E-mail Address ___________________________________
29. Bank Details
Bank Name * ___________________________________
Branch * ___________________________________
Bank Account No. * ___________________________________
Type of Bank Account * ___________________________________
30. Whether bank draft/pay order for licence fee enclosed * : Y / N If yes,
Name of Bank ________________________________
Draft/pay order No. ________________________________
Date of Issue ________________________________
Amount ________________________________
31. Location of facility in India for generation
of Digital Signature Certificate * ________________________________
32. Public Key @ ________________________________
33. Whether undertaking for Bank Guarantee/Performance Bond attached * : Y / N
(Not applicable if the applicant is a Government Ministry/Department/Agency/ Authority)
34. Whether Certification Practice Statement is enclosed * : Y / N
35. Whether certified copies of business registration document are enclosed : Y / N
(For Company/ Firm/ Body of Individuals/ Association of Persons/ Local Authority)
If yes, the documents attached:
36. Any other information _________________________________
_________________________________
_________________________________
Date Signature of the Applicant
_____________________________________________________________________________
Instructions : 1. Columns marked with * are mandatory.
2. For the columns marked with #, details for at least one is mandatory.
3. Column No. 1 to 17 are to be filled up by individual applicant.
SCHEDULE-II
[See rule 19(2)]
Information Technology (IT) Security Guidelines
Index
Page |
|||
1. |
Introduction . . |
27 |
|
2. |
Implementation of an Information Security Programme ... |
27 |
|
3. |
Information Classification .. |
28 |
|
4. |
Physical and Operational Security .. |
30 |
|
4.1 |
Site Design . . . |
30 |
|
4.2 |
Fire Protection . |
31 |
|
4.3 |
Environmental Protection . . |
31 |
|
4.4 |
Physical Access . . |
32 |
|
5. |
Information Management . .. |
33 |
|
5.1 |
System Administration . .. |
33 |
|
5.2 |
Sensitive Information Control . ... |
34 |
|
5.3 |
Sensitive Information Security . . |
35 |
|
5.4 |
Third Party Access . . |
35 |
|
5.5 |
Prevention of Computer Misuse . .. |
36 |
|
6. |
System integrity and security measures .. . |
36 |
|
6.1 |
Use of Security Systems or Facilities . . |
36 |
|
6.2 |
System Access Control . . |
37 |
|
6.3 |
Password Management . |
38 |
|
6.4 |
Privileged Users Management . |
39 |
|
6.5 |
Users Account Management . ... |
39 |
|
6.6 |
Data and Resource Protection . . |
40 |
|
7. |
Sensitive Systems Protection . .. |
41 |
|
8. |
Data Centre Operations Security . |
41 |
|
8.1 |
Job Scheduling . . .. |
41 |
|
8.2 |
System Operations Procedure . . |
41 |
|
8.3 |
Media Management . . . |
42 |
|
8.4 |
Media Movement . . .. |
42 |
|
9. |
Data Backup and Off-site Retention . ... |
43 |
|
10. |
Audit Trails and Verification . . |
44 |
|
11. |
Measures to Handle Computer Virus . . |
45 |
|
12. |
Relocation of Hardware and Software . |
46 |
|
13. |
Hardware and Software Maintenance . |
46 |
|
14. |
Purchase and Licensing of Hardware and Software .. |
47 |
|
15. |
System Software . . . .. |
48 |
|
16. |
Documentation Security . .. . |
49 |
|
17. |
Network Communication Security . .. |
49 |
|
18. |
Firewalls . . |
50 |
|
19. |
Connectivity . . |
51 |
|
20. |
Network Administrator.. . . . . |
51 |
|
21. |
Change Management . .. .. |
52 |
|
21.1 |
Change Control . . . |
52 |
|
21.2 |
Testing of Changes to Production System . |
52 |
|
21.3 |
Review of Changes . . . |
53 |
|
22. |
Problem Management and Reporting . |
53 |
|
23. |
Emergency Preparedness . . |
53 |
|
24. |
Contingency Recovery Equipment and Services ... |
54 |
|
25. |
Security Incident Reporting and Response .. |
54 |
|
26. |
Disaster Recovery/Management .. . . |
54 |
Information Technology (IT) Security Guidelines
1. Introduction
This document provides guidelines for the implementation and management of Information Technology Security. Due to the inherent dynamism of the security requirements, this document does not provide an exact template for the organizations to follow. However, appropriate suitable samples of security process are provided for guidelines. It is the responsibility of the organizations to develop internal processes that meet the guidelines set forth in this document.
The following words used in the Information Technology Security Guidelines shall be interpreted as follows:
2. Implementation of an Information Security Programme
Successful implementation of a meaningful Information Security Programme rests with the support of the top management. Until and unless the senior managers of the organization understand and concur with the objectives of the information security programme its ultimate success is in question.
The Information Security Programme should be broken down into specific stages as follows:
The principal task of the security implementation is to define the responsibilities of persons within the organization. The implementation should be based on the general principle that the person who is generating the information is also responsible for its security. However, in order to enable him to carry out his responsibilities in this regard, proper tools, and environment need to be established.
When different pieces of information at one level are integrated to form higher value information, the responsibility for its security needs also should go up in the hierarchy to the integrator and should require higher level of authority for its access. It should be absolutely clear with respect to each information as to who is its owner, its custodian, and its users. It is the duty of the owner to assign the right classification to the information so that the required level of security can be enforced. The custodian of information is responsible for the proper implementation of security guidelines and making the information available to the users on a need to know basis.
3. Information Classification
Information assets must be classified according to their sensitivity and their importance to the organization. Since it is unrealistic to expect managers and employees to maintain absolute control over all information within the boundaries of the organization, it is necessary to advise them on which types of information are considered more sensitive, and how the organization would like the sensitive information handled and protected. Classification, declassification, labeling, storage, access, destruction and reproduction of classified data and the administrative overhead this process will create must be considered. Failure to maintain a balance between the value of the information classified and the administrative burden the classification system places on the organization will result in long-term difficulties in achieving success.
Confidential is that classification of information of which unauthorized disclosure/use could cause serious damage to the organization, e.g. strategic planning documents.
Restricted is that classification of information of which unauthorized disclosure/use would not be in the best interest of the organization and/or its customers, e.g. design details, computer software (programs, utilities), documentation, organization personnel data, budget information.
Internal use is that classification of information that does not require any degree of protection against disclosure within the company, e.g. operating procedures, policies and standards inter office memorandums.
Unclassified is that classification of information that requires no protection against disclosure e.g. published annual reports, periodicals.
While the above classifications are appropriate for a general organization view point, the following classifications may be considered :
Top Secret: It shall be applied to information unauthorized disclosure of which could be expected to cause exceptionally grave damage to the national security or national interest. This category is reserved for Nations closest secrets and to be used with great reserve.
Secret: This shall be applied to information unauthorized disclosure of which could be expected to cause serious damage to the national security or national interest or cause serious embarrassment in its functioning. This classification should be used for highly important information and is the highest classification normally used.
Confidentiality: This shall be applied to information unauthorized disclosure of which could be expected to cause damage to the security of the organisation or could be prejudicial to the interest of the organisation, or could affect the organisation in its functioning. Most information will on proper analysis be classified no higher than confidential.
Restricted: This shall be applied to information which is essentially meant for official use only and which would not be published or communicated to anyone except for official purpose.
Unclassified: This is the classification of information that requires no protection against disclosure.
4. Physical and Operational Security
4.1 Site Design
4.2 Fire Protection
4.3 Environmental Protection
4.4 Physical Access
5. Information Management
5.1 System Administration
5.2 Sensitive Information Control
5.3 Sensitive Information Security
5.4 Third Party Access
5.5 Prevention of Computer Misuse
6. System integrity and security measures
6.1 Use of Security Systems or Facilities
6.2 System Access Control
6.3 Password Management
(1) Certain minimum quality standards for password shall be enforced. The quality level shall be increased progressively. The following control features shall be implemented for passwords:
6.4 Privileged Users Management
6.5 Users Account Management
(i) when an individual is on extended leave or inactive use of over thirty days. In case of protected computer system, the limit of thirty days may be reduced to fifteen days by the System Administrator.
(ii) immediately upon the termination of the services of an individual.
(iii) suspended or inactive accounts shall be deleted after a two months period. In case of protected computer systems, the limit of two months may be reduced to one month.
6.6 Data and Resource Protection
(i) Define user authority and enforce access control to data within the computer system;
(ii) Be capable of specifying, for each named individual, a list of named data objects (e.g. file, programme) or groups of named objects, and the type of access allowed.
7. Sensitive Systems Protection
8. Data Centre Operations Security
8.1 Job Scheduling
8.2 System Operations Procedure
8.3 Media Management
8.4 Media Movement
9. Data Backup and Off-site Retention
10. Audit Trails and Verification
(i) Significant computer system events (e.g. configuration updates, system crashes)
(ii) Security profile changes
(iii) Actions taken by computer operations, system administrators, system programmers, and/or security administrators
11. Measures to Handle Computer Virus
(1) Responsibilities and duties shall be assigned to ensure that all file servers and personal computers are equipped with up-to-date virus protection and detection software.
(2) Virus detection software must be used to check storage drives both internal and external to the system on a periodic basis.
(3) All diskettes and software shall be screened and verified by virus detection software before being loaded onto the computer system. No magnetic media like tape cartridge, floppies etc. brought from outside shall be used on the data, file, PKI or computer server or personal computer on Intranet and Internet without proper screening and verification by virus detection software.
(4) A team shall be designated to deal with reported or suspected incidents of computer virus. The designated team shall ensure that latest version of anti-virus software is loaded on all data, file, PKI servers and personal computers.
(5) Procedures shall be established to limit the spread of viruses to other organization information assets. Such procedures inter alia shall include:
(6) An awareness and training programme shall be established to communicate virus protection practices, available controls, areas of high risk to virus infection and responsibilities.
12. Relocation of Hardware and Software
Whenever computers or computer peripherals are relocated (e.g. for maintenance, installation at different sites or storage), the following guidelines shall apply:
13. Hardware and Software Maintenance
Whenever, the hardware and software maintenance of the computer or computer network is being carried out, the following should be considered:
14. Purchase and Licensing of Hardware and Software
15. System Software
16. Documentation Security
17. Network Communication Security
18. Firewalls
19. Connectivity
20. Network Administrator
21. Change Management
21.1 Change Control
21.2 Testing Of Changes To Production System
21.3 Review Of Changes
22. Problem Management and Reporting
23. Emergency Preparedness
24. Contingency Recovery Equipment and Services
25. Security Incident Reporting and Response
26. Disaster Recovery/Management
(1) Disaster recovery plan shall be developed, properly documented, tested and maintained to ensure that in the event of a failure of the information system or destruction of the facility, essential level of service will be provided. The disaster recovery framework should include:
(a) emergency procedures, describing the immediate action to be taken in case of a major incident
(b) fall back procedure, describing the actions to be taken to relocate essential activities or support services to a backup site
(c) restoration procedures, describing the action to be taken to return to normal operation at the original site
(2) The documentation should include:
SCHEDULE-III
[See rule 19(2)]
Security Guidelines for Certifying Authorities
Index
Page |
|||
1. |
Introduction . |
57 |
|
2. |
Security Management |
57 |
|
3. |
Physical controls site location, construction and physical access |
57 |
|
4. |
Media Storage . |
60 |
|
5. |
Waste Disposal .. |
60 |
|
6. |
Off-site Backup .. |
60 |
|
7. |
Change and Configuration Management |
60 |
|
8. |
Network and Communications Security . |
61 |
|
9. |
System Security Audit Procedures . |
61 |
|
9.1 |
Types of event recorded .. .. |
61 |
|
9.2 |
Frequency of Audit Log Monitoring .. . |
63 |
|
9.3 |
Retention Period for Audit Log .. . |
63 |
|
9.4 |
Protection of Audit Log .. .. |
63 |
|
9.5 |
Audit Log Backup Procedures |
64 |
|
9.6 |
Vulnerability Assessments .. |
64 |
|
10. |
Records Archival. .. |
64 |
|
11. |
Compromise and Disaster Recovery |
65 |
|
11.1 |
Computing Resources, Software and/or Data are Corrupted .. .. |
65 |
|
11.2 |
Secure facility after a natural or other type of disaster .. |
65 |
|
11.3 |
Incident Management Plan . . |
65 |
|
12. |
Number of Persons required per task .. |
66 |
|
13. |
Identification and Authentication for each role . |
66 |
|
14. |
Personnel Security Controls .. |
67 |
|
15. |
Training Requirements |
67 |
|
16. |
Retaining Frequency and Requirements |
67 |
|
17. |
Documentation supplied to Personnel |
68 |
|
18. |
Key Management .. |
68 |
|
18.1 |
Generation . |
68 |
|
18.2 |
Distribution of keys .. |
68 |
|
18.3 |
Storage .. |
68 |
|
18.4 |
Usage . |
68 |
|
18.5 |
Certifying Authoritys Public Key Delivery to Users.. . |
69 |
|
19. |
Private Key Protection and Backup . |
69 |
|
20. |
Method of Destroying Private Key . |
69 |
|
21. |
Usage Periods for the Public and Private Keys . |
69 |
|
21.1 |
Key Change .. |
69 |
|
21.2 |
Destruction . |
70 |
|
21.3 |
Key Compromise . . |
70 |
|
22. |
Confidentiality of Subscribers Information |
70 |
Security Guidelines for Certifying Authorities
1. Introduction
This document prescribes security guidelines for the management and operation of Certifying Authorities (CAs) and is aimed at protecting the integrity, confidentiality and availability of their services, data and systems. These guidelines apply to Certifying Authorities that perform all the functions associated with generation, issue and management of Digital Signature Certificate such as:
2. Security Management
The Certifying Authority shall define Information Technology security policies for its operation on the lines defined in Schedule-II and Schedule-III. The policy shall be communicated to all personnel and widely published throughout the organisation to ensure that the personnel follow the policies.
3. Physical controls site location, construction and physical access
4. Media Storage
A Certifying Authority must ensure that storage media used by his system are protected from environment threats such as temperature, humidity and magnetic and are transported and managed in accordance with para 8.3 and para 8.4 of the Information Technology Security Guidelines given at Schedule-II.
5. Waste Disposal
All media used for storage of information pertaining to all functions associated with generation, production, issue and management of Digital Signature Certificate shall be scrutinized before being destroyed or released for disposal.
6. Off-site Backup
A Certifying Authority must ensure that facility used for off-site backup, if any, shall be within the country and shall have the same level of security as the primary Certifying Authority site.
7. Change and Configuration Management
8. Network and Communications Security
9. System Security Audit Procedures
9.1 Types of event recorded
(1) The Certifying Authority shall maintain record of all events relating to the security of his system. The records should be maintained in audit log file and shall include such events as:
(2) Monitoring and Audit Logs
(i) A Certifying Authority should consider the use of automated security management and monitoring tools providing an integrated view of the security situation at any point in time. Records of the following application transactions shall be maintained:
(ii) Records and log files shall be reviewed regularly for the following activities:
(3) All logs, whether maintained through electronic or manual means, should contain the date and time of the event, and the identity of the subscriber/subordinate/entity which caused the event.
(4) A Certifying Authority should also collect and consolidate, either electronically or manually, security information which may not be generated by his system, such as:
(5) To facilitate decision-making, all agreements and correspondence relating to services provided by Certifying Authority should be collected and consolidated, either electronically or manually, at a single location.
9.2 Frequency of Audit Log Monitoring
The Certifying Authority must ensure that its audit logs are reviewed by its personnel at least once every two weeks and all significant events are detailed in an audit log summary. Such reviews should involve verifying that the log has not been tampered with, and then briefly inspecting all log entries, with a more thorough investigation of any alerts or irregularities in the logs. Action taken following these reviews must be documented.
9.3 Retention Period for Audit Log
The Certifying Authority must retain its audit logs onsite for at least twelve months and subsequently retain them in the manner described in para 10 of the Information Technology Security Guidelines as given in Schedule-II.
9.4 Protection of Audit Log
The electronic audit log system must include mechanisms to protect the log files from unauthorized viewing, modification, and deletion.
Manual audit information must be protected from unauthorised viewing, modification and destruction.
9.5 Audit Log Backup Procedures
Audit logs and audit summaries must be backed up or copied if in manual form.
9.6 Vulnerability Assessments
Events in the audit process are logged, in part, to monitor system vulnerabilities. The Certifying Authority must ensure that a vulnerability assessment is performed, reviewed and revised, if necessary, following an examination of these monitored events.
10. Records Archival
11. Compromise and Disaster Recovery
11.1 Computing Resources, Software and/or Data are Corrupted
The Certifying Authority must establish business continuity procedures that outline the steps to be taken in the event of the corruption or loss of computing and networking resources, nominated website, repository, software and/or data. Where a repository is not under the control of the Certifying Authority, the Certifying Authority must ensure that any agreement with the repository provides for business continuity procedures.
11.2 Secure facility after a natural or other type of disaster
The Certifying Authority must establish a disaster recovery plan outlining the steps to be taken to re-establish a secure facility in the event of a natural or other type of disaster. Where a repository is not under the control of the Certifying Authority, the Certifying Authority must ensure that any agreement with the repository provides that a disaster recovery plan be established and documented by the repository.
11.3 Incident Management Plan
An incident management plan shall be developed and approved by the management. The plan shall include the following areas:
An incident response action plan shall be established to ensure the readiness of the Certifying Authority to respond to incidents. The plan should include the following areas:
12. Number of Persons Required Per Task
The Certifying Authority must ensure that no single individual may gain access to the Digital Signature Certificate server and the computer server maintaining all information associated with generation, issue and management of Digital Signature Certificate and private keys of the Certifying Authority. Minimum two individuals, preferably using a split-knowledge technique, such as twin passwords, must perform any operation associated with generation, issue and management of Digital Signature Certificate and application of private key of the Certifying Authority.
13. Identification and Authentication for Each Role
All Certifying Authority personnel must have their identity and authorization verified before they are:
Each of these certificates and accounts (with the exception of Certifying Authoritys signing certificates) must:
Certifying Authoritys operations must be secured using techniques of authentication and encryption, when accessed across-a shared network.
14. Personnel Security Controls
The Certifying Authority must ensure that all personnel performing duties with respect to its operation must:
15. Training Requirements
A Certifying Authority shall ensure that all personnel performing duties with respect to its operation, must receive comprehensive training in:
16. Retraining Frequency and Requirements
The requirements of para 15 must be kept current to accommodate changes in the Certifying Authoritys system. Refresher training must be conducted as and when required, and the Certifying Authority must review these requirements at least once a year.
17. Documentation Supplied to Personnel
A Certifying Authority must make available to his personnel the Digital Signature Certificate policies it supports, its Certification Practice Statement, Information Technology Security Policy and any specific statutes, policies or contracts relevant to their position.
18. Key Management
Keys shall be transferred from the key generation system to the storage device (if the keys are not stored on the key generation system) using a secure mechanism that ensures confidentiality and integrity.
18.5 Certifying Authoritys Public Key Delivery to Users
The Certifying Authoritys public verification key must be delivered to the prospective Digital Signature Certificate holder in an on-line transaction in accordance with PKIX-3 Certificate Management Protocol, or via an equally secure manner.
19. Private Key Protection and Backup
20. Method of Destroying Private Key
Upon termination of use of a private key, all copies of the private key in computer memory and shared disk space must be securely destroyed by over-writing. Private key destruction procedures must be described in the Certification Practice Statement or other publicly available document.
21. Usage Periods for the Public and Private Keys
21.1 Key Change
All keys must have validity periods of no more than five years.
Suggested validity period:
( c) Subscriber Digital Signature Certificate key three years;
Use of particular key lengths should be determined in accordance with departmental Threat-Risk Assessments.
Upon termination of use of a Certifying Authority signature private key, all components of the private key and all its backup copies shall be securely destroyed.
22. Confidentiality of Subscribers Information
SCHEDULE-IV
[See rule 23]
Form for Application for issue of Digital Signature Certificate
For Individual/Hindu Undivided Family Applicant
1. Full Name * [Name of the Karta in case of Hindu Undivided Family]
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
2. Have you ever been known by any other name? If Yes,
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
Residential Address *
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________________________
State/Union Territory __________________ Pin : __________ Telephone No. ___________________________________
Fax ___________________________________
Mobile Phone No. ___________________________________
Office Address *
Name of Office ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________________________
State/Union Territory __________________ Pin : __________
Telephone No. ___________________________________
Fax ___________________________________
4. Address for Communication * Tick Ö as applicable A or B
5. Fathers Name *
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
6. Sex * (For Individual Applicant only) Tick Ö as applicable : Male / Female
7. Date of Birth (dd/mm/yyyy) * --/--/----
8. Nationality * ___________________________________
9. In case of foreign national, visa details ___________________________________
___________________________________
10. Credit Card Details
Credit Card Type ___________________________________
Credit Card No. ___________________________________
Issued By ___________________________________
11. E-mail Address ___________________________________
12. Web URL address ___________________________________
13. Passport Details #
Passport No. ___________________________________
Passport issuing authority ___________________________________
Passport expiry date ___________________________________
14. Voters Identity Card No. # ___________________________________
15. Income Tax PAN no. # ___________________________________
16. ISP Details
ISP Name * ___________________________________
ISPs Website Address, if any ___________________________________
Your User Name at ISP, if any ___________________________________
17. Personal Web page URL, if any ___________________________________
For Company /Firm/Body of Individuals/Association of Persons/ Local Authority
18. Registration Number * ___________________________________
19. Date of Incorporation/Agreement/Partnership * --/--/----
20. Particulars of Business, if any: *
Head Office ___________________________________
Name of Office ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ______________________ Pin _________
State/Union Territory ___________________________________
Telephone No. ___________________________________
Fax ___________________________________
Web page URL, if any ___________________________________
No. of Branches ___________________________________
Nature of Business ___________________________________
___________________________________
___________________________________
___________________________________
21. Income Tax PAN No.* ___________________________________
22. Turnover in the last financial year Rs. ________________________________
23. Names, Addresses etc. of Partners/Members/Directors (For Information about more persons, please add separate sheet(s) in the format given below) *
Details of Partners/Members/Directors
No. of Partners/Members/Directors ___________________________________
Full Name
Last Name/Surname __________________________________
First Name ___________________________________
Middle Name ___________________________________
Address
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ___________________________________
State/Union Territory Pin ___________________________________
Telephone No. ___________________________________
Fax No. ___________________________________
Mobile Phone No. ___________________________________
Nationality ________________________________
In case of foreign national, Visa details_______________________________
Passport Details #
Passport No. ___________________________________
Passport issuing authority ___________________________________
Passport expiry date ___________________________________
Voters Identity Card No. # ___________________________________
Income Tax PAN no. # ___________________________________
E-mail Address ___________________________________
Personal Web page URL, if any ___________________________________
For Government Organisations/Agencies
24. Particulars of Organisation/Agency : *
Name of Organisation ___________________________________
Administrative Ministry/Department ___________________________________
Under State/Central Government ___________________________________
Flat/Door/Block No. ___________________________________
Name of Premises/Building/Village ___________________________________
Road/Street/Lane/Post Office ___________________________________
Area/Locality/Taluka/Sub-Division ___________________________________
Town/City/District ____________________ Pin __________
State/Union Territory ___________________________________
Telephone No. ___________________________________
Fax No. ___________________________________
Name of the Head of Organisation ___________________________________
Designation ___________________________________
E-mail Address ___________________________________
25. Bank Details
Bank Name * ___________________________________
Branch * ___________________________________
Bank Account No. * ___________________________________
Type of Bank Account * ___________________________________
26. Type of Digital Signature Certificate required * ______________________________
27. Any other detail ___________________________________
Date Signature of the Applicant
_____________________________________________________________________________
Instructions : 1. Columns marked with * are mandatory as applicable.
2. For the columns marked with #, details for at least one is mandatory.
3. Column No. 1 to 17 are to be filled up by individual applicants.
SCHEDULEV
Glossary
ACCEPT (A DIGITAL SIGNATURE CERTIFICATE)
To demonstrate approval of a Digital Signature Certificate by a Digital Signature Certificate applicant while knowing or having notice of its informational contents.
ACCESS
Gaining entry into, instructing or communicating with the logical, arithmetical,
or memory function resources of a computer, computer system or computer network;
ACCESS CONTROL
The process of limiting access to the resources of a computer system only to authorized users, programs or other computer systems.
ACCREDITATION
A formal declaration by the Controller that a particular information system,
professional or other employee or contractor, or organization is approved to
perform certain duties and to operate in a specific security mode, using a prescribed
set of safeguards.
AUTHORITY REVOCATION LIST (ARL)
A list of revoked Certifying Authority certificates. An ARL is a CRL for Certifying Authority cross-certificates.
ADDRESSEE
A person who is intended by the originator to receive the electronic record but does not include any intermediary.
AFFILIATED CERTIFICATE
A certificate issued to an affiliated individual. (See also affiliated individual)
AFFIRM / AFFIRMATION
To state or indicate by conduct that data is correct or information is true.
AFFIXING DIGITAL SIGNATURE
With its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of digital signature;
alias
A pseudonym.
applicant (See CA applicant; certificate applicant)
application software
a software that is specific to the solution of an application problem. It is the software coded by or for an end user that performs a service or relates to the users work.
application system
A family of products designed to offer solutions for commercial data processing, office, and communications environments, as well as to provide simple, consistent programmer and end user interfaces for businesses of all sizes.
archive
To store records and associated journals for a given period of time for
security, backup, or auditing purposes.
assurances
Statements or conduct intended to convey a general intention, supported
by a good-faith effort, to provide and maintain a specified service. "Assurances"
does not necessarily imply a guarantee that the services will be performed fully
and satisfactorily. Assurances are distinct from insurance, promises, guarantees,
and warranties, unless otherwise expressly indicated.
ASYMMETRIC CRYPTO SYSTEM
A system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature.
audit
A procedure used to validate that controls are in place and adequate for
their purposes. Includes recording and analyzing activities to detect intrusions
or abuses into an information system. Inadequacies found by an audit are reported
to appropriate management personnel.
AUDIT TRAIL
A chronological record of system activities providing documentary evidence of processing that enables management staff to reconstruct, review, and examine the sequence of states and activities surrounding or leading to each event in the path of a transaction from its inception to output of fi9nal results.
authenticated record
A signed document with appropriate assurances of authentication or a message with a digital signature verified by a relying party. However, for suspension and revocation notification purposes, the digital signature contained in such notification message must have been created by the private key corresponding to the public key contained in the Digital Signature Certificate.
authentication
A process used to confirm the identity of a person or to prove the integrity
of specific information. Message authentication involves determining its source
and verifying that it has not been modified or replaced in transit. (See
also verify (a digital signature))
AUTHORIZATION
The granting of rights, including the ability to access specific information
or resources.
availability
The extent to which information or processes are reasonably accessible and
usable, upon demand, by an authorized entity, allowing authorized access to
resources and timely performance of time-critical operations.
BACKUP
The process of copying critical information, data and software for the purpose of recovering essential processing back to the time the backup was taken.
BINDING
An affirmation by a Certifying Authority of the relationship between a named
entity and its public key.
CERTIFICATE
A Digital Signature Certificate issued by Certifying Authority.
CERTIFICATE CHAIN
An ordered list of certificates containing an end-user subscriber certificate
and Certifying Authority certificates (See valid certificate).
CERTIFICATE EXPIRATION
The time and date specified in the Digital Signature Certificate when the operational period ends, without regard to any earlier suspension or revocation.
CERTIFICATE EXTENSION
An extension field to a Digital Signature Certificate which may convey additional information about the public key being certified, the certified subscriber, the Digital Signature Certificate issuer, and/or the certification process. Standard extensions are defined in Amendment 1 to ISO/IEC 9594-8:1995 (X.509). Custom extensions can also be defined by communities of interest.
CERTIFICATE ISSUANCE
The actions performed by a Certifying Authority in creating a Digital Signature Certificate and notifying the Digital Signature Certificate applicant (anticipated to become a subscriber) listed in the Digital Signature Certificate of its contents.
CERTIFICATE MANAGEMENT [MANAGEMENT OF DIGITAL SIGNATURE CERTIFICATE]
Certificate management includes, but is not limited to, storage, distribution, dissemination, accounting, publication, compromise, recovery, revocation, suspension and administration of Digital Signature Certificates. A Certifying Authority undertakes Digital Signature Certificate management functions by serving as a registration authority for subscriber Digital Signature Certificates. A Certifying Authority designates issued and accepted Digital Signature Certificates as valid by publication.
CERTIFICATE POLICY
A specialized form of administrative policy tuned to electronic transactions performed during Digital Signature Certificate management. A Certificate Policy addresses all aspects associated with the generation, production, distribution, accounting, compromise recovery and administration of digital certificates. Indirectly, a certificate policy can also govern the transactions conducted using a communications system protected by a certificate-based security system. By controlling critical certificate extensions, such policies and associated enforcement technology can support provision of the security services required by particular applications.
CERTIFICATE REVOCATION
(SEE REVOKE A CERTIFICATE)
CERTIFICATE REVOCATION LIST (CRL)
A periodically (or exigently) issued list, digitally signed by a Certifying Authority, of identified Digital Signature Certificates that have been suspended or revoked prior to their expiration dates. The list generally indicates the CRL issuer's name, the date of issue, the date of the next scheduled CRL issue, the suspended or revoked Digital Signature Certificates' serial numbers, and the specific times and reasons for suspension and revocation.
CERTIFICATE SERIAL
NUMBER
A value that unambiguously identifies a Digital Signature Certificate generated
by a Certifying Authority.
CERTIFICATE SIGNING
REQUEST (CSR)
A machine-readable form of a Digital Signature Certificate application.
CERTIFICATE SUSPENSION (SEE SUSPEND A CERTIFICATE)
certification / certify
The process of issuing
a Digital Signature Certificate by a Certifying Authority.
CERTIFYING AUTHORITY (CA)
A person who has been granted a licence to issue a Digital Signature Certificate under section 24 of Information Technology Act, 2000.
CERTIFYING AUTHORITY SOFTWARE
The cryptographic software required to manage the keys of end entities.
CERTIFYING AUTHORITY SYSTEM
All the hardware and software system (e.g. Computer, PKI servers, network devices etc.) used by the Certifying Authority for generation, production, issue and management of Digital Signature Certificate.
certification practice statement (CPS)
A statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing Digital Signature Certificates.
certifier (See issuing authority)
challenge phrase
A set of numbers and/or letters that are chosen by a Digital Signature Certificate applicant, communicated to the Certifying Authority with a Digital Signature Certificate application, and used by the Certifying Authority to authenticate the subscriber for various purposes as required by the Certification Practice Statement. A challenge phrase is also used by a secret share holder to authenticate himself, herself, or itself to a secret share issuer.
CERTIFICATE CLASS
A Digital Signature Certificate of a specified level of trust.
CLIENT APPLICATION
An application that runs on a personal computer or workstation and relies on a server to perform some operation.
common key
Some systems of cryptographic hardware require arming through a secret-sharing process and require that the last of these shares remain physically attached to the hardware in order for it to stay armed. In this case, "common key" refers to this last share. It is not assumed to be secret as it is not continually in an individuals possession.
COMMUNICATION/NETWORK SYSTEM
A set of related, remotely connected devices and communications facilities including more than one computer system with the capability to transmit data among them through the communications facilities (covering ISDN, lease lines, dial-up, LAN, WAN, etc.).
compromise
A violation (or suspected violation) of a security policy, in which an unauthorized disclosure of, or loss of control over, sensitive information may have occurred. (Cf., data integrity)
COMPUTER
Any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.
COMPUTER CENTRE (See DATA CENTRE)
COMPUTER DATA BASE
Means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network.
COMPUTER NETWORK
Interconnection of one or more computers through
(i) the use of satellite, microwave, terrestrial line or other communication media; and
(ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained.
COMPUTER PERIPHERAL
Means equipment that works in conjunction with a computer but is not a part of the main computer itself, such as printer, magnetic tape reader, etc.
COMPUTER RESOURCE
Means computer, computer system, computer network, data, computer database or software.
COMPUTER SYSTEM
A device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions.
COMPUTER VIRUS (See VIRUS)
confidentiality
The condition in which sensitive data is kept secret and disclosed only
to authorized parties.
confirm
To ascertain through appropriate inquiry and investigation. (See also
authentication; verify a digital signature)
CONFIRMATION OF DIGITAL SIGNATURE CERTIFICATE CHAIN
The process of validating a Digital Signature Certificate chain and subsequently validating an end-user subscriber Digital Signature Certificate.
CONTINGENCY PLANS
The establishment of emergency response, back up operation, and post-disaster recovery processes maintained by an information processing facility or for an information system.
Establish the strategy for recovering from unplanned disruption of information processing operations. The strategy includes the identification and priority of what must be done, who performs the required action, and what tools must be used.
A document, developed in conjunction with application owners and maintained at the primary and backup computer installation, which describes procedures and identifies the personnel necessary to respond to abnormal situations such as disasters. Contingency plans help managers ensure that computer application owners continue to process (with or without computers) mission-critical applications in the event that computer support is interrupted.
controls
Measures taken to ensure the integrity and quality of a process.
correspond
To belong to the same key pair. (See also public key; private key)
CRITICAL INFORMATION
Data determined by the data owner as mission critical or essential to business purposes.
CROSS-CERTIFICATE
A Certificate used to establish a trust relationship between two Certifying Authorities.
cryptographic algorithm
A clearly specified mathematical process for computation; a set of rules
that produce a prescribed result.
cryptography (See also public key cryptography)
DAMAGE
Means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.
DATA
Means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer.
DATA BASE (See COMPUTER DATABASE)
DATA CENTRE (as also COMPUTER CENTRE)
The facility covering the computer room, media library, network area, server area, programming and administration areas, other storage and support areas used to carry out the computer processing functions. Usually refers to the computer room and media library.
data confidentiality (See confidentiality)
data integrity
A condition in which data has not been altered or destroyed in an unauthorized manner. (See also threat; compromise)
DATA SECURITY
The practice of protecting data from accidental or malicious modification, destruction, or disclosure.
demo Certificate
A Digital Signature Certificate issued by a Certifying Authority to be used exclusively for demonstration and presentation purposes and not for any secure or confidential communications. Demo Digital Signature Certificates may be used by authorized persons only.
DIGITAL CERTIFICATE APPLICANT
A person that requests the issuance of a public key Digital Signature Certificate by a Certifying Authority. (See also CA applicant; subscriber)
DIGITAL CERTIFICATE APPLICATION
A request from a Digital Signature Certificate applicant (or authorized agent) to a Certifying Authority for the issuance of a Digital Signature Certificate. (See also certificate applicant; certificate signing request)
DIGITAL SIGNATURE
Means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3 of the Information Technology Act, 2000.
DIGITAL SIGNATURE CERTIFICATE
Means a Digital Signature Certificate issued under sub-section (4) of section 35 of the Information Technology Act, 2000.
distinguished name
A set of data that identifies a real-world entity, such as a person in a
computer-based context.
document
A record consisting of information inscribed on a tangible medium such as
paper rather than computer-based information. (See also message; record)
ELECTRONIC FORM
With reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, micro-film, computer generated micro fiche or similar device.
electronic mail ("E-mail")
Messages sent, received or forwarded in digital form via a computer-based
communication mechanism.
ELECTRONIC RECORD
Means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated micro-fiche.
encryption
The process of transforming plaintext data into an unintelligible form (cipher
text) such that the original data either cannot be recovered (one-way encryption)
or cannot be recovered without using an inverse decryption process (two-way
encryption).
extensions
Extension fields in X.509 v3 certificates. (See X.509)
FIREWALL/DOUBLE FIREWALL
One of several types of intelligent devices (such as routers or gateways) used to isolate networks. Firewalls make it difficult for attackers to jump from network to network. A double firewall is two firewalls connected together. Double firewalls are used to minimise risk if one firewall gets compromised or provide address translation functions.
file transfer protocol
(FTP)
The application protocol that offers file system access from the Internet
suite of protocols.
FUNCTION
In relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer.
GATEWAY
Hardware or software that is used to translate protocols between two or more systems.
generate a key pair
A trustworthy process of creating private keys during Digital Signature Certificate application whose corresponding public keys are submitted to the applicable Certifying Authority during Digital Signature Certificate application in a manner that demonstrates the applicants capacity to use the private key.
HARD COPY
A copy of computer output that is printed on paper in a visually readable form; e.g. printed reports, listing, and documents.
hash (hash function)
An algorithm that maps or translates one set of bits into another (generally smaller) set in such a way that :
HIGH-SECURITY ZONE
An area to which access is controlled through an entry point and limited to authorized, appropriately screened personnel and properly escorted visitors. High-Security Zones should be accessible only from Security Zones, and are separated from Security Zones and Operations Zones by a perimeter. High-Security Zones are monitored 24 hours a day a week by security staff, other personnel or electronic means.
identification / identify
The process of confirming the identity of a person. Identification is facilitated in public key cryptography by means of certificates.
identity
A unique piece of information that marks or signifies a particular entity
within a domain. Such information is only unique within a particular domain.
INFORMATION
Includes data, text, images, sound, voice, codes, computer programmes, software and databases or micro-film or computer generated micro fiche.
INFORMATION ASSETS
Means all information resources utilized in the course of any organisations business and includes all information, application software (developed or purchased), and technology (hardware, system software and networks).
INTERMEDIARY
With respect to any particular electronic message means any person who on behalf of another person receives, stores or transmits that message or provides any service with respect to that message.
INFORMATION TECHNOLOGY SECURITY
All aspects related to defining, achieving, and maintaining confidentiality, integrity, availability, accountability, authenticity, and reliability.
INFORMATION TECHNOLOGY SECURITY POLICY
Rules, directives and practices that govern how information assets, including sensitive information, are managed, protected and distributed within an organization and its Information Technology systems.
KEY
A sequence of symbols that controls the operation of a cryptographic transformation (e.g. encipherment, decipherment, cryptographic check function computation, signature generation, or signature verification).
key generation
The trustworthy process of creating a private key/public key pair.
KEY MANAGEMENT
The administration and use of the generation, registration, certification, deregistration, distribution, installation, storage, archiving, revocation, derivation and destruction of keying material in accordance with a security policy.
KEY PAIR
In an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key.
LICENCE
Means a licence granted to a Certifying Authority.
LOCAL AREA NETWORK (LAN)
A geographically small network of computers and supporting components used by a group or department to share related software and hardware resources.
LOW-SENSITIVE
Applies to information that, if compromised, could reasonably be expected to cause injury outside the national interest, for example, disclosure of an exact salary figure.
MANAGEMENT OF DIGITAL SIGNATURE CERTIFICATE [See CERTIFICATE MANAGEMENT]
MEDIA
The material or configuration on which data is recorded. Examples include magnetic taps and disks.
message
A digital representation of information; a computer-based record. A subset
of record. (See also record)
name
A set of identifying attributes purported to describe an entity of a certain
type.
NETWORK
A set of related, remotely connected devices and communications facilities including more than one computer system with the capability to transmit data among them through the communications facilities.
NETWORK ADMINISTRATOR
The person at a computer network installation who designs, controls, and manages the use of the computer network.
NODE
In a network, a point at which one or more functional units connect channels or data circuits.
NOMINATED WEBSITE
A website designated by the Certifying Authority for display of information such as fee schedule, Certification Practice Statement, Certificate Policy etc.
nonrepudiation
Provides proof of the origin or delivery of data in order to protect the
sender against a false denial by the recipient that the data has been received
or to protect the recipient against false denial by the sender that the data
has been sent. Note: Only a trier of fact (someone with the authority to resolve
disputes) can make an ultimate determination of non-repudiation. By way of illustration,
a digital signature verified pursuant to this Certification Practice Statement
can provide proof in support of a determination of non-repudiation by a trier
of fact, but does not by itself constitute non-repudiation.
notary
A natural person authorized by an executive governmental agency to perform notarial services such as taking acknowledgments, administering oaths or affirmations, witnessing or attesting signatures, and noting protests of negotiable instruments.
on-line
Communications that provide a real-time connection.
OPERATIONS ZONE
An area where access is limited to personnel who work there and to properly escorted visitors. Operations Zones should be monitored at least periodically, based on a threat risk assessment (TRA), and should preferably be accessible from a Reception Zone.
operational certificate
A Digital Signature Certificate which is within its operational period at
the present date and time or at a different specified date and time, depending
on the context.
OPERATIONAL MANAGEMENT
Refers to all business/service unit management (i.e. the user management) as well as Information Technology management.
operational period
The period starting with the date and time a Digital Signature Certificate is issued (or on a later date and time certain if stated in the Digital Signature Certificate) and ending with the date and time on which the Digital Signature Certificate expires or is earlier suspended or revoked.
organization
An entity with which a user is affiliated. An organization may also be a
user.
ORIGINATOR
A person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary.
password (pass phrase; pin number)
Confidential authentication information usually composed of a string of characters used to provide access to a computer resource.
PARTICULARLY SENSITIVE
Applies to information that, if compromised, could reasonably be expected to cause serious injury outside the national interest, for example loss of reputation or competitive advantage.
PC CARD (SEE ALSO SMART CARD)
A hardware token compliant with standards promulgated by the Personal Computer Memory Card International Association (PCMCIA) providing expansion capabilities to computers, including the facilitation of information security.
person
Means any company or association or individual or body of individuals,
whether incorporated or not.
personal presence
The act of appearing (physically rather than virtually or figuratively) before a Certifying Authority or its designee and proving one's identity as a prerequisite to Digital Signature Certificate issuance under certain circumstances.
PKI (PUBLIC KEY INFRASTRUCTURE) / PKI SERVER
A set of policies, processes, server platforms, software and workstations used for the purpose of administering Digital Signature Certificates and public-private key pairs, including the ability to generate, issue, maintain, and revoke public key certificates.
PKI HIERARCHY
A set of Certifying Authorities whose functions are organized according to the principle of delegation of authority and related to each other as subordinate and superior Certifying Authority.
pledge (See software publishers pledge)
POLICY
A brief document that states the high-level organization position, states the scope, and establishes who is responsible for compliance with the policy and the corresponding standards. Following is an abbreviated example of what a policy may contain
PRIVATE KEY
The key of a key pair used to create a digital signature.
PROCEDURE
A set of steps performed to ensure that a guideline is met.
PROGRAM
A detailed and explicit set of instructions for accomplishing some purpose, the set being expressed in some language suitable for input to a computer, or in machine language.
PROXY SERVER
A server that sits between a client application such as a web browser and a real server. It intercepts all requests to the real server to see if it can fulfill the request itself. If not, it forwards the request to the real server.
PUBLIC ACCESS ZONE
Generally surrounds or forms part of a government facility. Examples include the grounds surrounding a building, and public corridors and elevator lobbies in multiple-occupancy buildings. Boundary designators such as signs and direct or remote surveillance may be used to discourage unauthorized activity.
PUBLIC KEY
The key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate.
public key certificate (See certificate)
public key cryptography
(See cryptography)
A type of cryptography that uses a key pair of mathematically related cryptographic
keys. The public key can be made available to anyone who wishes to use it and
can encrypt information or verify a digital signature; the private key is kept
secret by its holder and can decrypt information or generate a digital signature.
public key infrastructure (PKI)
The architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system. It includes a set of policies, processes, server platforms, software and workstations, used for the purpose of administering Digital Signature Certificates and keys.
public/private key pair (See public key; private key; key pair)
recipient (of a digital signature)
A person who receives a digital signature and who is in a position to rely on it, whether or not such reliance occurs. (See also relying party)
record
Information that is inscribed on a tangible medium (a document) or stored
in an electronic or other medium and retrievable in perceivable form. The term
"record" is a superset of the two terms "document" and "message".
(See also document; message)
re-enrollment (See also renewal)
rely / reliance (on a certificate and digital signature)
To accept a digital signature and act in a manner that could be detrimental to oneself were the digital signature to be ineffective. (See also relying party; recipient)
relying party
A recipient who acts in reliance on a certificate and digital signature. (See also recipient; rely or reliance (on a certificate and digital signature))
renewal
The process of obtaining a new Digital Signature Certificate of the same class and type for the same subject once an existing Digital Signature Certificate has expired.
repository
A database of Digital Signature Certificates and other relevant information
accessible on-line.
repudiation (See
also nonrepudiation)
The denial or attempted denial by an entity involved in a communication
of having participated in all or part of the communication.
revoke a certificate
The process of permanently ending the operational period of a Digital Signature Certificate from a specified time forward.
RISK
The potential of damage to a system or associated assets that exists as a result of the combination of security threat and vulnerability.
RISK ANALYSIS
The process of identifying security risks, determining their magnitude, and identifying areas needing safeguards.
RISK ASSESSMENT
An analysis of system assets and vulnerabilities to establish an expected loss from certain events based on estimated probabilities of the occurrence of those events.
RISK MANAGEMENT
The total process of identifying, controlling, and eliminating or minimizing uncertain events that may affect Information Technology system resources.
RSA
A public key cryptographic system invented by Rivest, Shamir & Adelman.
secret share
A portion of a cryptographic secret split among a number of physical tokens.
secret share holder
An authorized holder of a physical token containing a secret share.
secure channel
A cryptographically enhanced communications path that protects messages against perceived security threats.
SECURE SYSTEM
Means computer hardware, software, and procedure that
(a) are reasonably secure from unauthorised access and misuse;
(b) provide a reasonable level of reliability and correct operation;
(c) are reasonably suited to performing the intended functions; and
(d) adhere to generally accepted security procedures.
SECURITY PROCEDURE
Means the security procedure prescribed under section 16 of the Information Technology Act, 2000.
security
The quality or state of being protected from unauthorized access or
uncontrolled losses or effects. Absolute security is impossible to achieve in
practice and the quality of a given security system is relative. Within a state-model
security system, security is a specific "state" to be preserved under
various operations.
security policy
A document which articulates requirements and good practices regarding the protections maintained by a trustworthy system.
security services
Services provided by a set of security frameworks and performed by means of certain security mechanisms. Such services include, but are not limited to, access control, data confidentiality, and data integrity.
SECURITY ZONE
An area to which access is limited to authorised personnel and to authorised and properly escorted visitors. Security Zones should preferably be accessible from an Operations Zone, and through a specific entry point. A Security Zone need not be separated from an Operations Zone by a secure perimeter. A Security Zone should be monitored 24 hours a day and 7 week by security staff, other personnel or electronic means.
self-signed public key
A data structure that is constructed the same as a Digital Signature Certificate but that is signed by its subject. Unlike a Digital Signature Certificate, a self-signed public key cannot be used in a trustworthy manner to authenticate a public key to other parties.
serial number (See
certificate serial number)
server
A computer system that responds to requests from client systems.
sign
To create a digital signature for a message, or to affix a signature to
a document, depending upon the context.
signature (See digital signature)
signer
A person who creates a digital signature for a message, or a signature for
a document.
smart card
A hardware token that incorporates one or more integrated circuit (IC) chips to implement cryptographic functions and that possesses some inherent resistance to tampering.
s/mime
A specification for E-mail security exploiting a cryptographic message syntax in an Internet mime environment.
subject (of a certificate)
The holder of a private key corresponding to a public key. The term "subject" can refer to both the equipment or device that holds a private key and to the individual person, if any, who controls that equipment or device. A subject is assigned an unambiguous name, which is bound to the public key contained in the subjects Digital Signature Certificate.
subject name
The unambiguous value in the subject name field of a Digital Signature Certificate, which is bound to the public key.
subscriber
A person in whose name the Digital Signature Certificate is issued.
subscriber agreement
The agreement executed between a subscriber and a Certifying Authority for the provision of designated public certification services in accordance with this Certification Practice Statement.
subscriber information
Information supplied to a certification authority as part of a Digital Signature Certificate application. (See also certificate application)
suspend a certificate
A temporary "hold" placed on the effectiveness of the operational period of a Digital Signature Certificate without permanently revoking the Digital Signature Certificate. A Digital Signature Certificate suspension is invoked by, e.g., a CRL entry with a reason code. (See also revoke a certificate)
SYSTEM ADMINISTRATOR
The person at a computer installation who designs, controls, and manages the use of the computer system.
SYSTEM SECURITY
A system function that restricts the use of objects to certain users.
SYSTEM SOFTWARE
Application-independent software that supports the running of application software. It is a software that is part of or made available with a computer system and that determines how application programs are run; for example, an operating system.
test certificate
A Digital Signature Certificate issued by a Certifying Authority for the limited purpose of internal technical testing. Test certificates may be used by authorized persons only.
threat
A circumstance or event with the potential to cause harm to a system, including the destruction, unauthorized disclosure, or modification of data and/or denial of service.
TIME-OUT
A security feature that logs off a user if any entry is not made at the terminal within a specified period of time.
time stamp
A notation that indicates (at least) the correct date and time of an action, and identity of the person or device that sent or received the time stamp.
token
A hardware security token containing a users private key(s), public
key certificate, and, optionally, a cache of other certificates, including all
certificates in the users certification chain.
transaction
A computer-based transfer of business information, which consists of specific
processes to facilitate communication over global networks.
trust
Generally, the assumption that an entity will behave substantially as expected.
Trust may apply only for a specific function. The key role of this term in an
authentication framework is to describe the relationship between an authenticating
entity and a Certifying Authority. An authenticating entity must be certain
that it can trust the Certifying Authority to create only valid and reliable
Digital Signature Certificates, and users of those Digital Signature Certificates
rely upon the authenticating entitys determination of trust.
trusted position
A role that includes access to or control over cryptographic operations that may materially affect the issuance, use, suspension, or revocation of Digital Signature Certificates, including operations that restrict access to a repository.
trusted third party
In general, an independent, unbiased third party that contributes to the ultimate security and trustworthiness of computer-based information transfers. A trusted third party does not connote the existence of a trustor-trustee or other fiduciary relationship. (Cf., trust)
trustworthy system
Computer
hardware, software, and procedures that are reasonably secure from intrusion
and misuse; provide a reasonable level of availability, reliability, and correct
operation; are reasonably suited to performing their intended functions; and
enforce the applicable security policy. A trustworthy system is not necessarily
a "trusted system" as recognized in classified government nomenclature.
type (of certificate)
The defining properties of a Digital Signature Certificate, which limit its intended purpose to a class of applications uniquely, associated with that type.
unambiguous name (See distinguished name)
uniform resource locator (URL)
A standardized device for identifying and locating certain records and other resources located on the World Wide Web.
user
An authorized entity that uses a certificate as applicant, subscriber, recipient
or relying party, but not including the Certifying Authority issuing the Digital
Signature Certificate. (See also certificate applicant; entity; person;
subscriber)
valid certificate
A Digital Signature Certificate issued by a Certifying Authority and
accepted by the subscriber listed in it.
validate a certificate (i.e., of an end-user subscriber certificate)
The process performed by a recipient or relying party to confirm that an end-user subscriber Digital Signature Certificate is valid and was operational at the date and time a pertinent digital signature was created.
validation (of certificate application)
The process performed by the Certifying Authority or its agent following submission of a Digital Signature Certificate application as a prerequisite to approval of the application and the issuance of a Digital Signature Certificate. (See also authentication; software validation)
validation (of software) (See software validation)
verify (A digital signature)
In relation to a digital signature, electronic record or public key, with its grammatical variations and cognate expressions means to determine whether
(a) the initial electronic record was affixed with the digital signature by the use of private key corresponding to the public key of the subscriber;
(b) the initial electronic record is retained intact or has been altered since such electronic record was so affixed with the digital signature.
VIRUS
Means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource.
VULNERABILITY
A weakness that could be exploited to cause damage to the system or the assets it contains.
WEB BROWSER
A software application used to locate and display web pages.
WORLD WIDE WEB (WWW)
A hypertext-based, distributed information system in which users may create, edit, or browse hypertext documents. A graphical document publishing and retrieval medium; a collection of linked documents that reside on the Internet.
writing
Information in a record that is accessible and usable for subsequent reference.
X.509
The ITU-T (International Telecommunications Union-T) standard for Digital
Signature Certificates. X.509 v3 refers to certificates containing or capable
of containing extensions.
ACRONYMS
ARL Authority Revocation List
CA Certification Authority
CP Certificate Policy
CPS Certification Practice Statement
CRL Certificate Revocation List
CSR Certificate Signing Request
DN Distinguished Name
e-mail Electronic Mail
FTP File Transfer Protocol
ISDN Integrated Service Digital Network
ITU International Telecommunications Union
LAN Local Area Network
PIN Personal Identification Number
PKI Public Key Infrastructure
PKIX Public Key Infrastructure X.509
URL Uniform Resource Locator
WAN Wide Area Network
[ No. 1(20)/97-IID(NII)/F6]
(P.M.Singh)
Joint Secretary