Attachment 'board-cabinet.txt'

Download

   1 AssurancePolicy
   2 ---------------
   3 4.4. Experience Points
   4 Additional Experience Points may be granted temporarily or permanently to an Assurer by CAcert Inc.'s Committee (board), on recommendation from the Assurance Officer.
   5 5. The Assurance Officer
   6 The Committee (board) of CAcert Inc. appoints an Assurance Officer with the following responsibilities:
   7  * Reporting to the Committee and advising on all matters to do with Assurance;
   8  
   9 OrganisationAssurancePolicy
  10 ---------------------------
  11 2.1 Assurance Officer
  12 The Assurance Officer ("AO") manages this policy and reports to the CAcert Inc. Committee ("Board").
  13 
  14 The AO manages all OAs and is responsible for process, the CAcert Organisation Assurance Programme ("COAP") form, OA training and testing, manuals, quality control. In these responsibilities, other Officers will assist.
  15 
  16 The OA is appointed by the Board. Where the OA is failing the Board decides. 
  17 
  18 TTPAssistedAssurancePolicy
  19 ---------------------------
  20 4. Assurance Officer ("AO")
  21 The Board routinely delegates its responsibilities to the Assurance Officer (and this section assumes that, but does not require it).
  22 
  23 4.2 Deserts
  24 The Assurance Officer maintains a list of regions that are designated as 'deserts,' being areas that are so short of Assurers as to render face-to-face Assurance impractical. In each region, approved types of TTP are listed (e.g., Notary). The list is expected to vary according to the different juridical traditions of different regions. Changes to the regional lists are prepared by either an Organisation Assurer for that region (as described by OAP) or by two Assurers familiar with the traditions in that region. Changes are then submitted to the Board for approval. 
  25 Use of a type of TTP not on the list must be approved by AO and notified to Board. It is an explicit goal to reduce the usage of TTP-assisted assurances in favour of face-to-face Assurance. 
  26 In coordination with internal and external auditors, the Assurance Officer shall design and implement a suitable programme to meet the needs of audit. Where approved by auditors or Board, the Assurance Officer may document and implement minor variations to this policy. 
  27 
  28 
  29 
  30 
  31 CertificationPracticeStatement
  32 ------------------------------
  33 1.3. PKI participants
  34 The CA is technically operated by the Community, under the direction of the Board of CAcert Incorporated.
  35 
  36 3.1.7. International Domain Names
  37 The CAcert Inc. Board has the authority to decide to add or remove accepted TLD Registrars on this list.
  38 
  39 5.2.1. Trusted roles
  40 Governance: 
  41  * Directors (members of the CAcert Inc. committee, or "Board") 
  42  * internal Auditor
  43  * Aribtrator
  44 
  45 8.3. Assessor's relationship to assessed entity
  46 An Auditor may convene an audit team. The same restrictions apply in general to all members of the team, but may be varied. Any deviations must be documented and approved by the CAcert Inc. Board. 
  47 
  48 8.5. Actions taken as a result of deficiency
  49 Auditor may issue directives instructing changes, where essential to audit success or other extreme situations. Directives should be grounded on criteria, on established minimum or safe practices, or clearly described logic. Adequate discussion with Community (e.g., CAcert Inc. Board and with Policy Group) should precede any directive. They should be presented to the same standard as the criteria, above.
  50 
  51 9.5.2. Brand
  52 The brand of CAcert is made up of its logo, name, trademark, service marks, etc. Use of the brand is strictly limited by the Board, and permission is required. See m20070917.5. 
  53 
  54 
  55 Configuration-Control Specification
  56 -----------------------------------
  57 Hardware 
  58 Control
  59 Security Policy places executive responsibility for Hardware with the Board of CAcert Inc. Access is delegated to Access Engineers (SP 2) and Systems Administrators (SP 3). Legal ownership may be delegated by agreement to other organisations (SP 9.4). 
  60 
  61 Software
  62 Control
  63 Developers transfer full rights to CAcert (in a similar fashion to documents), or organise their contributions under a proper free and open source code regime, as approved by Board.
  64 
  65 DisputeResolutionPolicy
  66 -----------------------
  67 2.1. Authority
  68 The Board of CAcert Inc. and the Members of the Community vest in Arbitrators full authority to hear disputes and deliver rulings which are binding on CAcert Inc. and the Members. 
  69 
  70 3.2. Process 
  71 Only under exceptional circumstances can the Arbitrator declare the Ruling private under seal. Such a declaration must be reviewed in its entirety by the Board, and the Board must confirm or deny that declaration.
  72 
  73 3.5 Liability
  74 The above provisions may only be overridden by appeal process (by means of a new dispute causing referral to the Board).
  75 
  76 3.6. Remedies 
  77 The Arbitrator is not limited within the general domain of CAcert, and may instruct novel remedies as seen fit. Novel remedies outside the domain may be routinely confirmed by the Board by way of appeal process, in order to establish precedent.
  78 
  79 4.2. The Disadvantages of this Forum 
  80 * Membersmay have their rights trampled over. In such a case, the community should strive to re-open the case and refer it to the board. 
  81 
  82 
  83 PolicyOnPolicy
  84 --------------
  85 4. DRAFT status
  86 4.6 During the period of DRAFT, CAcert Inc. retains a veto over policies that effect the running of CAcert Inc. 
  87 
  88 SecurityPolicy
  89 --------------
  90 1. INTRODUCTION
  91 1.1. Motivation and Scope
  92 The Committee of CAcert, Inc. (hereafter, "Board") may add additional components into the Security Manual. 
  93 
  94 3. LOGICAL SECURITY
  95 3.2. Operating System 
  96 3.2.3. Patching
  97 3.2.3.1. “emergency” patching 
  98 Declaration of an emergency patching situation should not occur with any regularity. Emergency patch events must be documented within the regular summaries by the team leader to Board independent of filed disputes. 
  99 
 100 3.4. Access control 
 101 3.4.2. Special Authorisation 
 102 All changes of personnel to the above lists are subject to Board approval. 
 103 
 104 4. OPERATIONAL SECURITY
 105 4.1. System administration 
 106 4.1.3. Change management procedures
 107 All changes made to system configuration must be recorded and reported in regular summaries to the Board of CAcert. 
 108 
 109 
 110 5. INCIDENT RESPONSE
 111 5.3. Immediate Action 
 112 5.3.3. Escalation
 113 A process of escalation should be established for oversight and management purposes, proportional to severity and priority. Oversight starts with four eyes and ends with the Arbitrator. Management starts with the team leader and ends with the Board. 
 114 
 115 6. DISASTER RECOVERY
 116 Disaster Recovery is the responsibility of the Board of CAcert Inc. 
 117 
 118 6.1. Business Processes
 119 Board must develop and maintain documentation on Business Processes. From this list, Core Processes for business continuity / disaster recovery purposes must be identified. 
 120 
 121 6.2. Recovery Times
 122 Board should identify standard process times for all processes, and must designate Maximum Acceptable Outages and Recovery Time Objectives for the Core Processes. 
 123 
 124 6.3. Plan
 125 Board must have a basic plan to recover. 
 126 
 127 6.4. Key Persons List
 128 Board must maintain a Key Persons List with all the contact information needed. See §10.1. The list shall be accessible even if CAcert's infrastructure is not available. 
 129 
 130 7. SOFTWARE ASSESSMENT
 131 7.1. Authority
 132 The source code is under CCS. Additions to the team are subject to Board approval. See §3.4.2. 
 133 
 134 8. SUPPORT
 135 8.1. Authority
 136 The software interface gives features to Support Engineer. Access to the special features is under tight control. Additions to the team are subject to Board approval, and the software features are under CCS. See §3.4.2. 
 137 
 138 9. ADMINISTRATIVE
 139 9.1. Staffing
 140 9.1.1. Roles and responsibilities
 141 * Team leaders: coordinate with teams, report to Board.
 142 * All: respond to Arbitrator's rulings on changes. Respond to critical security issues. Observe.
 143 * Board: authorise new individuals and accesses. Coordinate overall.
 144 
 145 9.1.2. Staffing levels
 146 One individual in each team is designated team leader and reports to Board. 
 147 
 148 9.1.3. Process of new Team Members
 149 New team members need:
 150 * Recommendation by team leader
 151 * Arbitrated Background Check ("ABC")
 152 * Authorisation by Board
 153 
 154 9.1.5. Authorisation
 155 Individuals and access (both) must be authorised by the Board. Only the Board may approve new individuals or any access to the systems. Each individual should be proposed to the Board, with the relevant supporting information as above.
 156 The Board should deliberate directly and in full. Board members who are also active in the area should abstain from the vote, but should support the deliberations. Deliberations and decisions should be documented. All conflicts of interest should be examined. 
 157 
 158 9.1.7. Termination of staff
 159 Termination of access may be for resignation, Arbitration ruling, or decision of Board or team leader. On termination (for any reason), access and information must be secured. See §3.4.4. 
 160 
 161 9.2. Root Key Management
 162 9.2.1. Root Key generation
 163 Root keys are generated only on instruction from Board. They must be generated to a fully documented and reviewed procedure. The procedure must include:
 164 [...]
 165 * Dual control over all phases, including by Board.
 166 [...]
 167 
 168 9.2.2. Backup and escrow
 169 The top-level root must be escrowed under Board control. Subroots may be escrowed by either Board or Systems Administration Team. 
 170 
 171 9.3. Legal
 172 9.3.1. Responsibility
 173 Board is responsible to the Community to manage the CA at the executive level. 
 174 
 175 9.3.2. Response to external (legal) inquiry
 176 All external inquiries of security import are filed as disputes and placed before the Arbitrator under DRP. Board and applicable team leaders must be notified. 
 177 Only the Arbitrator has the authority to deal with external requests and/or create a procedure. Access Engineers, Systems Administrators, support engineers, Board members and other key roles do not have the authority to answer legal inquiry. The Arbitrator's ruling may instruct individuals, and becomes your authority to act. 
 178 
 179 9.4. Outsourcing 
 180 Contracts should be written with the above in mind. Outsourcing of critical components must be approved by the Board.
 181 
 182 
 183 
 184 
 185 
 186 
 187 
 188 
 189 
 190 Money
 191 Complaint rule 12/13
 192 Association membership
 193 contracts

Attached Files

To refer to attachments on a page, use attachment:filename, as shown below in the list of files. Do NOT use the URL of the [get] link, since this is subject to change and can break easily.
  • [get | view] (2014-02-05 12:22:32, 19.1 KB) [[attachment:111.jpg]]
  • [get | view] (2014-02-05 12:31:42, 14.5 KB) [[attachment:111en.jpg]]
  • [get | view] (2016-07-09 10:53:25, 327.7 KB) [[attachment:ResponsibilitiySplit.pdf]]
  • [get | view] (2016-07-09 10:53:02, 9.9 KB) [[attachment:board-cabinet.txt]]
  • [get | view] (2016-07-09 10:52:28, 511.3 KB) [[attachment:cabinet.pdf]]
 All files | Selected Files: delete move to page copy to page

You are not allowed to attach a file to this page.