![]()
Microsoft IT PKI
Certificate Policy/Certification
Practice Statement
For SSL CAs
(Microsoft IT CP/CPS)
Version 1.5
Effective Date 10/30/2017
Change Control Log
|
Revision Date |
Revision Reason |
Revision Explanation |
New Rev |
Supersedes |
Revision By |
|
12/16/13 |
New |
Initial
version documented |
1.0 |
N/A |
Microsoft
IT |
|
3/21/14 |
Update |
Minor
corrections to 7.1, 7.2 |
1.1 |
1.0 |
Microsoft
IT |
|
05/08/14 |
Update |
·
Section 4.1 & 4.2 to include certificate request pre-approval
workflow ·
Updated appropriate sections to include addition of OCSP service. OCSP
service is expected to be in place on or before 30th May 2014. ·
Removed reference to PAIX ·
Minor updates in section 7.1 |
1.2 |
1.1 |
Microsoft
IT |
|
1/28/15 |
Update |
Revise
section 5.4.1 of the CP/CPS to clarify collected events |
1.3 |
1.2 |
Microsoft
IT |
|
12/20/2016 |
Update |
·
Added of names and
profiles of new SSL/TLS CAs · Updated maximum key usage and certificate validity period
for Issuing CAs · Updated to remove reference to certificate issuance for short
names, internal server names, and reserved IP address |
1.4 |
1.3 |
Microsoft
IT |
|
10/30/2017 |
Update |
·
Added info regarding
verification of CAA records |
1.5 |
1.4 |
Microsoft
IT |
Table
of Contents
1.2 Document Name and Identification
1.3.1
Certification Authorities
1.3.2
Registration Authorities
1.4.1
Appropriate Certificate Uses
1.4.2
Prohibited Certificate Uses.
1.5.1
Organization Administering the Document
1.5.3
Person Determining CPS Suitability for the Policy
1.5.4
CP/CPS Approval Procedures.
2.
Publication and Repository Responsibilities
2.2 Publication of Certification
Information
2.3 Time or Frequency of Publication
2.4 Access Controls on Repositories
3.
Identification and Authentication
3.1.2
Need for Names to be Meaningful
3.1.3.
Anonymity or Pseudonymity of Subscribers
3.1.4
Rules for Interpreting Various Name Forms
3.1.6
Recognition, Authentication, and Role of Trademarks
3.2
Initial Identity Validation
3.2.1
Method to Prove Possession of Private Key
3.2.2
Authentication of Organization Identity
3.2.3
Authentication of Individual Identity
3.2.4
Non-Verified Subscriber Information
3.2.6
Criteria for Interoperation.
3.3
Identification and Authentication for
Re-Key Requests
3.3.1
Identification and Authentication for Routine Re-Key
3.3.2
Identification and Authentication for Re-Key After Revocation
4.
Certificate Life-Cycle Operational Requirements
4.1.1
Who Can Submit a Certificate Application
4.1.2
Enrollment Process and Responsibilities
4.2 Certificate Application Processing
4.2.1
Performing Identification and Authentication Functions
4.2.2
Approval or Rejection of Certificate Applications
4.2.3
Time to Process Certificate Applications
4.3.1
CA Actions during Certificate Issuance
4.3.2
Notifications to Subscriber by the CA of Issuance of Certificate
4.4.1
Conduct Constituting Certificate Acceptance
4.4.2
Publication of the Certificate by the CA
4.4.3
Notification of Certificate Issuance by the CA to Other Entities
4.5 Key Pair and Certificate Usage
4.5.1
Subscriber Private Key and Certificate Usage
4.5.2
Relying Party Public Key and Certificate Usage
4.6.3
Processing Certificate Renewal Requests
4.6.4
Notification of New Certificate Issuance to Subscriber
4.6.5
Conduct Constituting Acceptance of a Renewal Certificate
4.6.6
Publication of the Renewal Certificate by the CA
4.6.7
Notification of Certificate Issuance by the CA to Other Entities
4.7.1
Circumstance for Certificate Re-key
4.7.2
Who May Request Certification of a New Public Key
4.7.3
Processing Certificate Re-keying Requests
4.7.4
Notification of New Certificate Issuance to Subscriber
4.7.5
Conduct Constituting Acceptance of a Re-keyed Certificate
4.7.6
Publication of the Re-keyed Certificate by the CA
4.7.7
Notification of Certificate Issuance by the CA to Other Entities
4.8.1
Circumstance for Certificate Modification
4.8.2
Who May Request Certificate Modification
4.8.3
Processing Certificate Modification Requests
4.8.4
Notification of New Certificate Issuance to Subscriber
4.8.5
Conduct Constituting Acceptance of Modified Certificate
4.8.6
Publication of the Modified Certificate by the CA
4.8.7
Notification of Certificate Issuance by the CA to Other
4.9
Certificate Revocation and Suspension
4.9.1
Circumstances for Revocation
4.9.2
Who Can Request Revocation.
4.9.3
Procedure for Revocation Request
4.9.4
Revocation Request Grace Period
4.9.5
Time within which CA Shall Process the Revocation Request
4.9.6
Revocation Checking Requirements for Relying Parties
4.9.8
Maximum Latency for CRLs
4.9.9
On-Line Revocation/Status Checking Availability
4.9.10
On-Line Revocation Checking Requirements
4.9.11
Other Forms of Revocation Advertisements Available
4.9.12
Special Requirements Regarding Key Compromise
4.9.13
Circumstances for Suspension
4.9.14
Who Can Request Suspension.
4.9.15
Procedure for Suspension Request
4.9.16
Limits on Suspension Period.
4.10 Certificate Status Services
4.10.1
Operational Characteristic.
4.12.1
Key Escrow and Recovery Policy and Practices
4.12.2
Session Key Encapsulation and Recovery Policy and Practices
5.
Facility, Management, and Operational Controls
5.1.1
Site Location and Construction
5.1.3
Power and Air Conditioning.
5.1.5
Fire Prevention and Protection
5.2.1
Trusted Roles and Authorized Roles
5.2.2
Number of Persons Required per Task
5.2.3
Identification and Authentication for Each Role
5.2.4
Roles Requiring Separation of Duties
5.3.1
Qualifications, Experience, and Clearance Requirements
5.3.2
Background Check Procedures.
5.3.4
Retraining Frequency and Requirements
5.3.5
Job Rotation Frequency and Sequence
5.3.6
Sanctions for Unauthorized Actions
5.3.7
Independent Contractor Requirements
5.3.8
Documentation Supplied to Personnel
5.4.1
Types of Events Recorded
5.4.2
Frequency of Processing Log.
5.4.3
Retention Period for Audit Log
5.4.5
Audit Log Backup Procedures.
5.4.6
Audit Collection System (Internal vs. External)
5.4.7
Notification to Event-Causing Subject
5.4.8
Vulnerability Assessments
5.5.1
Types of Records Archived
5.5.2
Retention Period for Archive
5.5.4
Archive Backup Procedures
5.5.5
Requirements for Time-Stamping of Records
5.5.6
Archive Collection System (Internal or External)
5.5.7
Procedures to Obtain and Verify Archive Information
5.7 Compromise and Disaster Recovery
5.7.1
Incident and Compromise Handling Procedures
5.7.2
Computing Resources, Software, and/or Data Are Corrupted
5.7.3
Entity Private Key Compromise Procedures
5.7.4
Business Continuity Capabilities after a Disaster
6.
Technical Security Controls.
6.1
Key Pair Generation and
Installation
6.1.2
Private Key Delivery to Subscriber
6.1.3
Public Key Delivery to Certificate Issuer
6.1.4
CA Public Key Delivery to Relying Parties
6.1.6
Public Key Parameters Generation and Quality Checking
6.1.7
Key Usage Purposes (as per X.509 v3 Key Usage Field)
6.2 Private Key Protection and
Cryptographic Module Engineering Controls
6.2.1 Cryptographic Module Standards and
Controls
6.2.2
Private Key (m of n) Multi-Person Control
6.2.6
Private Key Transfer Into or From a Cryptographic Module
6.2.7
Private Key Storage on Cryptographic Module
6.2.8
Method of Activating Private Key
6.2.9
Method of Deactivating Private Key
6.2.10
Method of Destroying Private Key
6.2.11
Cryptographic Module Rating.
6.3 Other Aspects of Key Pair Management
6.3.2
Certificate Operational Periods and Key Pair Usage Periods
6.4.1
Activation Data Generation and Installation
6.4.2
Activation Data Protection.
6.4.3
Other Aspects of Activation Data
6.5 Computer Security Controls
6.5.1
Specific Computer Security Technical Requirements
6.5.2
Computer Security Rating
6.6 Life-Cycle Technical Controls
6.6.1
System Development Controls.
6.6.2
Security Management Controls
6.6.3
Life Cycle Security Control
7.
Certificate, CRL, and OCSP Profiles
7.1.3
Algorithm Object Identifiers
7.1.6
Certificate Policy Object Identifier
7.1.7
Usage of Policy Constraints Extension
7.1.8
Policy Qualifiers Syntax and Semantics
7.1.9
Processing Semantics for the Critical Certificate Policies
7.2.2
CRL and CRL Entry Extensions
8.
Compliance Audit and Other Assessments
8.1 Frequency and Circumstances of
Assessment
8.2 Identity/Qualifications of Assessor
8.3 Assessor's Relationship to Assessed
Entity
8.4 Topics Covered by Assessment
8.5 Actions Taken as a Result of
Deficiency
9.
Other Business and Legal Matters
9.1.1
Certificate Issuance or Renewal Fees
9.1.3
Revocation or Status Information Access Fees
9.2.3
Insurance or Warranty Coverage for End-Entities
9.3 Confidentiality of Business
Information
9.3.1
Scope of Confidential Information
9.3.2
Information Not Within the Scope of Confidential Information
9.3.3
Responsibility to Protect Confidential Information
9.4 Privacy of Personal Information
9.4.2
Information Treated as Private
9.4.3
Information Not Deemed Private
9.4.4
Responsibility to Protect Private Information
9.4.5
Notice and Consent to Use Private Information
9.4.6
Disclosure Pursuant to Judicial or Administrative Process
9.5 Intellectual Property rights
9.6 Representations and Warranties
9.6.1
CA Representations and Warranties
9.6.2
RA Representations and Warranties
9.6.3
Subscriber Representations and Warranties
9.6.4
Relying Party Representations and Warranties
9.6.5
Representations and Warranties of Other Participants
9.10.3
Effect of Termination and Survival
9.11 Individual Notices and
Communications with Participants
9.12.1
Procedure for Amendment
9.12.2
Notification Mechanism and Period
9.12.3
Circumstances under Which OID Must Be Changed
9.13 Dispute Resolution Provisions
9.15 Compliance with Applicable Law
9.16.4
Enforcement (attorneys' fees and waiver of rights)
This Certificate Policy/Certification Practice Statement
(CP/CPS) governs the operations of the Microsoft IT Public Key Infrastructure (PKI) SSL CA
services and sets forth the business, legal, and technical practices for
approving, issuing, managing, using, and revoking digital Certificates within
the Microsoft IT SSL CA hierarchy. The effective date for implementation of the
practices disclosed in this document is the date of publication of the CP/CPS
and will apply to all future CA related activities performed by Microsoft IT
PKI.
Baseline
Requirements for the Issuance and Management of Publicly-Trusted Certificates,
published at www.cabforum.org. In the event of any inconsistency between this
document and those Requirements, those Requirements take precedence over this
document.
The Microsoft IT Public Key Infrastructure (Microsoft IT
PKI) operated by Microsoft Corporation, has been established to provide SSL
digital certificate services to support operations of various Microsoft
functions and business units. Microsoft IT PKI functions as the Certification Authority,
Registration Authority, and manages SSL Certificates for Microsoft. The SSL
Certificates provide consumers with assurance regarding the authenticity and
integrity of Microsoft owned domains and servers.
The
following CAs, that are used to issue public key SSL Certificates, are within
the scope of this CP/CPS referred to here after as “Microsoft IT SSL CAs.”
|
CA Type |
CA Name |
Description of Function |
|
Microsoft IT SSL SHA1 Issuing
CA |
Microsoft IT SSL SHA1 |
Legacy SHA1 SSL CA that is not
actively issuing end entity certificates.
|
|
Microsoft IT SSL SHA2 Issuing
CA |
Microsoft IT SSL SHA2 |
Issues SHA2 SSL web
server/client Certificates to authenticated individuals. |
|
Microsoft IT TLS SHA2 Issuing
CA 1 |
Microsoft IT TLS CA 1 |
Issues SHA2 TLS web
server/client Certificates to authenticated individuals |
|
Microsoft IT TLS SHA2 Issuing
CA 2 |
Microsoft IT TLS CA 2 |
Issues SHA2 TLS web
server/client Certificates to authenticated individuals |
|
Microsoft IT TLS SHA2 Issuing
CA 4 |
Microsoft IT TLS CA 4 |
Issues SHA2 TLS web
server/client Certificates to authenticated individuals |
|
Microsoft IT TLS SHA2 Issuing
CA 5 |
Microsoft IT TLS CA 5 |
Issues SHA2 TLS web
server/client Certificates to authenticated individuals |
1.2 Document Name and Identification
This document is formally referred
to as the “Microsoft IT PKI Certificate Policy/Certification Practice Statement
for SSL CAs” (Microsoft IT PKI CP/CPS). Microsoft IT SSL CAs issue Certificates
in accordance with the policy and practice requirements of this document. The
“Certificate Policies” field for each end-entity certificate must reference the
OID for the CP/CPS under which it was issued. Certificates issued by Microsoft
IT SSL CAs must include the following Object Identifier (OID) in the
“Certificates Policies” field 1.3.6.1.4.1.311.42.1.
1.3.1 Certification Authorities
The
following CAs are supported by this CP/CPS:
· Microsoft
IT SSL SHA1
The Microsoft IT
SSL SHA1 is part of the Microsoft IT PKI SSL CA hierarchy that is currently not
issuing end entity certificates and is only used for supporting existing
certificates (publishes CRLs and OCSP responses). The Microsoft IT SSL SHA1 has
been issued a certificate from the Baltimore CyberTrust Root CA
· Microsoft
IT SSL SHA2
The Microsoft IT
SSL SHA2 is part of the Microsoft IT PKI SSL CA hierarchy and issues SHA2 end
entity certificates. The Microsoft IT SSL SHA2 has been issued a certificate
from the Baltimore CyberTrust Root CA.
· Microsoft
IT TLS SHA2 CA 1
The Microsoft IT
SSL SHA2 is part of the Microsoft IT PKI SSL CA hierarchy and issues SHA2 end
entity certificates. The Microsoft IT SSL SHA2 has been issued a certificate
from the Baltimore CyberTrust Root CA.
· Microsoft
IT TLS SHA2 CA 2
The Microsoft IT
SSL SHA2 is part of the Microsoft IT PKI SSL CA hierarchy and issues SHA2 end
entity certificates. The Microsoft IT SSL SHA2 has been issued a certificate
from the Baltimore CyberTrust Root CA.
· Microsoft
IT TLS SHA2 CA 4
The Microsoft IT
SSL SHA2 is part of the Microsoft IT PKI SSL CA hierarchy and issues SHA2 end
entity certificates. The Microsoft IT SSL SHA2 has been issued a certificate
from the Baltimore CyberTrust Root CA.
· Microsoft
IT TLS SHA2 CA 5
The Microsoft IT
SSL SHA2 is part of the Microsoft IT PKI SSL CA hierarchy and issues SHA2 end
entity certificates. The Microsoft IT SSL SHA2 has been issued a certificate
from the Baltimore CyberTrust Root CA.
Microsoft IT SSL
CAs issue end entity SSL Certificates for Microsoft owned domains. In limited
circumstances, Microsoft IT SSL CAs also issue end entity SSL Certificates for
domains owned by partners for purposes of conducting business with Microsoft.
Microsoft IT PKI SSL CAs are operated by the Microsoft ISRM IAM team.
1.3.2 Registration Authorities
Registration
Authorities (RAs) perform identification and authentication of subscribers for
certificate issuance and revocation requests, and pass along such requests to
the Certification Authorities. RA activities are operated by the Microsoft ISRM
IAM team for all Certificates issued under the Microsoft IT SSL CA hierarchy.
Subscribers within the Microsoft IT SSL PKI CA hierarchy
include Microsoft employees (full-time, part-time and contingent staff) and may
be issued Certificates for assignment to devices or applications, provided that
responsibility and accountability is attributable to the organization.
A Relying Party
is the entity who relies on the validity and binding of the Subscriber with the
public key associated with the Certificate. Relying Parties typically include
entities that may rely upon a Subscriber Certificate for purposes of a)
authenticating identity or b) encrypting communications.
Microsoft
IT PKI Policy Management Authority (PMA)
The Microsoft IT PKI Policy Management Authority (PMA)
consists of one or more representatives from each of the following teams
Microsoft Legal & Corporate Affairs (LCA), Trustworthy Computing (TwC), and
Information Security and Risk Management (ISRM).
1.4.1 Appropriate Certificate Uses
Certificates issued within the Microsoft IT SSL CA hierarchy
can be used for server authentication, client authentication, and SSL/TSL
Secure Sessions. Certificates issued to Microsoft’s external partners shall
only be used for conducting business with Microsoft.
|
Certificate Type |
Assurance Level |
Description and Assurance Level |
|
MSIT
PKI SSL Certificate |
High Assurance |
CAs operating under this policy are hosted and
managed by MSIT PKI using FIPS 140-2 Level 3 validated hardware security
modules (HSMs), and employ pre-defined and approved fulfillment practices
which include identification and authentication of the subscriber and
verification of the subject information included in the end entity certificate
prior to issuance. |
1.4.2 Prohibited Certificate Uses
Certificates must only be used to the extent consistent with
applicable law and for the purposes specified in §1.4.1. CA Certificates must
not be used for any functions except CA functions. In addition, end-user
Subscriber Certificates shall not be used as CA Certificates.
1.5.1 Organization Administering the Document
This CP/CPS is administered by the Microsoft IT PKI PMA at
Microsoft Corporation.
1.5.2 Contact Information
Contact information is listed below:
Microsoft IT PKI Practices Administrator
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052-6399
1.5.3 Person Determining CPS Suitability for the Policy
The Microsoft IT PKI PMA, as defined in §1.3.5, determines
suitability of CPS for the policy.
1.5.4 CP/CPS Approval Procedures
The CP/CPS will
be maintained in a repository available to the public. The CP/CPS shall be
reviewed by the Microsoft IT PKI PMA at least annually or in the event of a
major change. The Microsoft IT CP/CPS is prepared and reviewed by Microsoft
ISRM IAM team and submitted to the Microsoft IT PKI PMA for their approval.
Conditions for approval by the PMA include:
· Certificate – An electronic document that uses a digital signature to
bind a public key and an identity.
· Certificate
Revocation List (CRL) – A regularly updated time-stamped
list of revoked Certificates that is created and digitally signed by the CA
that issued the Certificates.
· Certificate
Signing Request (CSR) – A message sent to the
certification authority containing the information required to issue a digital
Certificate.
· Certification
Authority (CA) – An organization that is
responsible for the creation, issuance, revocation, and management of
Certificates. The term applies equally to both Roots CAs and Subordinate CAs.
· Certification Authority
Authorization (CAA): From RFC 6844 (http:tools.ietf.org/html/rfc6844): “The
Certification Authority Authorization (CAA) DNS Resource Record allows a DNS
domain name holder to specify the Certification Authorities (CAs) authorized to
issue certificates for that domain. Publication of CAA Resource Records allows
a public Certification Authority to implement additional controls to reduce the
risk of unintended certificate mis-issue.”
· Compromise - A loss, theft, disclosure, modification, unauthorized use,
or other breach of security related to a Private Key.
·
Certificate Policy/Certificate
Practice Statement – A set of rules governing the
operation, applicability, and use of a named set of Certificates for a defined
set of users.
· Distinguished
Name (DN) – The Distinguished Name (DN) is
used on Certificates and in the Repository to uniquely represent a Subject
identified in a Certificate.
· Hardware
Security Module (HSM) –A specialized hardware system
designed to securely store cryptographic keys and perform cryptographic
operations.
·
Object Identifier (OID) – A unique alphanumeric/numeric identifier registered under
the International Standards Organization's applicable standard for a specific
object or object class.
·
Online Certificate Status Protocol
(OCSP) – An online Certificate-checking
protocol that enables an OCSP Responder to determine the status of an
identified Certificate by contacting the Repository.
·
Public Key Infrastructure (PKI) – A set of hardware, software, people, procedures, rules,
policies, and obligations used to facilitate the trustworthy creation,
issuance, management, and use of Certificates and keys based on Public Key
Cryptography.
· Policy
Management Authority (PMA) – The Microsoft
IT PKI Policy Management Authority which creates and maintains the policies
related to the Microsoft IT Public Key Infrastructure.
·
Private Key – The key of a Key Pair that is kept secret by the holder
of the Key Pair, and that is used to create Digital Signatures and/or to
decrypt electronic records or files that were encrypted with the corresponding
Public Key.
· Public
Key – The key of a Key Pair that is
intended to be publicly shared with recipients of digitally signed electronic
records and that is used by such recipients to verify Digital Signatures
created with the corresponding Private Key and/or to encrypt electronic records
so that they can be decrypted only with the corresponding Private Key.
·
Registration Authority (RA) – Any Legal entity that is responsible for identification
and authentication of subjects of Certificates, but is not a CA, and hence does
not sign or issue Certificates. An RA may assist in the certificate application
process or revocation process or both. When “RA” is used as an adjective to
describe a role or function, it does not necessarily imply a separate body, but
can be part of the CA.
· Relying
Party – Any natural person or Legal entity
that relies on a Valid Certificate. An Application Software Supplier is not
considered a Relying Party when
software distributed by such Supplier merely displays information relating to a
Certificate.
·
Repository – An online database containing publicly-disclosed PKI
governance documents (such as Certificate Policies/Certification Practice
Statements) and Certificate status information in the form of a CRL.
·
Transport Layer Security(TLS)/Secure
Socket layer (SSL) – Security protocol that is widely
used in the internet for the purpose of authentication and establishing secure sessions.
·
Subscriber – A natural person or Legal Entity to whom a Certificate is
issued and who is legally bound by a Subscriber Agreement.
· Subscriber
Agreement – An agreement between the CA and
the Applicant/Subscriber that specifies the rights and responsibilities of the
parties.
2. Publication and Repository
Responsibilities
The Microsoft
ISRM IAM team maintains a public repository located at http://www.microsoft.com/pki/mscorp/cps
2.2 Publication of Certification
Information
Microsoft IT PKI shall publish this CP/CPS, Microsoft IT SSL
CA Certificates, and current CRLs for the Microsoft IT SSL CAs, and other
information relevant to Subscribers and Relying Parties in the online PKI
repository http://www.microsoft.com/pki/mscorp/cps. The Microsoft IT PKI also maintains a database of issued
SSL Certificates to which access is restricted to authorized Microsoft
personnel.
2.3
Time or Frequency of Publication
In the event of a change to this CP/CPS, an updated version
of this document will be published in accordance with §1.5.4 after approval
from the PMA. The new version of this CP/CPS will become effective immediately
for all participants listed in §1.3. CRLs are published in accordance with
§4.9.7.
2.4
Access Controls on Repositories
Information
published in the Microsoft Corporation Internet website repository is publicly
accessible information. Physical and logical access controls are used to
restrict write access to authorized Microsoft personnel.
3. Identification and Authentication
Certificates are issued in accordance with the X.509
standard. All Certificates require a Distinguished Name in the subject field or
a set of Subject Alternative Name values in the Subject Alternative Name
extension. In the case where subject identity information is contained
solely in the Subject Alternative Name extension, the Subject field of the
Certificate may be empty.
The Issuer and Subject fields for Certificates issued by
Microsoft IT PKI are populated in accordance with §7.1.
3.1.2 Need for Names to be Meaningful
The Distinguished Names assigned to the Microsoft IT SSL CAs
and Subscribers shall be meaningful, and shall have a reasonable association
with Microsoft IT SSL CAs and organization.
3.1.3. Anonymity or Pseudonymity of Subscribers
No stipulation.
3.1.4 Rules for Interpreting Various Name Forms
No stipulation.
No stipulation.
3.1.6 Recognition, Authentication, and Role of Trademarks
No stipulation.
3.2 Initial Identity Validation
3.2.1 Method to Prove Possession of Private Key
The Subscriber’s Certificate request shall contain the
public key to be certified and be digitally signed with the corresponding
private key.
3.2.2 Authentication of Organization Identity
Microsoft
IT PKI authenticates Organization information in each request in compliance
with CA/Browser Forum’s SSL Baseline Requirements.
Microsoft
IT PKI determines that the organization information submitted in the request is
accurate by validating against a qualified independent information source, or
alternatively, an approval from the legal team to confirm the existence of the
organization.
3.2.3 Authentication of Individual Identity
3.2.3.1 Authentication of Microsoft
Employee
All Microsoft employees may submit
requests for Certificates to be issued by Microsoft IT SSL CAs. Subscriber
identity is authenticated by the RA application using the Windows
Authentication against the enterprise directory. For each domain name included in the Certificate
application, Microsoft IT PKI authenticates the Subscriber’s right to request a
Certificate for the domain based on an approval from the requester’s manager
who shall be a fulltime employee of Microsoft.
3.2.3.2 Authentication of Domain Name
Microsoft IT PKI
issues Certificates only for the domains that are owned by Microsoft, and in
limited circumstances, to domains that are owned by partners for conducting
business with Microsoft. Microsoft IT PKI verifies authorization for domain
name through one of the applicable procedures in compliance with CA/Browser
Forum’s SSL Baseline Requirements:
·
Verification
against a qualified independent information source;
·
Communicating
with Microsoft’s domain administration team;
·
Relying
upon a domain authorization document; or
·
Using
any other method of confirmation, provided that the CA maintains documented
evidence that the method of confirmation establishes that the Applicant is the
Domain Name Registrant or has control over the Fully Qualified Domain Name
(FQDN) to at least the same level of assurance as those methods previously
described.
3.2.4 Non-Verified Subscriber Information
Not Applicable.
All Microsoft employees are authorized to submit requests
for Certificates to be issued by Microsoft IT SSL CAs. Requests for
Certificates shall be approved by the Certificate applicant’s direct Manager or
a Manager up to two levels higher in the organization chain.
3.2.6 Criteria for Interoperation
No stipulation.
3.3 Identification and Authentication for Re-Key Requests
3.3.1 Identification and Authentication for Routine Re-Key
Requests for routine re-key of
Subscriber Certificates are treated as new certificate requests and Microsoft
IT PKI performs the same identification and authentication checks as described
in §3.2. Routine re-key of the Microsoft IT SSL issuing
CA certificates shall be performed in accordance with Microsoft IT PKI Key
Generation process and the third party Root CA re-key procedures.
3.3.2 Identification and Authentication for Re-Key After
Revocation
Requests
for re-key of Subscriber Certificates after revocation are treated as new
certificate requests and Microsoft IT PKI performs the same identification and
authentication checks as described in §3.2.3.4
Identification and Authentication for Revocation Request
A Subscriber
Certificate revocation request is valid if it complies with one of the
following requirements:
·
The
request is raised through the RA application or
·
If
a revocation request is not raised through the RA application, the Microsoft IT
PKI shall perform sufficient procedures to manually authenticate the
Subscriber’s request.
Revocation
service requests for Microsoft IT SSL CA Certificates are required to be
approved by the Microsoft IT PKI PMA prior to being processed.
4. Certificate Life-Cycle
Operational Requirements
Prior to an end-entity certificate being issued, the
Subscriber submits a Certificate application through the RA application.
Certificate
requests for OCSP responder certificates are submitted to the CA application by
authorized Microsoft IT PKI personnel.
4.1.1 Who Can Submit a Certificate Application
All Microsoft employees can submit
Certificate applications for subscriber end-entity certificates.
4.1.2 Enrollment Process and Responsibilities
Authorized
applicants shall begin the enrollment process by submitting a Certificate
application through the enrollment website. Certificate fields are to be
populated in accordance with Microsoft IT Certificate profile requirements. The
requestor and subject information in the Certificate are validated as per §3.2.
Upon completion of the validation steps, the Certificate application shall be
approved by a Microsoft full time employee who is a manager in the management
chain of the applicant requesting the Certificate. The applicant has the option
of selecting an approver in direct line of management above the applicant (up
to three levels) within the same organization. Managers or authorized
individuals representing a user group within Microsoft may provide pre-approval
for certificate requests made by members of that group, via individual user or
service accounts, for a pre-determined list of Microsoft-owned domains.
Approvals are documented and are required to be re-authorized on a periodic basis.
Subscribers are
required to sign a Subscriber agreement regarding the usage of an issued SSL
Certificate in accordance with CP/CPS.
4.2
Certificate Application Processing
4.2.1 Performing Identification and Authentication Functions
See §3.
4.2.2 Approval or Rejection of Certificate Applications
The following
approvals shall be obtained prior to Certificate issuance and are dependent on
the Certificate type and assurance level.
|
|
CERTIFICATE LEVELS WITHIN THE Microsoft IT PKI |
|
|
CERTIFICATE ASSURANCE |
Approver for Issuing CA Certificate |
Approver for End Entity |
|
High Assurance |
PKI Policy Management Authority (PMA) |
·
Applicant’s Manager in the management chain or
authorized individuals representing a user group ·
Microsoft IT Service Availability Team (where
applicable for exception processing) ·
Microsoft Domains Administration Team (where
applicable for exception processing) |
4.2.3 Time to Process Certificate Applications
Certificate
applications, where possible, shall be processed within three (3) business
days.
4.2.4 Verification of CAA Records
CAA record verification is done in conformance with Baseline
Requirements for Issuance and Management of Publicly Trusted certificates set
forth by the CA/Browser Forum. CAA checking is not performed for FQDNs where
Microsoft, or one of its Affiliates, is the DNS operator. For all other FQDNs,
CAA records are checked and if a CAA record exists that does not list ssladmin.microsoft.com
as an authorized CA, the certificate is not issued.
4.3 Certificate Issuance
4.3.1 CA Actions during Certificate Issuance
Certificates are generated, issued and distributed only
after required approvals have been obtained and the required identification and
authentication steps have been successfully completed in accordance with
§3.2.2, §3.2.3, §3.3, and §3.4. Once the
registration process is completed and the requestor is approved for a
certificate, the CA will take reasonable steps to:
- Authenticate the source of the
request before issuing the certificate
-
Verify that certificate fields and extensions are populated in accordance with
the approved certificate template
-
Generate a certificate containing appropriate Public keys, OIDs, dates, etc.
-
Notify the RA application that the certificate is available for distribution
4.3.2 Notifications to Subscriber by
the CA of Issuance of Certificate
Subscribers are notified of Certificate creation upon
issuance via email and are provided access to their Certificates for download
and installation.
By accepting a Certificate, the Subscriber:
· Agrees to be bound by the continuing
responsibilities, obligations and duties imposed by the Microsoft IT PKI
CP/CPS;
· Agrees to be bound by the Microsoft
IT PKI Subscriber Agreement;
· Represents and warrants that to its
knowledge no unauthorized person has had access to the private key associated
with the Certificate; and
· Represents and warrants that the
Certificate information it has supplied during the registration process is
truthful and accurate.
Upon receipt of a
Certificate, the Subscriber is responsible for verifying that the information
contained within the Certificate is accurate and complete and that the
Certificate is not damaged or otherwise corrupted. In the event the Certificate
is inaccurate, damaged or corrupted, the Subscriber should contact the CA to
have the Certificate replaced as determined by the CA.
4.4.1 Conduct Constituting Certificate Acceptance
A Subscriber’s
receipt of a Certificate and subsequent use of the key pair and Certificate
constitute Certificate acceptance.
4.4.2 Publication of the Certificate by the CA
Microsoft IT SSL
CA Certificates will be published within the Microsoft IT repository (see
§2.1). Subscriber Certificates can be
downloaded by Subscribers from the RA application.
4.4.3 Notification of Certificate Issuance by the CA to
Other Entities
Not Applicable.
4.5
Key Pair and Certificate Usage
4.5.1 Subscriber Private Key and Certificate Usage
Use of an SSL Certificate is permitted once the Subscriber
has agreed to the Subscriber Agreement. The Certificate shall be used in
accordance with the Subscriber Agreement and the terms of this CP/CPS.
Subscribers and CAs use their private keys for the purposes
as constrained by the extensions (such as key usage, certificate policies,
etc.) in the Certificates issued to them.
Subscribers are required to protect their private keys from
unauthorized use and discontinue use of the private key following expiration or
revocation of the Certificate.
4.5.2 Relying Party Public Key and Certificate Usage
Relying parties shall use public key Certificates and
associated public keys for the purposes as constrained by the extensions (such
as key usage, certificate policies, etc.) in the Certificates. A Relying Party
is responsible for verifying the validity of the Certificate prior to relying
on any Certificate.
Microsoft IT SSL
CAs support certificate renewals as specified in the following sections.
4.6.1
Circumstance for Certificate Renewal
Renewal requests shall be submitted by the subscriber,
certificate owner (can be the same person as the subscriber), or a delegate.
Such requests must be signed using the existing certificate (key based
renewal).
4.6.3 Processing Certificate Renewal
Requests
Microsoft IT SSL CAs
performs all identification, authorization, and validation checks specified in §3.2
during renewal. Authorization checks as specified in §3.2.5 may not be
performed if Microsoft IT SSL CAs obtained such authorization for the existing
certificate within the last 39 months.
4.6.4 Notification of New
Certificate Issuance to Subscriber
Subscriber are notified of new certificate issuance through
emails.
4.6.5 Conduct Constituting Acceptance of a Renewal
Certificate
4.6.6 Publication of the Renewal Certificate by the CA
4.6.7 Notification of Certificate Issuance by the CA to
Other Entities
No
Stipulation.
Any certificate
re-key request shall be treated as initial certificate issuance. Refer to §4.3
4.7.1 Circumstance for Certificate Re-key
No Stipulation.
4.7.2 Who May Request Certification of a New Public Key
No Stipulation.
4.7.3 Processing Certificate Re-keying Requests
No Stipulation.
4.7.4 Notification of New Certificate Issuance to Subscriber
4.7.5 Conduct Constituting Acceptance
of a Re-keyed Certificate
No Stipulation.
4.7.6 Publication of the Re-keyed Certificate by the CA
No Stipulation.
4.7.7 Notification of Certificate Issuance by the CA to
Other Entities
No
Stipulation.
Any certificate modification
request shall be treated as initial certificate issuance. Refer to §4.3
4.8.1 Circumstance for Certificate Modification
No Stipulation.
4.8.2 Who May Request Certificate Modification
No Stipulation.
4.8.3 Processing Certificate Modification Requests
No Stipulation.
4.8.4 Notification of New Certificate Issuance to Subscriber
4.8.5 Conduct Constituting
Acceptance of Modified Certificate
No Stipulation.
4.8.6 Publication of the Modified Certificate by the CA
No Stipulation.
4.8.7 Notification of Certificate Issuance by the CA to
Other
No Stipulation.
4.9 Certificate Revocation and Suspension
Microsoft IT PKI supports Certificate revocation for all
Microsoft IT SSL CAs. Microsoft IT PKI does not support Certificate suspension
for Microsoft IT SSL CAs.
Microsoft IT PKI, through the RA application, maintains a
continuous 24x7 ability to accept and respond to revocation requests. Inquires
related to Certificate revocations are sent to an e-mail address monitored by
the Microsoft IT PKI Service Availability Team.
Microsoft IT SSL CAs publicly disclose to Subscribers,
Relying Parties, Application Software Suppliers, and other Third Parties,
instructions for reporting suspected Private Key Compromise, Certificate
misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or
any other matter related to Certificates.
When a revocation request or Certificate problem is reported
through email, Microsoft IT PKI will begin investigation within 24 hours of
receipt of such a request to decide whether revocation or other appropriate
action is warranted.
Microsoft IT PKI maintains a continuous 24x7 ability to
accept and respond internally to a high-priority certificate problem report and
where appropriate, forward such a complaint to law enforcement authorities
and/or revoke a Certificate that is the subject of such a complaint.
4.9.1 Circumstances for Revocation
Revocation may take place at the discretion of the Microsoft
IT PKI in the event that the security or integrity of the Certificate (or
information contained within it) is compromised. When confirmed, Microsoft IT
PKI shall revoke an SSL Certificate within 24 hours if one or more of the
following circumstances occur:
· The Subscriber requests in writing
that Microsoft IT PKI revoke the Certificate;
· The Subscriber notifies Microsoft IT
PKI that the original Certificate request was not authorized and does not
retroactively grant authorization;
· Microsoft IT PKI obtains evidence
that the Subscriber’s Private Key (corresponding to the Public Key in the
Certificate) has suffered a Key Compromise, or that the Certificate has
otherwise been misused;
· Microsoft IT PKI is made aware that
a Subscriber has violated one or more of its material obligations under the
Subscriber Agreement;
· Microsoft IT PKI is made aware of
any circumstance indicating that use of a Fully-Qualified Domain Name or IP
address in the Certificate is no longer legally permitted;
· Microsoft IT PKI is made aware that
a Wildcard Certificate has been used to authenticate a fraudulently misleading
subordinate Fully-Qualified Domain Name;
· Microsoft IT PKI is made aware of a
material change in the information contained in the Certificate;
· Microsoft IT PKI is made aware that
the Certificate was not issued in accordance with this CP/CPS or CA/Browser
Forum’s SSL Baseline Requirements;
· Microsoft IT PKI determines that any
of the information appearing in the Certificate is inaccurate or misleading;
· Microsoft IT PKI ceases operations
for any reason and has not made arrangements to continue to provide revocation
support for the Certificate;
· Microsoft IT PKI’s right to issue
Certificates is revoked or terminated, unless Microsoft IT PKI has made
arrangements to continue maintaining the CRL/OCSP Repository;
· Revocation is required as per this
CP/CPS;
· As required by the law; or
· The technical content or format of
the Certificate presents an unacceptable risk to Application Software Suppliers
or Relying Parties.
Microsoft IT PKI may invoke its incident handling procedures
if it considers a compromised subscriber certificate to have significant impact
to the security of Microsoft platform customers. In such a situation, Microsoft
IT PKI may revoke the certificate using “disallowed CTLs” method in addition to
publishing CRLs.
4.9.2 Who Can Request Revocation
Certificate revocation can be requested by Subscribers,
Subscriber’s Manager, or delegates (See §4.9.3) as identified in the RA
application. Revocation can also be initiated at the discretion of Microsoft IT
PKI.
4.9.3 Procedure for Revocation Request
Each Certificate has at least one owner (can be the same as
the Subscriber) and two delegates, one of which is the Subscriber’s Manager as
assigned in the RA application. Revocations requests are submitted by either
the Certificate owner or a delegate through the RA application. A notification
mail is sent to the Certificate owner and custodians informing them of the
revocation request. The revocation request has to be approved by the owner of
one of the delegates and the approver cannot be the same persons as the
requestor.
Fulfillment of the revocation is done by marking a
Certificate as revoked in the CA system and then submitting a CRL service
request to the system to generate the appropriate CRLs. Depending upon how the
revocation request was received, the fulfillment is performed either
automatically by the RA application (for requests received in the RA
application) or by the Microsoft IT PKI Service Availability Team (for requests
received through emails).
The CRLs are then posted and distributed by the Microsoft IT
PKI as per § 4.9.7.
4.9.4 Revocation Request Grace Period
No stipulations.
4.9.5 Time within which CA Shall
Process the Revocation Request
Revocation
requests submitted through the RA application are revoked immediately following
necessary approvals. Revocation requests submitted through emails are
investigated and fulfilled as per §4.9 and §4.9.1.
4.9.6 Revocation Checking Requirements for Relying Parties
A Relying Party
shall use the validation service (i.e. CRL or OCSP) prior to relying on any
Certificate. Reliance without using the validation service will be considered
an unreasonable reliance on the Certificate in question.
CRLs for
Subscriber SSL Certificates shall be issued at least once every 4 days and
shall be valid for 8 days. CRLs may be issued more frequently at the discretion
of Microsoft IT PKI.
4.9.8 Maximum Latency for CRLs
Microsoft
IT PKI will publish CRLs no later than the time specified in the “nextUpdate”
field of the previously published CRL.
4.9.9 On-Line Revocation/Status
Checking Availability
Status
information for certificates issued by the Microsoft IT CAs is available using
OCSP. Responses can be submitted through http://ocsp.msocsp.com. Information provided via OCSP is
updated at least every four days in conformance with Baseline Requirements for
Issuance and Management of Publicly Trusted certificates set forth by the
CA/Browser Forum. OCSP responses from this service are configured with a
maximum expiration time of 24hrs.
4.9.10 On-Line
Revocation Checking Requirements
4.9.11 Other Forms of Revocation Advertisements Available
Not applicable.
4.9.12 Special
Requirements Regarding Key Compromise
In an event or suspected or actual
CA key compromise, Microsoft IT PKI management, in conjunction with the PKI
PMA, will assess the situation and determine the appropriate course of action
to confirm and address the compromise. If deemed necessary by Microsoft,
Microsoft shall use commercially reasonable efforts to notify potential Relying
Parties if Microsoft IT PKI discovers, or has reason to believe, that there has
been a compromise of a SSL CA private key.
4.9.13 Circumstances for Suspension
Not applicable.
4.9.14 Who Can Request Suspension
Not applicable.
4.9.15 Procedure for Suspension Request
Not applicable.
4.9.16 Limits on Suspension Period
Not applicable.
4.10
Certificate Status Services
See §4.9.8 and §4.9.7.
4.10.1 Operational Characteristic
No stipulation.
No stipulation.
No stipulation.
The escrow of CA and Subscriber SSL private keys, for
purposes of access by law enforcement or any other reason, is not supported by
Microsoft IT PKI.
4.12.1 Key Escrow and Recovery Policy and Practices
Not applicable.
4.12.2 Session Key Encapsulation and Recovery Policy and
Practices
Not applicable.
5.
Facility, Management, and Operational Controls
5.1.1 Site Location and Construction
The locations of the production and disaster recovery
Microsoft IT PKI facilities, housing CA equipment and cryptographic materials,
are consistent with facilities used to house high value, sensitive information.
These facilities are located in Washington, US.
All CA operations are conducted within physically protected
environments that deter, prevent, and detect unauthorized use of, access to, or
disclosure of sensitive information and systems.
Microsoft IT SSL CA systems are hosted and managed within
secure facilities in Washington, US, that are constructed to have multiple
tiers of physical security and employ a variety of controls to prevent and
detect the unauthorized use of and access to sensitive Microsoft IT assets.
Physical access to production Microsoft IT SSL CA systems is restricted to
authorized personnel using dual controlled, two-factor authentication access
control mechanisms; is logged; and is monitored and video recorded on a 24x7
basis.
Microsoft IT PKI
has implemented a backup facility in an alternate location to address the
recovery of the Microsoft IT PKI service and systems in the case of a disaster
scenario.
Microsoft IT SSL CA systems are protected by dual
controlled, two-factor authentication systems, including biometrics. Access is
restricted to a limited number of authorized individuals with an approved
business need to access Microsoft IT systems and cryptographic materials.
Furthermore, access to these facilities is reviewed on a
periodic basis to determine compliance.
Cryptographic hardware and activation materials are
protected through the use of locked racks and safes. Access to cryptographic
systems, hardware, and activation materials is restricted in accordance with
§5.2.2. Participation of a minimum of two (2) trusted individuals is required
in order to obtain access to the quorum of activation materials needed to
activate CA keys.
5.1.3 Power and Air Conditioning
Microsoft IT SSL CA facilities are equipped with primary and
backup power systems, including uninterruptible power supply (UPS) systems and
backup generators. Also, these secure facilities are equipped with climate
control systems, as appropriate, to maintain optimal levels of temperature and
humidity.
Microsoft IT maintains controls to minimize the risk of
water exposure and damage for CA systems and cryptographic materials.
5.1.5 Fire Prevention and Protection
CA facilities are equipped with
smoke detection and fire suppression systems.
Media containing production software and system audit
information is stored within secure hosting facilities with appropriate
physical and logical access controls in accordance with Microsoft IT Corporate
high business impact (HBI) policies.
Media containing copies of production data, i.e., backup of
key files etc., is stored within secure hosting facilities that also adhere to
appropriate physical and logical access controls in accordance with Microsoft
IT Corporate HBI policies.
Sensitive waste material is disposed of in a secure fashion.
Sensitive documents and materials are shredded before disposal. Media used to
collect or transmit sensitive information are rendered unreadable before
disposal. Other waste is disposed of in accordance with Microsoft’s normal
waste disposal requirements.
Cryptographic devices, smart cards, and other devices that
may contain private keys or key material will be physically destroyed or
zeroized, if deemed necessary, in accordance with the manufacturers’ guidance
prior to disposal. Authorization is required for the disposal of all storage
devices that contain key materials. Destruction of CA private keys shall be
approved by the PMA and shall be witnessed by at least 2 individuals in trusted
roles, and records of all disposals shall be maintained by Microsoft IT PKI.
Backups of the CAs, including backups of system
configurations and databases required to reconstitute PKI systems in the event
of failure, are made and transported, on a periodic basis, to a secured backup
location.
5.2.1 Trusted Roles and Authorized Roles
Personnel responsible for CA key
management, Certificate issuance, and management of CA system functions are
considered to serve in “trusted roles.”
Within the Microsoft IT PKI, the following trusted roles are
implemented:
·
Microsoft
ISRM IAM - fulfills and supports PKI systems and services including designing,
building and testing the SSL PKI system, and cryptographic key management
operations, providing support to customers (i.e., internal business groups),
administration of service requests, and providing support for Microsoft IT SSL
RA application and underlying infrastructure.
· Policy Management Authority (PMA) - provides guidance for PKI policies.
· Microsoft IT PKI Development Team - provides
development, and testing support for the SSL RA application.
· Microsoft Domains Team - provides support for the Microsoft IT SSL RA operations by
reviewing certificates requests that are flagged for exception due to domain
ownership.
· ISRM- provides information security related support for the
Microsoft IT SSL CA hierarchy, including performing risk and threat
assessments, periodic vulnerability assessments, and log review and monitoring.
Personnel responsible for supporting
the PKI operations, but do not have a direct role in CA key management,
Certificate issuance, and management of CA system functions are considered to
serve in “authorized roles.”
· Site Services/Global Capacity
Services- provides facilities assistance
including installation of new hardware and hardware monitoring and support.
· Physical Security - responsible for the physical security of the data center
and storage of the cryptographic materials in safes.
· Infrastructure and Networking - responsible for managing and maintaining the infrastructure
and network components of the Microsoft IT SSL hierarchy.
5.2.2 Number of Persons Required per Task
Cryptographically sensitive operations within the Microsoft
IT PKI such as access to cryptographic materials and systems, CA key
generation, CA key recovery, CA key activation and CA system configuration
requires the participation of multiple trusted individuals in accordance with
§6.2.2. Other operations may require only one trusted or authorized individual.
5.2.3 Identification and Authentication for Each Role
See section §5.3.2.
5.2.4 Roles Requiring Separation of Duties
Roles requiring separation of duties include, but may not be
limited to, the following:
· Handling of CA key life-cycle
management activities, Certificate life-cycle management activities, CA system
installation, administration, and maintenance activities
· Activation materials shareholders
· Independent witness during the key
ceremony
· RA application developers
· RA application operational support
The Microsoft IT
PKI operation relies on Microsoft Corporate HR policies for personnel
management to ensure the trustworthiness of its staff.
5.3.1 Qualifications, Experience, and Clearance Requirements
The recruitment and selection practices for Microsoft
personnel shall take into account the background, qualifications, and
experience requirements of each position, which are compared against the
profiles of potential candidates.
5.3.2 Background Check Procedures
Microsoft IT PKI trusted personnel undergo background checks prior to
their commencement of employment at Microsoft. Such checks include:
·
Social Security Number trace;
·
County, State, and Federal criminal records search
(7 year search, where permitted by resident jurisdiction);
·
Employment verification (last 7 years or last three
employers); and
·
Education verification (highest degree obtained).
Microsoft IT PKI employees are required to sign a
nondisclosure agreement and are required to adhere to Microsoft corporate
policies and procedures.
Microsoft IT PKI personnel in trusted roles receive training
as needed to perform assigned job responsibilities relating to CA or RA
operations:
· Basic PKI concepts
· Roles and responsibilities
· The policies and practices noted in
the CP/CPS
· Microsoft IT PKI security and
operational policies and procedures
Training curriculum and renewal requirements are determined
by Microsoft IT PKI management.
5.3.4 Retraining Frequency and Requirements
Microsoft IT PKI provides refresher training as needed to
ensure a consistently high level of awareness and proficiency.
5.3.5 Job Rotation Frequency and Sequence
No stipulation.
5.3.6 Sanctions for Unauthorized Actions
Unauthorized actions or other violations of Microsoft IT PKI
policies and procedures, and practices as described in this CP/CPS will result
in disciplinary action. Disciplinary actions are taken in accordance with
Microsoft corporate polices.
5.3.7 Independent Contractor Requirements
Microsoft IT PKI may employ contractors as necessary.
Contractors are required to follow a similar background check process as
full-time employees.
5.3.8 Documentation Supplied to Personnel
Microsoft IT PKI personnel are required to read this CP/CPS.
They are also provided with Microsoft IT PKI policies, procedures, and other
documentation relevant to their job functions.
5.4.1 Types of Events Recorded
At a minimum, Microsoft IT PKI logs the
following events:
· Significant
SSL CA key life-cycle management events including CA key generation, CA key
backup, and other cryptographic device life-cycle management information
· CA
and Subscriber Certificate life-cycle management events
· Logical
security-related events
· Physical
security-related events
Audit logs are either manually or
automatically recorded by the system and include event identifying parameters
i.e., time, date, and personnel involved in the action.
5.4.2 Frequency of Processing Log
Audit logs are reviewed on an as-needed basis and
significant events may be documented in a review summary. Exception based
entries corresponding to alerts or irregularities are highlighted and actions,
if any, to resolve noted issues are also documented.
5.4.3 Retention Period for Audit Log
Logs are retained as auditable proof of Microsoft IT PKI’s
practices as follows:
|
Log
Type |
Minimum
Retention Period |
|
Logs of
CA key management activity |
7 years
|
|
CA
system logs of Certificate management activity |
7 years |
|
Operating
system logs |
7 years |
|
Physical
access system logs |
7 years |
|
Manual
logs of physical access |
7 years |
|
Video
recording of CA facility access |
90 days |
Production and archived logical and physical audit logs are
protected using a combination of physical and logical access controls.
5.4.5 Audit Log Backup Procedures
Audit logs are backed up on a periodic basis.
5.4.6 Audit Collection System (Internal vs. External)
Automated audit data is generated and recorded at the
application, database, network and operating system level. Manually generated
audit data is recorded.
5.4.7 Notification to Event-Causing Subject
Where an event is logged by the audit collection system, no
notice is required to be given to the individual or system that caused the event.
5.4.8 Vulnerability Assessments
Microsoft IT PKI
maintains detection and prevention controls to protect Certificate Systems
against viruses and malicious software and document and follows a vulnerability
correction process that addresses the identification, review, response, and
remediation of vulnerabilities.
Microsoft IT SSL
CA systems will undergo periodic vulnerability scans and penetration testing as
determined by Microsoft IT PKI.
5.5.1 Types of Records Archived
Microsoft IT PKI maintains an archive of logs that include
the recorded events specified in §5.4.1.
5.5.2 Retention Period for Archive
5.5.4 Archive Backup Procedures
No stipulation.
5.5.5 Requirements for Time-Stamping of Records
Certificates,
CRLs, and other database entries shall contain time and date information.
5.5.6 Archive Collection System (Internal or External)
No stipulation.
5.5.7 Procedures to Obtain and Verify Archive Information
Only authorized
designated individuals from Microsoft IT PKI are able to obtain access to
archived records.
CAs managed and operated by Microsoft IT PKI will stop
issuing SSL Certificates and will be re-keyed or terminated before the maximum
key usage period for Certificate signing is reached in accordance with §6.3.2.
The SSL CAs will continue to sign and publish CRLs until the end of the CA
Certificate lifetime. The key changeover or CA termination process will be
performed such that it causes minimal disruption to Subscribers and Relying
Parties. Affected entities will be notified prior to the planned key
changeover.
5.7
Compromise and Disaster Recovery
5.7.1 Incident and Compromise Handling Procedures
5.7.2 Computing Resources, Software, and/or Data Are
Corrupted
See §5.7.4.
5.7.3 Entity Private Key Compromise Procedures
If Microsoft IT PKI discovers, or
has reason to believe, that there has been a compromise of a Microsoft IT SSL
CA private key, Microsoft IT PMA will immediately convene an emergency incident
response team to assess the situation to determine the degree and scope of the
incident and take appropriate action as specified in Microsoft’s corporate information
security incident response plan.
5.7.4 Business Continuity Capabilities after a Disaster
Microsoft IT PKI has established and maintains the following
business continuity capabilities and practices to address recovery of the
Microsoft IT PKI service and systems in the event of a disaster:
· Secure storage of backup
cryptographic hardware modules containing copies of the private keys for SSL
CAs managed and operated by Microsoft IT PKI at a Microsoft facility away from
the primary location;
· Secure storage of the requisite
activation materials at a secured facility away from the primary location;
·
Secure
storage of daily backups of system, data, and configuration information;
· Secured disaster recovery site at a
Microsoft facility away from the primary location where operations can be
restored in the event of a disaster at the primary location;
· A business continuity strategy that
defines the acceptable Recovery Time Objective (RTO) and Recovery Point
Objective (RPO). The RTO is a maximum
three days except for the certificate revocation and CRL publishing which shall
have an RTO of twenty four hours. The RPO is at maximum twenty-four hours;
· Disaster recovery plan; and
· Disaster recovery testing performed
on at least an annual basis.
In the event that it is necessary to terminate the operation
of a Microsoft IT SSL CA, management will plan and coordinate the termination
process with its Subscribers and Relying Parties such that the impact of the
termination is minimized. Microsoft IT PKI will provide as much prior notice as
is reasonable to Subscribers and Relying Parties and preserve relevant records
for a period of time deemed fit for functional and legal purposes. Relevant
Certificates will be revoked no later than the time of the termination.
6. Technical Security Controls
6.1 Key Pair Generation and Installation
6.1.1.1 CA Key Pair Generation
Microsoft IT PKI generates CA key pairs for the Microsoft IT
SSL CAs following a defined key generation process, which is witnessed and
performed in the presence of multiple trusted roles.
CA key pair generation is performed in accordance with the
“Microsoft IT PKI Key Generation Ceremony Process” and “Microsoft IT PKI
Operations Guide” during formal, pre-scripted ceremonies using hardware
cryptographic modules that meet the requirements of §6.2.1. The CA Key
Generation Script (“script”) defines the specific steps performed during the
installation and key generation ceremony and serves as an audit record. The
script includes a list of the specific CA hardware and cryptographic materials
required to be accessed during the ceremony.
Key ceremonies require the participation of multiple trusted
employees, functioning in the capacity of pre-allocated ceremony roles, and are
performed in controlled secure facilities. These facilities are secured with
multiple tiers of physical security and are used to store production and backup
copies of CA systems and key materials required for the key generation
activities. Physical access is restricted using dual-controlled, two factor
authentication access control systems, including biometrics. Access to and
within the facilities is monitored via closed circuit televisions (CCTV) and
recorded.
Activation materials are retrieved by assigned shareholders
prior to the key ceremony. A log is maintained of all items removed and
replaced from their storage location citing the individuals’ names, date, time,
and purpose of retrieval. Major ceremony activities are witnessed by an
independent observer who attests to the integrity of the ceremony and records
exceptions to the pre-scripted processes.
6.1.1.2 Subscriber Key Pair Generation
Microsoft
IT PKI does not generate Subscriber keys. Subscriber key pairs are generated by
the end entity Microsoft IT PKI Subscriber.
6.1.2 Private Key Delivery to Subscriber
Not
applicable.
6.1.3 Public Key Delivery to
Certificate Issuer
Issuing
CA Certificate requests are generated by the Microsoft ISRM IAM team using a
controlled process that requires the participation of multiple trusted
individuals. CA Certificate requests are PKCS #10 requests (signing request)
and accordingly contain the requesting CA’s public key and are digitally signed
by the requesting CA’s private key. The PKCS #10 requests are sent to third party
provider to be digitally signed by the third party Root CA.
For
Subscriber Certificate requests, the Subscriber’s public key is submitted to
the CA using a Certificate request signed with the Subscriber’s private key.
This mechanism ensures that:
·
The
public key has not been modified during transit and
·
The
sender possesses the private key corresponding to the transferred public key
6.1.4 CA Public Key Delivery to
Relying Parties
When
Microsoft IT PKI updates signature key pairs it shall distribute the new public
key in a secure fashion. The new public key may be distributed in a new CA
Certificate obtained from the issuer(s) of the current CA Certificate(s).
Microsoft IT SSL CA Certificates will be published in one or both of the
following locations:
·
Within
the RA database and/or
·
Published
within the Microsoft IT PKI repository (See §2.1).
Issuing
CAs under this CP/CPS that sign end-entity Certificate requests and CRLs shall
be generated as defined below:
· Microsoft IT SSL SHA1 shall be generated with 2048 bit RSA Public Key Modulus
· Microsoft
IT SSL SHA2 shall be generated with 4096 bit RSA Public Key Modulus
· Microsoft
IT TLSCA 1 shall be generated with
4096 bit RSA Public Key Modulus
· Microsoft
IT TLSCA 2 shall be generated with
4096 bit RSA Public Key Modulus
· Microsoft
IT TLSCA 4 shall be generated with
4096 bit RSA Public Key Modulus
· Microsoft
IT TLSCA 5 shall be generated with
4096 bit RSA Public Key Modulus
End-entity
Certificates shall contain 2048 bit or greater RSA public key modulus.
6.1.6 Public Key Parameters
Generation and Quality Checking
Not applicable.
6.1.7 Key Usage Purposes (as per X.509 v3 Key Usage Field)
Key pairs may be used as follows:
|
Entity |
Permitted Key Usage |
|
Issuing CA |
Signing of Subscriber Certificates, CRL Signing, and OCSP Responder Certificates Signing |
|
Subscriber |
Server Authentication, Client Authentication Exceptions to the above noted key uses should be approved on a
case-by-case basis |
The key usage extension is set in
accordance with the Certificate profile requirements specified in §7.1.
6.2
Private Key Protection and Cryptographic Module Engineering Controls
6.2.1 Cryptographic Module Standards
and Controls
CA key pairs are generated in and
protected by hardware security modules certified to FIPS 140 level 3 that meet
industry standards for random number and prime number generation. It is
recommended that the Subscriber use a FIPS 140-1 validated cryptographic module
for key generation.
6.2.2 Private Key (m of n) Multi-Person Control
The participation of at least two trusted employees is
required to perform sensitive CA private key operations (e.g., signing
operations, CA key backup, CA key recovery, etc.) for the Issuing CAs. This is
enforced through Microsoft IT PKI’s allocation among persons or groups with
trusted roles of the activation materials, required for CA key activation and
through physical access controls specified in §5.1.2 over the CA systems and
related activation materials.
A threshold (m) number of card sets of the total number (n)
of activation materials, created and distributed for each hardware
cryptographic module security world, is required to initialize a CA private
key. At least one operator card with passphrase shall be required for
activating the private key. Production security worlds created after the
approval and publication of this CP/CPS shall have an “m of n” configuration to
support distribution of materials to individual key shareholders while
maintaining redundancy to achieve operational efficiencies.
|
Assurance Level |
Required Operator Card Set Threshold |
Required Administrator Card Set Threshold |
|
High Assurance |
1 Operator Card |
3 Administrator Cards |
Exceptions to these policies require the approval of the Microsoft
IT PKI Policy Management Authority.
Furthermore, Microsoft IT PKI production security worlds shall not be
shared with non-Microsoft IT PKI groups or used to perform signing activities
for test CAs.
CA key pairs, managed and hosted by Microsoft IT PKI group
shall comply with private key multi-person access control requirements defined
in this CP/CPS.
The escrow of CA and Subscriber private keys is not
supported by Microsoft IT PKI.
Backups of CA private keys are created to facilitate
disaster recovery and business continuity capabilities. Backups of key files
are stored in encrypted form and protected in accordance with media
handling practices stated in §5.1.6.
Microsoft IT PKI does not provide private key backup for end entity Subscriber
private keys.
Microsoft IT SSL CA and Subscriber
private keys are not archived.
6.2.6 Private Key Transfer Into or From a Cryptographic
Module
CA private keys are generated, stored and backed up in an
encrypted form, and used only within industry-standard hardware cryptographic
modules meeting the requirements of §6.2.1.
6.2.7 Private Key Storage on Cryptographic Module
See §6.2.6.
6.2.8 Method of Activating Private Key
Cryptographic modules used for CA private key protection
utilize a smart card based activation mechanism (Operator Card) as described in
CP/CPS §6.2.2.
It is recommended that Subscriber private keys be protected
with a pass phrase.
6.2.9 Method of Deactivating Private Key
Cryptographic modules that have been activated shall be
secured from unauthorized access. After use, the cryptographic module shall be
deactivated by removal of the inserted OCS from the card reader. Hardware
cryptographic modules are removed and stored in a secure container when not in
use.
6.2.10 Method of Destroying Private Key
CA private keys shall be destroyed when they are no longer
needed, or when the Certificates to which they correspond expire or are
revoked, in the presence of multiple trusted personnel after approval from the
PKI Policy Management Authority (PMA).
When CA key destruction is required, CA private keys shall be completely
destroyed through zeroization and/or physical destruction of the device in
accordance with manufacturers’ guidelines.
6.2.11 Cryptographic Module Rating
See §6.2.1.
6.3
Other Aspects of Key Pair Management
Copies of CA and Subscriber SSL Certificates shall be
archived in accordance with §5.5.
6.3.2 Certificate Operational Periods and Key Pair Usage
Periods
For Certificates issued after the
effective date of this CP/CPS, the following key and Certificate usage periods
shall be deployed.
|
Entity Type |
Maximum Key Usage Period For Certificate signing |
Maximum Key Usage Period For CRL signing |
Maximum Certificate Validity Period |
|
Issuing CAs |
|||
|
Subscribers |
N/A |
N/A |
2 Years |
Exceptions to the
above noted operational and usage periods shall be approved by the PKI Policy
Management Authority.
Hardware modules used for CA private key protection utilize
a secret sharing mechanism to activate the CA private key under multi-user
control as described in §6.2.2. Key material created during formal key
generation ceremonies, used only when needed, and stored in a secure site when
not in use.
6.4.1 Activation Data Generation and Installation
See §6.4.
6.4.2 Activation Data Protection
See §6.4.
6.4.3 Other Aspects of Activation Data
See §6.4.
6.5
Computer Security Controls
6.5.1 Specific Computer Security Technical Requirements
Microsoft IT PKI systems use industry standard CA software,
custom developed RA software, commercially available cryptographic modules, and
smart cards. Microsoft IT PKI systems maintaining CA software and data files
are secured from unauthorized access. Authorized access to production servers
is limited to those individuals with a valid business reason for such access.
Multi-factor authentication is enforced for user accounts capable of directly
causing Certificate issuance.
PKI systems comply with Microsoft corporate information
security policies.
6.5.2 Computer Security Rating
No stipulation.
6.6 Life-Cycle Technical Controls
6.6.1 System Development Controls
Custom developed software is developed, tested, and deployed
in accordance with documented Microsoft Systems Development Lifecycle (SDLC)
processes. Approvals by management are required for key stages of development,
including requirements specifications, design review, user acceptance testing,
and deployment.
6.6.2 Security Management Controls
Microsoft IT PKI follows Microsoft
corporate information security policies for securing and maintaining the
Microsoft IT SSL PKI systems. Periodic risk assessments and threat analysis are
performed by the ISRM team to identify threats and vulnerabilities in the
Microsoft IT SSL PKI systems.
Logical access to the Microsoft IT
SSL CA systems is restricted to authorized individuals in trusted roles.
Microsoft IT SSL PKI systems are configured by removing/disabling accounts,
applications, services, protocols, and ports that are not used in the CA’s
operations. Anti-virus and malware detection software is installed on CA
systems.
6.6.3 Life Cycle Security Control
Microsoft IT PKI segments Certificate systems into zones based
on their functional, logical and physical (including location) relationship.
The zones, on which the Microsoft IT
SSL CAs reside, are protected from unauthorized users through a series of network
and host based firewalls and other monitoring and detection systems. Firewalls are configured with rules that
support the services, protocols, ports, and communications that Microsoft IT
PKI has identified as necessary for its operations.
Certificates, CRLs, OCSP entries, and other revocation
database entries contain time and date information.
7.
Certificate, CRL, and OCSP Profiles
CA Certificates within the Microsoft IT PKI shall be X.509
Version 3 and shall conform to the RFC 5280: Internet X.509 Public Key
Infrastructure Certificate and CRL profile, dated May 2008. As applicable to
the Certificate type, Certificates conform to the current version of the
CA/Browser Forum Baseline Requirements for the Issuance and Management of
Publicly-Trusted Certificates.
At a minimum the following basic fields and prescribed field
attributes are utilized within the CA Certificate profile. Less stringent
exceptions to the given basic profile shall be approved on a case-by-case basis
by the PKI Policy Management Authority based on a valid documented business
case.
SSL SHA-1 Issuing CA Certificate Profile
|
Description
|
|
|
Version
|
V3 |
|
Serial
Number |
Positive
integer uniquely assigned by Third Party Root |
|
Signature
Algorithm Identifier |
SHA-1 |
|
Issuer |
CN =
Baltimore CyberTrust Root OU =
CyberTrust O =
Baltimore C = IE |
|
Valid
From |
Date and time of Certificate
issuance. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. |
|
Valid
To |
Date and time of Certificate
expiration. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. Maximum Certificate validity
period is 4 years from issuance. |
|
Subject
|
CN =
Microsoft IT SSL SHA1 OU =
Microsoft IT O =
Microsoft Corporation L =
Redmond S =
Washington C = US |
|
Public
Key |
RSA
(2048 bits) |
|
Certificate
Policies |
1.3.6.1.4.1.6334.1.0,
1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http
URL of the Third Party Root CA’s CRL service> |
|
Authority
Information Access |
<http
URL of the Third Party Root CA’s OCSP Responder, if available> |
|
Basic
Constraints |
Subject
Type = CA Path
Length Constraint = 0 |
|
Key
Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended
Key Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
SSL SHA-1
End Entity Certificate Profile
End-user Subscriber Certificates shall be X.509 Version 3.
|
Field |
Description
|
|
Version
|
V3 |
|
Serial
Number |
Positive
integer uniquely assigned by CA that exhibits at least 8 bytes of entropy |
|
Signature
Algorithm Identifier |
SHA-1 |
|
Issuer |
CN =
Microsoft IT SSL SHA1 OU =
Microsoft IT O =
Microsoft Corporation L =
Redmond S =
Washington C = US |
|
Valid
From |
Date and time of Certificate
issuance. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. |
|
Valid
To |
Date and time of Certificate
expiration. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. Maximum Certificate validity
period is 24 months from issuance for Fully Qualified Domain Names and public
IP address certificates. |
|
Subject
|
CN =
<Subscriber Name> OU =
<Subscriber Organization Unit>
(Optional) O =
<Subscriber Company Name>
(Optional, Required if OU is present) i.e.,
Microsoft or Microsoft Corporation S =
State OR L = Locality (Optional, Required if
O is present) C =
Country Name (Optional, Required if O is present) |
|
Public
Key |
RSA
(2048) |
|
Subject
Alternate Name |
<DNS
Name(s)> |
|
Certificate
Policies |
1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
[1]CRL Distribution Point
Distribution Point Name:
Full Name: URL=
http://mscrl.microsoft.com/pki/mscorp/crl/msitwww1(n*).crl [2]CRL Distribution Point
Distribution Point Name:
Full Name:
URL= http://crl.microsoft.com/pki/mscorp/crl/msitwww1(n*).crl *an incremental integer value assigned by Windows
Active Directory Certificate Services that represents the version
number of the CRL |
|
Authority
Information Access |
[1]Authority Info Access Access
Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)
Alternative Name:
URL= http://www.microsoft.com/pki/mscorp/msitwww1(n*).crt [2]Authority Info Access Access
Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)
Alternative Name:
URL=http:// ocsp.msocsp.com |
|
Basic
Constraints |
NOT
POPULATED |
|
Key
Usage |
(Optional) |
|
Extended
Key Usage |
id-kp-serverAuth id-kp-clientAuth
|
SSL SHA-2
Issuing CA Certificate Profile
|
Field |
Description
|
|
Version
|
V3 |
|
Serial
Number |
Positive
integer uniquely assigned by Third Party Root |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer |
CN =
Baltimore CyberTrust Root OU =
CyberTrust O =
Baltimore C = IE |
|
Valid
From |
Date and time of Certificate
issuance. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. |
|
Valid
To |
Date and time of Certificate
expiration. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. Maximum Certificate validity
period is 4 years from issuance. |
|
Subject
|
CN =
Microsoft IT SSL SHA2 OU =
Microsoft IT O =
Microsoft Corporation L =
Redmond S =
Washington C = US |
|
Public
Key |
RSA
(4096 bits) |
|
Certificate
Policies |
2.5.29.32.0
(anyPolicy) – All Issuance Policies 1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http
URL of the Third Party Root CA’s CRL service> |
|
Authority
Information Access |
[1]Authority Info Access Access Method=On-line Certificate Status
Protocol (1.3.6.1.5.5.7.48.1) Alternative Name: URL= <http URL of the Third Party Root CA’s OCSP
Responder, if available> |
|
Basic
Constraints |
Subject
Type = CA Path
Length Constraint = 0 |
|
Key
Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended
Key Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
TLS SHA-2 Issuing CA 1 Certificate Profile
|
Field
|
Description
|
|
Version |
V3 |
|
Serial Number |
Positive
integer uniquely assigned by Third Party Root |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer
|
CN = Baltimore
CyberTrust Root OU = CyberTrust O = Baltimore C = IE |
|
Valid From |
Date
and time of Certificate issuance. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. |
|
Valid To |
Date
and time of Certificate expiration. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. Maximum
Certificate validity period is 8 years from issuance. |
|
Subject |
CN = Microsoft IT TLS CA 1 OU = Microsoft IT O = Microsoft Corporation L = Redmond S = Washington C = US |
|
Public Key |
RSA (4096 bits)
|
|
Certificate
Policies |
2.5.29.32.0
(anyPolicy) – All Issuance Policies 1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http URL of
the Root CA’s CRL service> |
|
Authority
Information Access |
[1]Authority Info Access Access Method=On-line Certificate Status
Protocol (1.3.6.1.5.5.7.48.1) Alternative Name: URL= <http URL of the Third
Party Root CA’s OCSP Responder, if available> |
|
Basic
Constraints |
Subject Type =
CA Path Length
Constraint = 0 |
|
Key Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended Key
Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
TLS SHA-2 Issuing CA 2 Certificate Profile
|
Field
|
Description
|
|
Version |
V3 |
|
Serial Number |
Positive
integer uniquely assigned by Root |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer
|
CN = Baltimore
CyberTrust Root OU = CyberTrust O = Baltimore C = IE |
|
Valid From |
Date
and time of Certificate issuance. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. |
|
Valid To |
Date
and time of Certificate expiration. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. Maximum
Certificate validity period is 8 years from issuance. |
|
Subject |
CN = Microsoft IT TLS CA 2 OU = Microsoft IT O = Microsoft Corporation L = Redmond S = Washington C = US |
|
Public Key |
RSA (4096 bits)
|
|
Certificate
Policies |
2.5.29.32.0
(anyPolicy) – All Issuance Policies 1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http URL of
the Root CA’s CRL service> |
|
Authority
Information Access |
[1]Authority Info Access Access Method=On-line Certificate Status
Protocol (1.3.6.1.5.5.7.48.1) Alternative Name: URL= <http URL of the Third
Party Root CA’s OCSP Responder, if available> |
|
Basic
Constraints |
Subject Type =
CA Path Length
Constraint = 0 |
|
Key Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended Key
Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
TLS SHA-2 Issuing CA 4 Certificate Profile
|
Field
|
Description
|
|
Version |
V3 |
|
Serial Number |
Positive
integer uniquely assigned by Root |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer
|
CN = Baltimore
CyberTrust Root OU = CyberTrust O = Baltimore C = IE |
|
Valid From |
Date
and time of Certificate issuance. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. |
|
Valid To |
Date
and time of Certificate expiration. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. Maximum
Certificate validity period is 8 years from issuance. |
|
Subject |
CN = Microsoft IT TLS CA 4 OU = Microsoft IT O = Microsoft Corporation L = Redmond S = Washington C = US |
|
Public Key |
RSA (4096 bits)
|
|
Certificate
Policies |
2.5.29.32.0
(anyPolicy) – All Issuance Policies 1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http URL of
the Root CA’s CRL service> |
|
Authority
Information Access |
[1]Authority Info Access Access Method=On-line Certificate Status
Protocol (1.3.6.1.5.5.7.48.1) Alternative Name: URL= <http URL of the Third
Party Root CA’s OCSP Responder, if available> |
|
Basic
Constraints |
Subject Type =
CA Path Length
Constraint = 0 |
|
Key Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended Key
Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
TLS SHA-2 Issuing CA 5 Certificate Profile
|
Field
|
Description
|
|
Version |
V3 |
|
Serial Number |
Positive
integer uniquely assigned by Root |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer
|
CN = Baltimore
CyberTrust Root OU = CyberTrust O = Baltimore C = IE |
|
Valid From |
Date
and time of Certificate issuance. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. |
|
Valid To |
Date
and time of Certificate expiration. Time synchronized to Master Clock of U.S.
Naval Observatory. Encoded in accordance with RFC 5280. Maximum
Certificate validity period is 8 years from issuance. |
|
Subject |
CN = Microsoft IT TLS CA 5 OU = Microsoft IT O = Microsoft Corporation L = Redmond S = Washington C = US |
|
Public Key |
RSA (4096 bits)
|
|
Certificate
Policies |
2.5.29.32.0
(anyPolicy) – All Issuance Policies 1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
<http URL of
the Root CA’s CRL service> |
|
Authority
Information Access |
[1]Authority Info Access Access Method=On-line Certificate Status
Protocol (1.3.6.1.5.5.7.48.1) Alternative Name: URL= <http URL of the Third
Party Root CA’s OCSP Responder, if available> |
|
Basic
Constraints |
Subject Type =
CA Path Length
Constraint = 0 |
|
Key Usage |
KeyCertSign
cRLSign digitalSignature |
|
Extended Key
Usage |
id-kp-serverAuth id-kp-clientAuth id-kp-OCSPSigning |
SHA-2
End Entity Certificate Profile
End-user Subscriber Certificates shall be X.509 Version 3.
|
Field |
Description
|
|
Version
|
V3 |
|
Serial
Number |
Positive
integer uniquely assigned by CA that exhibits at least 8 bytes of entropy |
|
Signature
Algorithm Identifier |
SHA256 |
|
Issuer |
CN = <Issuing
CA’s common name> OU =
Microsoft IT O =
Microsoft Corporation L =
Redmond S =
Washington C = US |
|
Valid
From |
Date and time of Certificate
issuance. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. |
|
Valid
To |
Date and time of Certificate
expiration. Time synchronized to Master Clock of U.S. Naval Observatory.
Encoded in accordance with RFC 5280. Maximum Certificate validity period is 24
months from issuance for Fully Qualified Domain Names and public IP Address
certificates. |
|
Subject
|
CN =
<Subscriber Name> OU =
<Subscriber Organization Unit> (Optional) O =
<Subscriber Company Name> (Optional, Required if OU is present) i.e.,
Microsoft or Microsoft Corporation S =
State OR L = Locality (Optional, Required if
O is present) C =
Country Name (Optional, Required if O is present) |
|
Public
Key |
RSA
(2048 bits) |
|
Subject
Alternate Name |
<DNS
Name(s)> |
|
Certificate
Policies |
1.3.6.1.4.1.311.42.1 |
|
CRL
Distribution Points |
[1]CRL Distribution Point
Distribution Point Name:
Full Name:
URL= http://mscrl.microsoft.com/pki/mscorp/crl/<Issuing
CA>(n*).crl (or) http://mscrl.microsoft.com/pki/mscorp/crl/msitwww2(n*).crl [1]CRL Distribution Point
Distribution Point Name:
Full Name:
URL= http://crl.microsoft.com/pki/mscorp/crl/<Issuing
CA>(n*).crl (or) http://crl.microsoft.com/pki/mscorp/crl/msitwww2(n*).crl More than one CRL Distribution Points may be
specified in the end entity certificate. *an incremental integer value assigned by Windows
Active Directory Certificate Services that represents the version
number of the CRL |
|
Authority
Information Access |
[1]Authority Info Access Access
Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)
Alternative Name:
URL= http://www.microsoft.com/pki/mscorp/msitwww2(n*).crt (or) http://www.microsoft.com/pki/mscorp/<Issuing CA
name>.crt
Access
Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)
Alternative Name:
URL=http:// ocsp.msocsp.com |
|
Basic
Constraints |
NOT
POPULATED |
|
Key
Usage |
(Optional) |
|
Extended
Key Usage |
id-kp-serverAuth id-kp-clientAuth
|
Microsoft IT PKI
hierarchy Certificates are X.509 version 3 Certificates.
The extensions defined for Microsoft IT PKI X.509 v3
Certificates provide methods for associating additional attributes with users
or public keys and for managing the certification hierarchy. Each extension in
a Certificate is designated as either critical or non-critical.
Certificate extensions and their
criticality, as well as cryptographic algorithm object identifiers, are
populated according to the IETF RFC 5280 standards and recommendations and CA /
Browser Forum Baseline Requirements. The name forms for Subscribers are
enforced through Microsoft IT PKI internal policies and the authentication
policies described elsewhere in this CP/CPS.
7.1.2.1 Key Usage
The key usage extension defines the purpose (e.g.,
encipherment, signature, Certificate signing) of the key contained in the
Certificate. This extension SHALL appear in Certificates that contain public
keys that are used to validate digital signatures on other public key
Certificates or CRLs. When this extension appears, it may be marked critical.
7.1.2.2 Certificate Policies Extension
The Certificate Policies extension
of Microsoft IT PKI X.509 Version 3 Certificates includes a policy identifier,
that indicates a Certificate Policy asserting Microsoft IT SSL CA's adherence
to and compliance with CA/Browser Forum’s SSL Baseline Requirements.
7.1.2.3 Subject Alternative Names
The subjectAltName extension of Microsoft IT PKI X.509
Version 3 Certificates is utilized. This extension shall contain at least one
entry. Each entry shall be either a dNSName containing the Fully-Qualified
Domain Name or an IPAddress containing the IP address of a server.
7.1.2.4 Basic Constraints
BasicConstraints extension shall not
be present in Microsoft IT SSL CA end-user Subscriber Certificates.
7.1.2.5 Extended Key Usage
Microsoft IT PKI shall make use of
the ExtendedKeyUsage extension for certain types of X.509 Version 3
Certificates. This extension indicates one or more purposes for which the
certified public key may be used, in addition to or in place of the basic purposes
indicated in the key usage extension.
7.1.2.6 CRL Distribution Points
Microsoft IT PKI X.509 Version 3 end
user subscriber certificates include the CRLDistributionPoints extension
containing the URL of the location where a Relying Party can obtain a CRL to
check the certificate’s status. The criticality field of this extension is set
to FALSE.
7.1.2.7 Authority Key Identifier
Most Microsoft IT PKI X.509 Version
3 end user subscriber certificates include the authority key identifier
extension to provide a means of identifying the public key corresponding to the
private key used to sign the respective Certificate. When used, the criticality
field of this extension is set to FALSE.
7.1.2.8 Subject Key Identifier
Most Microsoft IT PKI X.509 Version
3 end user Subscriber Certificates include the subject key identifier extension
to provide a means of identifying the occurrence of particular public key. When
used, the criticality field of this extension is set to FALSE.
7.1.3 Algorithm Object Identifiers
Certificates issued under this CP/CPS shall use signature
algorithms indicated by the following OIDs:
|
Signature
Algorithm |
OID ASN.1 |
Status |
|
sha1WithRSAEncryption |
{iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-1(1) |
Acceptable
only for publishing CRLs and OCSP responses. |
|
sha256WithRSAEncryption |
{iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-1(1) |
Acceptable |
|
sha384WithRSAEncryption |
{iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-1(1) sha384WithRSAEncryption(12)} |
Acceptable |
|
sha512WithRSAEncryption |
{iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-1(1) sha512WithRSAEncryption(13)} |
Acceptable |
Certificates created with deprecated signature algorithms
adhere to all the requirements of this CP/CPS with the exception that the
Certificate is generated with deprecated signature algorithm.
Certificates issued under this CP/CPS shall use the following
OIDs to identify the algorithm associated with the subject key:
|
rsaEncryption |
{iso(1) member-body(2) us(840)
rsadsi(113549) pkcs(1) pkcs-1(1) 1} |
Issuing CA and Subscriber
Certificates are populated in accordance with Certificate profiles listed in §
7.1.
No additional stipulation other than
§ 7.1.
7.1.6 Certificate Policy Object Identifier
The Microsoft IT PKI CP/CPS will use
a Policy Identifier of 1.3.6.1.4.1.311.42.1
in all Certificates it issues from the effective date of this version of the
CP/CPS.
7.1.7 Usage of Policy Constraints Extension
The Microsoft IT PKI CP/CPS will be
hot linked from the Certificate Policies in all Certificates it issues from the
publication of this version of the CP/CPS.
7.1.8 Policy Qualifiers Syntax and Semantics
No
stipulation.
7.1.9 Processing Semantics for the Critical Certificate
Policies
No
stipulation.
The following CRL profile is used by Issuing CAs within the
Microsoft IT SSL CA hierarchy.
|
Field |
Description
|
|
Version
|
V2 |
|
Signature
|
SHA1 or
SHA2 (depending upon the Issuing CA) |
|
Issuer |
Subject
of Issuer |
|
This
Update (Effective Date) |
Date
and time of CRL issuance. |
|
Next
Update |
8 days (not to exceed) |
|
Revoked
Certificates |
List of
information regarding revoked Certificates. CRL entries include: ·
Serial Number, identifying the revoked
Certificate ·
Revocation Date, including the date and time
of Certificate revocation |
|
CRL
Entry Extensions |
Not
used. |
See §7.2.
7.2.2 CRL and CRL Entry Extensions
The profile for OCSP responses issued by the Microsoft IT
PKI conforms to the standards as described in [RFC2560].
Microsoft IT Issuing CAs shall issue Version 1 OCSP
responses.
No stipulation.
8. Compliance
Audit and Other Assessments
8.1 Frequency and Circumstances of Assessment
CAs within the Microsoft IT SSL CA
hierarchy are subject to an annual examination to assess compliance with the
Microsoft IT PKI SSL policies and procedures (including the Microsoft IT PKI
SSL CP/CPS), the AICPA/CICA WebTrust for Certification Authorities (WebTrust
for CAs) examination criteria, and the WebTrust for CAs SSL Baseline
Requirements examination criteria.
8.2 Identity/Qualifications of Assessor
Auditors demonstrating proficiency
in public key infrastructure technology, information security tools and
techniques, security auditing, and the third-party attestation function shall
perform the annual examination.
8.3 Assessor's Relationship to Assessed Entity
The entity that performs the annual
examination is organizationally independent of Microsoft IT PKI.
8.4 Topics Covered by Assessment
The scope of the annual examination
shall include the requirements of the Microsoft IT PKI CP/CPS, CA environmental
controls, CA key management, and Certificate life-cycle management.
8.5 Actions Taken as a Result of Deficiency
Significant deficiencies identified
during the compliance examination will result in a determination of actions to
be taken. Microsoft IT PKI makes this determination with input from the
auditor. Management is responsible for ensuring that corrective action plans
are promptly developed and corrective action is taken within a period of time
commensurate with the significance of such matters identified.
Compliance examination results are
communicated to Microsoft IT PKI management and others deemed appropriate by
management.
9. Other Business
and Legal Matters
9.1.1 Certificate Issuance or Renewal Fees
Microsoft IT PKI currently does not
charge Certificate issuance or Certificate revocation fees and reserves the
right to charge fees for these or other Microsoft IT PKI provided services in
the future.
Microsoft IT PKI reserves the right
to charge a fee for making a Certificate available in a repository or
otherwise.
9.1.3 Revocation or Status Information Access Fees
Microsoft IT PKI does not charge a
fee as a condition of making the CRLs and OCSP status checking available as
required by §4.9 and §4.10 available in a repository or otherwise available to
Relying Parties. Microsoft IT PKI reserves the right to charge a fee for
providing customized CRLs or other value-added revocation and status
information services.
Microsoft IT PKI does not charge a
fee for accessing this CP/CPS. However, any use of the CP/CPS for purposes
other than viewing the document, including reproduction, redistribution,
modification, or creation of derivative works, may be subject to a license
agreement with the entity holding the copyright to the document.
Not Applicable.
Not Applicable.
Microsoft IT PKI customers that
maintain assets outside the realm of the Microsoft IT PKI environment shall
have access to sufficient financial resources to support operations and perform
duties in accordance with the Microsoft IT PKI CP/CPS.
9.2.3 Insurance or Warranty Coverage for End-Entities
Not Applicable.
9.3 Confidentiality of Business Information
9.3.1 Scope of Confidential Information
Sensitive Microsoft IT PKI
information shall remain confidential to Microsoft IT PKI. The following
information is considered confidential to Microsoft IT PKI and may not be
disclosed:
· Microsoft IT PKI policies,
procedures and technical documentation supporting this CP/CPS;
· Subscriber registration records,
including: Certificate applications, whether approved or rejected, proof of
identification documentation and details;
· Certificate information collected as
part of the registration records, beyond that which is required to be included
in Subscriber Certificates;
· Audit trail records;
· Any private key within the Microsoft
IT SSL CA hierarchy; and
· Compliance audit results except for
WebTrust for CAs audit reports which may be published at the discretion of Microsoft
IT PKI Management.
9.3.2 Information Not Within the Scope of Confidential
Information
This CP/CPS and the Certificates and CRLs issued by
Microsoft IT PKI are not considered confidential.
9.3.3 Responsibility to Protect Confidential Information
Microsoft IT PKI participants
receiving private information shall secure it from compromise and disclosure to
third parties.
9.4 Privacy of Personal Information
See §9.3.1.
Microsoft IT PKI shall follow the
governing principles established by the Microsoft privacy statement located at http://privacy.microsoft.com/en-us/default.aspx with regards to the collection, handling, and storage of
private information during the provision of Microsoft IT SSL CA services.
9.4.2 Information Treated as Private
Any information about Subscribers
that is not publicly available through the content of the issued Certificate
and CRLs is treated as private.
9.4.3 Information Not Deemed Private
Subject to local laws, all
information made public in a Certificate is deemed not private.
9.4.4 Responsibility to Protect Private Information
Microsoft IT PKI participants
receiving private information shall secure it from compromise and disclosure to
third parties and shall comply with all local privacy laws in their
jurisdiction.
9.4.5 Notice and Consent to Use Private Information
Unless where otherwise stated in
this CP/CPS, the applicable Privacy Policy or by agreement, private information
will not be used without the consent of the party to whom that information
applies. This section is subject to applicable privacy laws.
9.4.6 Disclosure Pursuant to Judicial or Administrative
Process
Microsoft IT PKI shall be entitled
to disclose Confidential/Private Information if, in good faith, Microsoft IT
PKI believes that:
· Disclosure is necessary in response
to subpoenas and search warrants
· Disclosure is necessary in response
to judicial, administrative, or other legal process during the discovery
process in a civil or administrative action, such as subpoenas,
interrogatories, requests for admission, and requests for production of
documents.
9.5 Intellectual Property rights
The following are the property of
Microsoft:
· This CP/CPS;
· Policies and procedures supporting
the operation of Microsoft IT PKI;
· Certificates and CRLs issued by
Microsoft IT PKI managed CAs;
· Distinguished Names (DNs) used to
represent entities within the Microsoft IT SSL CA hierarchy; and
· CA infrastructure and Subscriber key
pairs.
Microsoft IT PKI participants
acknowledge that Microsoft IT PKI retains all Intellectual Property Rights in
and to this CP/CPS.
9.6 Representations and Warranties
Microsoft IT PKI warrants and promises to provide
certification authority services substantially in compliance with this CP/CPS
and the relevant Microsoft Certificate Policies. Microsoft IT PKI makes no
other warranties or promises and has no further obligations to Subscribers or
Relying Parties, except as set forth under this CP/CPS.
9.6.1 CA Representations and Warranties
See §9.6
9.6.2 RA Representations and Warranties
See §9.6
9.6.3 Subscriber
Representations and Warranties
See §9.6
9.6.4 Relying
Party Representations and Warranties
See §9.6
9.6.5
Representations and Warranties of Other Participants
See §9.6
Except for express warranties stated in this CP/CPS,
Microsoft IT PKI disclaims all other warranties, promises and other
obligations. In addition, Microsoft IT PKI is not liable for any loss:
·
To
CA or RA services due to war, natural disasters or other uncontrollable forces;
·
Incurred
between the time a Certificate is revoked and the next scheduled issuance of a
CRL;
·
Due
to unauthorized use of Certificates issued by Microsoft IT PKI, or use of
Certificates beyond the prescribed use defined by this CP/CPS;
·
Arising
from the negligent or fraudulent use of Certificates or CRLs issued by the
Microsoft IT PKI; and
·
Due
to disclosure of personal information contained within Certificates, CRLs or
OCSP responses.
In no event shall Microsoft IT PKI be liable for any
indirect, consequential, incidental, special or punitive damages, or for any
loss of profits, loss of data, or other indirect or consequential damages
arising from or in connection with the use, delivery, license, availability or
non-availability, performance or nonperformance of Certificates, digital
signatures, the repository, or any other transactions or services offered or
contemplated by this CP/CPS, even if Microsoft IT PKI has been advised of the
possibility of such damages.
By their applying for and being issued Certificates, or
otherwise relying upon such Certificates, Subscribers, and Relying Parties,
agree to indemnify, defend, and hold harmless the CA, and its personnel,
organizations, entities, subcontractors, suppliers, vendors, representatives,
and agents from any errors, omissions, acts, failures to act, or negligence
resulting in liability, losses, damages, suits, or expenses of any kind, due to
or otherwise proximately caused by the use or publication of a Certificate that
arises from the Subscriber’s failure to provide the CA with current, accurate,
and complete information at the time of Certificate application or the
Subscriber’s errors, omissions, acts, failures to act, and negligence.
The CA and its RAs are not the agents, fiduciaries,
trustees, or other representatives of Subscribers or Relying Parties.
The CP/CPS becomes effective upon
publication in the Microsoft IT PKI documentation repository.
This CP/CPS, as amended from time to
time, shall remain in force until it is replaced by a new version. Amendments
to this CP/CPS become effective upon publication in the Microsoft IT PKI
documentation repository.
No stipulation.
9.10.3 Effect of Termination and Survival
No stipulation.
9.11 Individual Notices and Communications with Participants
Severance or merger may result in changes to the scope,
management, and/or operations of this CA.
In such an event, this CP/CPS may require modification as well. Changes to the operations will occur
consistent with the CA’s disclosed CP/CPS management processes.
9.12.1 Procedure for Amendment
Amendments to this CP/CPS may be
made by the Microsoft IT PKI and shall be approved by the Microsoft IT PKI
Policy Management Authority as per §1.5.4
9.12.2 Notification Mechanism and
Period
No stipulation.
9.12.3 Circumstances under Which OID
Must Be Changed
No stipulation.
9.13 Dispute Resolution Provisions
In the event of any dispute
involving the services or provisions covered by this CP/CPS, the aggrieved
party shall notify a member of Microsoft IT PKI management regarding the
dispute. Microsoft IT PKI management will involve the appropriate Microsoft
personnel to resolve the dispute.
This CP/CPS is governed by the laws in force in the State of
Washington and the United States of America.
9.15 Compliance with Applicable Law
See §9.14.
This CP/CPS shall be binding on all
successors of the parties.
If any provision of this CP/CPS is
found to be unenforceable, the remaining provisions shall be interpreted to
best carry out the reasonable intent of the parties. It is expressly agreed
that every provision of this CP/CPS that provides for a limitation of liability
or exclusion of damages, disclaimer or limitation of any warranties, promises
or other obligations, is intended to be severable and independent of any other
provision and is to be enforced as such.
This CP/CPS shall be interpreted consistently with what is
commercially reasonable in good faith under the circumstances and considering
its international scope and uniform application. Failure by any person to
enforce a provision of this CP/CPS will not be deemed a waiver of future
enforcement of that or any other provision.
Any notice, demand, or request pertaining to this CP/CPS
shall be communicated either using digitally signed messages consistent with
this CP/CPS, or in writing. Electronic communications shall be effective when
received by the intended recipient.
See §9.16
See §9.16
See §9.16
9.16.4 Enforcement (attorneys' fees
and waiver of rights)
See §9.16
See §9.16
See §9.16