Evaluation of Functionalities in Technology as it supports CA operations

 

Key Life Cycle Management

  • CA key pair generation, including:
  • What key sizes are required
  • What key generation algorithm is required
  • Whether key generation is performed in hardware or software
  • What standards are required for the module used to generate the keys (for example, the required ISO 15782-1/FIPS 140-1/ANSI X9.66 level of the module)
  • For what purposes the key may be used
  • For what purposes usage of the key should be restricted
  • The usage periods or active lifetimes for the CA public and the private key, respectively

CA private key protection including:

  • What standards are required for the module used to store the CA private signature key (for example, the required ISO 15782-1/FIPS 140-1/ANSI X9.66 level of the module)
  • Whether the CA private key is maintained under m out of n multiperson control
  • Whether the CA private signature key is escrowed
  • Whether the CA private signing key is backed up
  • Whether the CA private and public signature keys are archived

Whether the CA provides subscriber key management services and a description of the services provided CA public key distribution, including a description of how the CA's public key is provided securely to subscribers and relying parties Key changeover, including a description of the procedures used to provide a new public key to a CA's users.

 

Subscriber key pair generation (if the CA provides subscriber key pair generation services), including:

  • How the subscriber's private key is provided securely to the subscriber
  • What key sizes are required
  • What key generation algorithm is required
  • Whether key pair generation is performed in hardware or software
  • What standards are required for the module used to generate the keys (for example, the required ISO 15782-1/FIPS 140-1/ANSI X9.66 level of the module)
  • For what purposes the key may be used
  • For what purposes usage of the key should be restricted

Subscriber private key protection (if the CA provides subscriber key management services), including:

  • Whether the subscriber's decryption private key is backed up
  • Whether the subscriber's decryption private key is archived
  • Under what conditions a subscriber's private key can be destroyed
  • Whether subscriber private decryption keys are escrowed by the CA.

Routine rekey, including a description of the identification and authentication and rekey request verification procedures

Rekey after revocation or expiration, including a description of the identification and authentication and rekey request verification procedures for rekey after the subject certificate has been revoked.

Certificate distribution, including a description of the CA's established mechanism (for example, a repository such as a directory) for making available to relying parties the certificates and Certificate Revocation Lists that it issues

 

Provision of certificate status information, including:

  • On-line revocation/status checking availability
  • If an online status mechanism is used (for example, OCSP), certificate status request content requirements
  • If an online status mechanism is used (for example, OCSP), definitive response message data content requirements
  • What key is used to digitally sign definitive response messages

Event logging, including the following:

  • How frequently the CA archives event journal data
  • How frequently event journals are reviewed