All,

It is extremely frustrating to deal with ETSI audits, because they typically do 
not specifically state the audit period start and end dates. And it is very 
difficult to determine if their audit statement is for a point-in-time audit 
versus a period-of-time audit. 

They have a concept of their ETSI certification being valid for one year, and 
will list an expiration date for their ETSI certification that is in the 
future. Many of the CAs mistakenly enter their ETSI certification dates for the 
audit period start and end dates.

This is an ongoing problem that I'm very frustrated with.

~~

Definition (From BRs):
Audit Period: In a period‐of‐time audit, the period between the first day 
(start) and the last day of operations (end) covered by the auditors in their 
engagement. (This is not the same as the period of time when the auditors are 
on‐site at the CA.)"

~~

Here is the requirement according to the Baseline Requirements:
https://cabforum.org/baseline-requirements-documents/
Section 8.1:"The period during which the CA issues Certificates SHALL be 
divided into an unbroken sequence of audit periods.
An audit period MUST NOT exceed one year in duration."

Here's the requirement according to Mozilla's Policy:
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy#audit-parameters
"Full-surveillance period-of-time audits MUST be conducted and updated audit 
information provided no less frequently than annually. Successive audits MUST 
be contiguous (no gaps)."

~~

The April 2017 CA Communication specified the content we expect to be in all 
audit statements now.
https://wiki.mozilla.org/CA/Communications#April_2017

Every CA stated that they understand the requirements, and no CA raised concern 
about audit periods.
https://ccadb-public.secure.force.com/mozillacommunications/CACommResponsesOnlyReport?CommunicationId=a05o000003WrzBC&QuestionId=Q00018,Q00032

So, why are so many ETSI audits still failing to meet these requirements?

~~

Mozilla's policy lists the specific information that must be included in each 
audit statement document:
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy#public-audit-information

~~

How do we get *ALL* auditors to start meeting our audit statement requirements 
ASAP?

Why haven't *ALL* included CAs communicated these requirements to their 
auditors?

Why am I seeing so many audit statements (particularly ETSI audit statements) 
that fail to meet our requirements?

As you can see, I'm frustrated with this situation. But I will greatly 
appreciate thoughtful and constructive ideas on how to fix this.

Thanks,
Kathleen
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to