In order to have access to one cabinets, how many person may be notified?

在2023年1月29日星期日 UTC+8 21:05:41<wash...@gmail.com> 写道:

> Thanks.
> Q: what ensures a person cannot access cabinet A from one environment and 
> then cabinet B from a second environment? Is there physical separation of 
> the cabinets, or are they still physically located near each other where a 
> reasonable individual might incidentally open the wrong cabinet?
> Ans: The global and domestic systems are installed in separated cabinets 
> located in the same secure room. Each cabinet is equipped with a padlock 
> and numeric combination lock to prevent single person from accessing the 
> global and domestic cabinets alone.
> The passwords of the numeric combination locks are kept by the security 
> administrator of the secure room. The brass keys of padlocks are kept by 
> operational staffs of the control room outside layers of secure rooms. 
> Cabinets can be opened after authorization from the management according to 
> the physical access requests from system administrators. System 
> administrators do not have privileges to open the cabinets.
> 在2023年1月29日星期日 UTC+8 07:25:49<ke ju> 写道:
>
>> On Thursday, January 26, 2023 at 7:18:53 PM UTC-5 wash...@gmail.com 
>> wrote:
>> Thanks. Happy New Year. Sorry, the Spring Festival holiday delayed some 
>> time.
>>
>> BJCA separates and operates two independent certification systems in the 
>> following aspects:
>> 1. Certification Practice Statement
>> i. Global Certification system CPS 
>> <https://www.bjca.cn/u4d/%E7%94%B5%E5%AD%90%E8%AE%A4%E8%AF%81%E4%B8%9A%E5%8A%A1%E8%A7%84%E5%88%99%EF%BC%88CPS%EF%BC%89/files/%E5%8C%97%E4%BA%AC%E6%95%B0%E5%AD%97%E8%AE%A4%E8%AF%81%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E5%85%A8%E7%90%83%E8%AE%A4%E8%AF%81%E4%BD%93%E7%B3%BB%E7%94%B5%E5%AD%90%E8%AE%A4%E8%AF%81%E4%B8%9A%E5%8A%A1%E8%A7%84%E5%88%99%20Beijing%20Certificate%20Authority%20Co.,%20Ltd.%20Global%20Certification%20Practice%20Statement.pdf>
>> ii. Domestic Certification system CPS 
>> <https://www.bjca.cn/u4d/%E7%94%B5%E5%AD%90%E8%AE%A4%E8%AF%81%E4%B8%9A%E5%8A%A1%E8%A7%84%E5%88%99%EF%BC%88CPS%EF%BC%89/files/%E5%8C%97%E4%BA%AC%E6%95%B0%E5%AD%97%E8%AE%A4%E8%AF%81%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%E7%94%B5%E5%AD%90%E8%AE%A4%E8%AF%81%E4%B8%9A%E5%8A%A1%E8%A7%84%E5%88%99.pdf>
>>
>> 2. The two independent certification management systems are operated 
>> within its own segmented networks and resources such as cabinets, server 
>> hardwares, operating system environments and HSMs are independent and not 
>> shared.
>>
>> what ensures a person cannot access cabinet A from one environment and 
>> then cabinet B from a second environment?
>>
>> Is there physical separation of the cabinets, or are they still 
>> physically located near each other where a reasonable individual might 
>> incidentally open the wrong cabinet?
>> 3. A Policy Management Authority (PMA) within the company is responsible 
>> for monitoring the operations of the two certification management systems. 
>> The CEO of the company is the chief of the PMA now. All members of the PMA 
>> are employees of the company. 
>>
>> 4. The operation team members have to be approved by the PMA and trained 
>> for qualification before being enlisted in the trusted-role list of the 
>> Global Certification Management System to get into regular operation 
>> activities. Physical and logical access priviledges for Global 
>> Certification Management System are issued following the roles of 
>> operations in the trusted-role list. All members of the operation team are 
>> full-time employees working for the company.
>>  
>> 5. Automated monitoring system which detects unauthorized changes to 
>> critical files or send alerts for security events has been implemented.
>>  
>> 6. Automation has been implemented on the global certification system for 
>> checking, such as linting tools certlint, x509lint and zlint.
>>
>> 7. In order to maintain compliance, BJCA has built up ISO 27001 ISMS as 
>> the foundation of its management and got certified. BJCA conducts regular 
>> internal audits and risk assessments following its ISMS management system 
>> requirements. BJCA also accept external audits for the two independent 
>> certification management systems:
>> i. The global certification system: WebTrust.
>> ii. The domestic certification system: regular audit of the authority 
>> department of the government to maintain its certification service license.
>> 在2023年1月27日星期五 UTC+8 01:03:56<bwi...@mozilla.com> 写道:
>> I have added BJCA's email addresses, including "wash...@gmail.com", to 
>> the list with posting privileges. Hopefully this will enable some responses.
>> Thanks,
>> Ben
>>
>> On Thu, Jan 26, 2023 at 9:00 AM Ben Wilson <bwi...@mozilla.com> wrote:
>> From BJCA - 
>> Hi Ben,
>> When we reply to the forum through our gmail account, we are prompted 
>> that we have no permission. This gmail address (wash...@gmail.com) 
>> represents BJCA, please help to add permissions so that we can participate 
>> in the discussion, thank you.
>>
>> lip...@bjca.org.cn
>> ------------------------ 
>> I'll see what I can do to get this straightened out.
>> Ben
>>
>> On Wed, Jan 25, 2023 at 7:06 PM Kurt Seifried <ku...@seifried.org> wrote:
>> Is BJCA.cn still on this list? if we've only got 3 weeks (21 days) and 
>> they take 2+ days to answer we're going to run out of time pretty quickly. 
>>
>> On Mon, Jan 23, 2023 at 6:11 PM Kurt Seifried <ku...@seifried.org> wrote:
>> This seems to mostly depend upon BJCA.cn disclosing information to us. 
>> Information we have asked for in the past but been told is "confidential" 
>> and so on.
>>
>> So with this in mind: BJCA.cn: can you please explain how your company is 
>> structured to prevent subversion of the root certificate authority? E.g. 
>> technical measures can be circumvented trivially if the people running them 
>> are told to do so (and if they don't they can be replaced with people that 
>> will). 
>>
>> On Mon, Jan 23, 2023 at 4:57 PM Ben Wilson <bwi...@mozilla.com> wrote:
>> All,
>>
>> We recently concluded a six-week public discussion on the CCADB Public 
>> list for the root inclusion request of Beijing CA (BJCA), 
>> https://groups.google.com/a/ccadb.org/g/public/c/o9lbCbr92Ug/m/lPkqrHF1DQAJ. 
>> This 
>> email is to announce a continued 3-week discussion of BJCA’s inclusion 
>> application to be held on this list. The reason for this continued 
>> discussion is that we need to gather more information to better understand 
>> BJCA’s operational and management controls and the One Pass software (among 
>> any other issues that might be raised during this continued discussion).
>>
>> The current state of our understanding is summarized in the post 
>> referenced in the link above. That is, BJCA operates two different 
>> infrastructures, one that meets the needs of its national government and 
>> another that aims to meet the needs of the global public. Also, according 
>> to BJCA, the One Pass software was mislabelled as spyware.
>>
>> There hasn’t been enough evidence yet to make conclusions about these two 
>> questions–how is management and operation of the two infrastructures 
>> separated, given that they both are part of the same company, and did the 
>> Beijing One Pass software have any components that would be considered 
>> spyware? I would expect that BJCA might want to respond initially to these 
>> questions, even if they believe that they have answered them adequately in 
>> the past.  
>>
>> We need fact-based discourse that answers these questions.
>>
>> In addition to these questions, does anyone have examples of other 
>> conduct by BJCA or insights into its practices? Can anyone provide more 
>> information about BJCA’s information security practices, compliance with 
>> international standards, or performance under other metrics that will help 
>> determine its future conduct, were it to become a publicly trusted CA?
>>
>> I’d like to continue this discussion through Monday, February 13, 2023. 
>> As with the public discussion held on CCADB Public, please reply directly 
>> in this discussion thread with thoughtful and constructive comments, and a 
>> representative of BJCA must respond here to all questions or issues that 
>> are raised.
>>
>> Thanks,
>>
>> Ben
>>
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "dev-secur...@mozilla.org" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to dev-security-po...@mozilla.org.
>> To view this discussion on the web visit 
>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaRA81B1SF%3DSRF%3DPsJJcNsoq70hDZO703yOtG4FMPajTw%40mail.gmail.com
>>  
>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaRA81B1SF%3DSRF%3DPsJJcNsoq70hDZO703yOtG4FMPajTw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>>
>> -- 
>> Kurt Seifried (He/Him)
>> ku...@seifried.org
>>
>>
>> -- 
>> Kurt Seifried (He/Him)
>> ku...@seifried.org
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/a2908103-c519-4d01-a55b-a190b8937c16n%40mozilla.org.

Reply via email to