I believe we discussed this at the CA/B Forum meeting in Cupertino where it was explained that an RA can be audited with the existing ETSI/WebTrust criteria by only listing the necessary criteria relevant to RA operations. So, for the ETSI example, an RA would be audited against ETSI EN 319 411-1 by listing the most of the requirements of 319 401 and the relevant sections of 411-1 for RA operations. This scope would be clearly indicated in the attestation letter, allowing the CA to have an independent auditor's opinion of the RA operations of a delegated third party.

I believe WebTrust for RAs has made a great job of defining the relevant criteria and separating them in a different document. ETSI has done something similar by identifying "service components" in EN 319 411-1 (OVR, REG, REV, DIS, and so on).


Dimitris.

On 18/6/2019 8:51 μ.μ., Ryan Sleevi via Public wrote:


On Tue, Jun 18, 2019 at 1:35 PM Jeremy Rowley via Public <[email protected] <mailto:[email protected]>> wrote:

    I think I heard the WebTrust auditors say last week that they have
    finished or nearly finished the WebTrust for RAs criteria. The
    language from Section 8.4 of the guidelines reads:

    “For Delegated Third Parties which are not Enterprise RAs,, then
    the CA SHALL obtain an audit report, issued under the auditing
    standards that underlie the accepted audit schemes found in
    Section 8.1, that provides an opinion whether the Delegated Third
    Party’s performance complies with either the Delegated Third
    Party’s practice statement or the CA’s Certificate Policy and/or
    Certification Practice Statement. If the opinion is that the
    Delegated Third Party does not comply, then the CA SHALL not allow
    the Delegated Third Party to continue performing delegated functions.”

    We know some CAs use RAs that are not audited under WebTrust/ETSI
    because “there is no appropriate audit standard”. Now that there
    is an audit standards, it seems to me this criteria goes into
    effect immediately and any RA not audited would cause the CA to be
    out of compliance with the BRs. No additional ballot required
    since the concept is already baked into the BRs.

    Anyone have a different interpretation?  If not, when is the exact
    date that the audits should be done? Already?


TL;DR: Don't worry. I don't think there's an impending doom date.

Officially, Chrome is not planning to immediately enforce the WebTrust for RAs audit, and is still evaluating the most effective means to use and consume this.

For best results, however, don't use RAs ;)

Here's the alternative interpretation I'll over you:

The "auditing standards that underlie the accepted audit criteria" are, in the case of WebTrust, are SSAE 18 (US), CSAE 3000 - 3001 (CA), and ISAE 3000 (elsewhere), with potentially jurisidiction-specific (self-?)regulatory requirements or modifications, similar to the US/CA harmonization with IFAC.

The "auditing standards that underlie the accepted audit criteria" are, for ETSI EN 319 411-1 and ETSI EN 319 403, either (depending on your perspective of "standard"), going to be seen as:
  a) ETSI EN 319 411-1 / ETSI EN 319 403
  b) ISO/IEC 17065

The former takes the view that the ETSI ESI documents are themselves the standards for auditing, in that they define a set of standards appropriate for "an" audit scheme, although absent the eIDAS Regulation lacks any normative guidance about who the defining authority is for the appropriate auditor (compared to IFAC and its constituent organizations, which does).

The latter takes the view that the ETSI ESI documents are themselves adopted from the ISO/IEC standards and guidance on the development of certification schemes (which covers a broad scheme of activities), and that any scheme derived from the principles of 17065 is suitably empowered. It, similarly, lacks the guidance as to who can perform the assessments, since that is the role of the scheme operator (e.g. EU in the case of eIDAS)

The "nice" thing about these interpretations is that for CAs that are concerned about being beyond reproach, but still make the (unfortunate) choice to make use of delegated third parties, they can read these requirements as using the relevant criteria from WebTrust or ETSI, under the existing supervisory scheme, and argue compliance. CAs that don't like to/don't want to know what their RAs are doing, and aren't as concerned about security, could reasonably argue that the applicability of the underlying standard means the CA defines what the expectations are (for example, an "Agreed Upon Procedures" report - which I'm sure Don and Jeff will jump in mentioning the CSAE limitations there), and then allow 'anyone' to perform that audit, modulo the IFAC standards with respect to professional licensure.



_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

_______________________________________________
Public mailing list
[email protected]
https://cabforum.org/mailman/listinfo/public

Reply via email to