Skip to content

Commit

Permalink
Reorder 2j, 2l
Browse files Browse the repository at this point in the history
It seems to be more natural this way. By appending to the end of Section
2, we avoid confusion with references to the provisions. So 2j becomes
2q and 2l becomes 2p.
  • Loading branch information
Tobias S. Josefowitz committed May 13, 2021
1 parent 3bf881b commit 63d2d1e
Showing 1 changed file with 7 additions and 6 deletions.
13 changes: 7 additions & 6 deletions docs/NSR.md
Expand Up @@ -142,18 +142,12 @@ h. Have a policy that requires Trusted Roles to log out of or lock workstations

i. Have a procedure to configure workstations with inactivity time-outs that log the user off or lock the workstation after a set time of inactivity without input from the user (the CA or Delegated Third Party MAY allow a workstation to remain active and unattended if the workstation is otherwise secured and running administrative tasks that would be interrupted by an inactivity time-out or system lock);

j. Review accounts and access permissions at least every three (3) months or continuously monitor them for access that is no longer necessary for operation. Access that is identified to be no longer necessary for operation shall be removed.

If continuous monitoring is used, the approved access permission configurations shall be reviewed every six (6) months.

k. Lockout account access to Certificate Systems after no more than five (5) failed access attempts, provided that this security measure;

1. Is supported by the Certificate System,
2. Cannot be leveraged for a denial of service attack, and
3. Does not weaken the security of this authentication control;

l. Implement a process that disables all privileged access of an individual to Certificate Systems within twenty four (24) hours upon termination of the individual’s employment or contracting relationship with the CA or Delegated Third Party;

m. Enforce Multi-Factor Authentication OR multi-party authentication for administrator access to Issuing Systems and Certificate Management Systems;

n. Enforce Multi-Factor Authentication for all Trusted Role accounts on Certificate Systems (including those approving the issuance of a Certificate, which equally applies to Delegated Third Parties) that are accessible from outside a Secure Zone or High Security Zone; and
Expand All @@ -168,6 +162,13 @@ o. Restrict remote administration or access to an Issuing System, Certificate Ma
ii. secured in accordance with these Requirements, and
iii. that mediates the remote connection to the Issuing System.

p. Implement a process that disables all privileged access of an individual to Certificate Systems within twenty four (24) hours upon termination of the individual’s employment or contracting relationship with the CA or Delegated Third Party;

q. Review accounts and access permissions at least every three (3) months or continuously monitor them for access that is no longer necessary for operation. Access that is identified to be no longer necessary for operation shall be removed.

If continuous monitoring is used, the approved access permission configurations shall be reviewed every six (6) months.


# 3. Logging, Monitoring, and Alerting

Certification Authorities and Delegated Third Parties SHALL:
Expand Down

0 comments on commit 63d2d1e

Please sign in to comment.