BS ISO 21188:2018
$215.11
Public key infrastructure for financial services. Practices and policy framework
Published By | Publication Date | Number of Pages |
BSI | 2018 | 120 |
This document sets out a framework of requirements to manage a PKI through certificate policies and certification practice statements and to enable the use of public key certificates in the financial services industry. It also defines control objectives and supporting procedures to manage risks. While this document addresses the generation of public key certificates that might be used for digital signatures or key establishment, it does not address authentication methods, non-repudiation requirements or key management protocols.
This document draws a distinction between PKI systems used in closed, open and contractual environments. It further defines the operational practices relative to financial-services-industry-accepted information systems control objectives. This document is intended to help implementers to define PKI practices that can support multiple certificate policies that include the use of digital signature, remote authentication, key exchange and data encryption.
This document facilitates the implementation of operational, baseline PKI control practices that satisfy the requirements for the financial services industry in a contractual environment. While the focus of this document is on the contractual environment, application of this document to other environments is not specifically precluded. For the purposes of this document, the term “certificate” refers to public key certificates. Attribute certificates are outside the scope of this document
This document is targeted for several audiences with different needs and therefore the use of this document will have a different focus for each.
Business managers and analysts are those who require information regarding using PKI technology in their evolving businesses (e.g. electronic commerce); see Clauses 1 to 6.
Technical designers and implementers are those who are writing their certificate policies and certification practice statement(s); see Clauses 6 to 7 and Annexes A to G.
Operational management and auditors are those who are responsible for day-to-day operations of the PKI and validating compliance to this document; see Clauses 6 to 7.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
9 | Introduction |
11 | 1 Scope 2 Normative references |
12 | 3 Terms and definitions |
18 | 4 Abbreviated terms |
19 | 5 Public key infrastructure (PKI) 5.1 General |
20 | 5.2 What is PKI? 5.2.1 General |
21 | 5.2.2 Public key infrastructure process flow 5.3 Business requirement impact on PKI environment 5.3.1 General 5.3.2 Illustration of certificate application in a closed environment |
22 | 5.3.3 Illustration of certificate application in a contractual PKI environment |
23 | 5.3.4 Illustration of certificate application in an open environment |
25 | 5.4 Certification authority (CA) |
26 | 5.5 Business perspectives 5.5.1 General 5.5.2 Business risks 5.5.3 Applicability 5.5.4 Legal issues 5.5.5 Regulatory issues 5.5.6 Business usage issues |
27 | 5.5.7 Interoperability issues |
28 | 5.5.8 Audit journal requirements |
29 | 5.6 Certificate policy (CP) 5.6.1 General 5.6.2 Certificate policy usage |
30 | 5.6.3 Certificate policies within a hierarchy of trust |
31 | 5.6.4 Certificate status 5.7 Certification practice statement (CPS) 5.7.1 General 5.7.2 Authority |
32 | 5.7.3 Purpose 5.7.4 Level of specificity 5.7.5 Approach 5.7.6 Audience and access 5.8 Agreements |
33 | 5.9 Time-stamping |
34 | 5.10 Trust models 5.10.1 Trust model considerations |
35 | 5.10.2 Wildcard considerations 5.10.3 Relying party considerations |
36 | 6 Certificate policy and certification practice statement requirements 6.1 Certificate policy (CP) |
38 | 6.2 Certification practice statement (CPS) 7 Certification authority control procedures 7.1 General |
39 | 7.2 CA environmental controls 7.2.1 Certification practice statement and certificate policy management |
40 | 7.2.2 Security management |
41 | 7.2.3 Asset classification and management |
42 | 7.2.4 Personnel security |
43 | 7.2.5 Physical and environmental security |
44 | 7.2.6 Operations management |
45 | 7.2.7 System access management |
47 | 7.2.8 Systems development and maintenance 7.2.9 Business continuity management |
49 | 7.2.10 Monitoring and compliance 7.2.11 Audit logging |
53 | 7.3 CA key life cycle management controls 7.3.1 CA key generation |
54 | 7.3.2 CA key storage, back-up and recovery |
55 | 7.3.3 CA public key distribution |
56 | 7.3.4 CA key usage 7.3.5 CA key archival and destruction |
57 | 7.3.6 CA key compromise |
58 | 7.4 Subject key life cycle management controls 7.4.1 CA-provided subject key generation services (if supported) 7.4.2 CA-provided subject key storage and recovery services (if supported) |
59 | 7.4.3 Integrated circuit card (ICC) life cycle management (if supported) |
61 | 7.4.4 Requirements for subject key management |
62 | 7.5 Certificate life cycle management controls 7.5.1 Subject registration |
63 | 7.5.2 Certificate renewal (if supported) |
64 | 7.5.3 Certificate rekey 7.5.4 Certificate issuance |
65 | 7.5.5 Certificate distribution |
66 | 7.5.6 Certificate revocation 7.5.7 Certificate suspension (if supported) |
67 | 7.5.8 Certificate validation services |
68 | 7.6 Controlled CA termination |
69 | 7.7 CA certificate life cycle management controls — subordinate CA certificate |
71 | Annex A (informative) Management by certificate policy |
80 | Annex B (informative) Elements of a certification practice statement |
95 | Annex C (informative) Object identifiers (OID) |
97 | Annex D (informative) CA key generation ceremony |
101 | Annex E (informative) Mapping of RFC 2527 to RFC 3647 |
102 | Annex F (normative) Certification authority audit journal contents and use |
105 | Annex G (informative) Alternative trust models |
117 | Bibliography |