RCAICPS
RCAICPS
Version 2.2
February 2019
The following definitions are to be used while reading this CPS. Unless otherwise specified,
CPS means CPS of RCAI. Words and expressions used herein and not defined but defined
in the Information Technology Act, 2000 and subsequent amendments, hereafter referred to
as the ACT shall have the meaning respectively assigned to them in the Act.
The following terms bear the meanings assigned to them hereunder and such definitions are
applicable to both the singular and plural forms of such terms:
“Auditor" means any accredited computer security professional or agency recognized and
engaged by CCA for conducting audit of operation of CA;
“CA” means a person or organization who has been granted a Licence to issue Digital
Signature Certificates under Section 24 of the IT Act, 2000;
Certificate Revocation List (CRL)—A periodically (or exigently) issued list, digitally
signed by Licenced CA or RCAI , of identified Digital Signature Certificates that have
been suspended or revoked prior to their expiration dates.
“Controller” or “CCA” means the Controller of Certifying Authorities appointed as per
Section 17 subsection (1) of the Act.
"Digital Signature" means authentication of any electronic record by a subscriber by
means of an electronic method or procedure in accordance with the provisions of section 3
of IT Act;
"Root Certificate"—CCA's self signed certificate which is at the root of the India PKI
hierarchy.
ii
4.8 Certificate Modification................................................................................................................. 12
4.9 Certificate Revocation ................................................................................................................... 12
4.9.1 Circumstance for Revocation of a Certificate.............................................................................. 13
4.9.2 Who Can Request Revocation of a Certificate ............................................................................ 13
4.9.3 Procedure for Revocation Request ............................................................................................. 14
4.9.4 Revocation Request Grace Period .............................................................................................. 14
4.9.5 Time within which CCA must Process the Revocation Request.................................................... 14
4.9.6 Revocation Checking Requirements for Relying Parties .............................................................. 14
4.9.7 CRL Issuance Frequency .......................................................................................................... 14
4.9.8 Maximum Latency for CRLs..................................................................................................... 14
4.9.9 Online Revocation Checking Availability .................................................................................. 14
4.9.10 Online Revocation Checking Requirements................................................................................ 14
4.9.11 Other Forms of Revocation Advertisements Available ................................................................ 15
4.9.12 Special Requirements Related To Key Compromise.................................................................... 15
4.9.13 Circumstances for Suspension ................................................................................................... 15
4.9.14 Who can Request Suspension .................................................................................................... 15
4.9.15 Procedure for Suspension Request ............................................................................................. 15
4.9.16 Limits on Suspension Period ..................................................................................................... 15
4.10 Certificate Status Services ............................................................................................................. 15
4.10.1 Operational Characteristics ....................................................................................................... 15
4.10.2 Service Availability.................................................................................................................. 15
4.10.3 Optional Features ..................................................................................................................... 15
4.11 End of Subscription ....................................................................................................................... 15
4.12 Key Escrow and Recovery ............................................................................................................. 16
4.12.1 Key Escrow and Recovery Policy and Practices .......................................................................... 16
5 FACILITY MANAGEMENT & OPERATIONAL CONTROLS ................................................ 17
5.1 Physical Controls ........................................................................................................................... 17
5.1.1 Site Location & Construction .................................................................................................... 17
5.1.2 Physical Access ....................................................................................................................... 18
5.1.3 Power and Air Conditioning...................................................................................................... 18
5.1.4 Water Exposures ...................................................................................................................... 18
5.1.5 Fire Prevention & Protection ..................................................................................................... 18
5.1.6 Media Storage ......................................................................................................................... 19
5.1.7 Waste Disposal ........................................................................................................................ 19
5.1.8 Off-Site backup ....................................................................................................................... 19
5.2 Procedural Controls ...................................................................................................................... 19
5.2.1 Trusted Roles .......................................................................................................................... 19
5.2.2 Number of Persons Required per Task ....................................................................................... 20
iii
5.2.3 Identification and Authentication for Each Role.......................................................................... 21
5.2.4 Roles Requiring Separation of Duties ........................................................................................ 21
5.3 Personnel Controls ........................................................................................................................ 21
5.3.1 Qualifications, Experience, and Clearance Requirements............................................................. 21
5.3.2 Background Check Procedures .................................................................................................. 22
5.3.3 Training Requirements ............................................................................................................. 22
5.3.4 Retraining Frequency and Requirements .................................................................................... 22
5.3.5 Job Rotation Frequency and Sequence ....................................................................................... 23
5.3.6 Sanctions for Unauthorized Actions ........................................................................................... 23
5.3.7 Documentation Supplied To Personnel ...................................................................................... 23
5.4 Audit Logging Procedures ............................................................................................................. 23
5.4.1 Types of Events Recorded ........................................................................................................ 23
5.4.2 Frequency of Processing Audit Logs.......................................................................................... 26
5.4.3 Retention Period for Audit Logs ................................................................................................ 27
5.4.4 Protection of Audit Logs........................................................................................................... 27
5.4.5 Audit Log Backup Procedures ................................................................................................... 27
5.4.6 Audit Collection System (internal vs. external) ........................................................................... 27
5.4.7 Notification to Event-Causing Subject ....................................................................................... 27
5.4.8 Vulnerability Assessments ........................................................................................................ 27
5.5 Records Archival ........................................................................................................................... 28
5.5.1 Types of Records Archived ....................................................................................................... 28
5.5.2 Retention Period for Archive..................................................................................................... 28
5.5.3 Protection of Archive ............................................................................................................... 28
5.5.4 Archive Backup Procedures ...................................................................................................... 29
5.5.5 Requirements for Time-Stamping of Records ............................................................................. 29
5.5.6 Archive Collection System (internal or external)......................................................................... 29
5.5.7 Procedures to Obtain & Verify Archive Information ................................................................... 29
5.6 Key Changeover ............................................................................................................................ 29
5.7 Compromise and Disaster Recovery .............................................................................................. 29
5.7.1 Incident and Compromise Handling Procedures .......................................................................... 29
5.7.2 Computing Resources, Software, and/or Data are Corrupted ........................................................ 30
5.7.3 Private Key Compromise Procedures ......................................................................................... 30
5.7.4 Business Continuity Capabilities after a Disaster ........................................................................ 30
5.8 RCAI Termination ........................................................................................................................ 30
6 TECHNICAL SECURITY CONTROLS .............................................................................. 31
6.1 Key Pair Generation and Installation ............................................................................................ 31
6.1.1 Key Pair Generation ................................................................................................................. 31
6.1.2 Private Key Delivery to Subscriber ............................................................................................ 31
iv
6.1.3 Public Key Delivery to Certificate Issuer ................................................................................... 31
6.1.4 CA Public Key Delivery to Relying Parties ................................................................................ 31
6.1.5 Key Sizes ................................................................................................................................ 31
6.1.6 Public Key Parameters Generation and Quality Checking ............................................................ 32
6.1.7 Key Usage Purposes (as per X.509 v3 key usage field)................................................................ 32
6.2 Private Key Protection and Cryptographic Module Engineering Controls ..................................... 32
6.2.1 Cryptographic Module Standards and Controls ........................................................................... 32
6.2.2 Private Key Multi-Person Control ............................................................................................. 32
6.2.3 Private Key Escrow .................................................................................................................. 32
6.2.4 Private Key Backup.................................................................................................................. 32
6.2.5 Private Key Archival ................................................................................................................ 32
6.2.6 Private Key Transfer into or from a Cryptographic Module ......................................................... 32
6.2.7 Private Key Storage on Cryptographic Module ........................................................................... 33
6.2.8 Method of Activating Private Key ............................................................................................. 33
6.2.9 Methods of Deactivating Private Key......................................................................................... 33
6.2.10 Method of Destroying Private Key ............................................................................................ 33
6.2.11 Cryptographic Module Rating ................................................................................................... 33
6.3 Other Aspects Of Key Management............................................................................................... 33
6.3.1 Public Key Archival ................................................................................................................. 33
6.3.2 Certificate Operational Periods/Key Usage Periods ..................................................................... 33
6.4 Activation Data ............................................................................................................................. 33
6.4.1 Activation Data Generation and Installation ............................................................................... 33
6.4.2 Activation Data Protection ........................................................................................................ 34
6.4.3 Other Aspects of Activation Data .............................................................................................. 34
6.5 Computer Security Controls .......................................................................................................... 34
6.5.1 Specific Computer Security Technical Requirements .................................................................. 34
6.5.2 Computer Security Rating ......................................................................................................... 34
6.6 Life-Cycle Technical Controls ....................................................................................................... 35
6.6.1 System Development Controls .................................................................................................. 35
6.6.2 Security Management Controls ................................................................................................. 35
6.6.3 Life Cycle Security Controls ..................................................................................................... 35
6.7 Network Security Controls ............................................................................................................ 35
6.8 Time Stamping .............................................................................................................................. 36
7 CERTIFICATE, CRL AND OCSP PROFILES .................................................................. 37
7.1 Certificate Profile .......................................................................................................................... 37
7.2 CRL Profile ................................................................................................................................... 37
7.2.1 Full and Complete CRL ............................................................................................................ 37
7.2.2 Distribution Point Based Partitioned CRL .................................................................................. 37
v
7.3 OCSP Profile ................................................................................................................................. 37
7.3.1 OCSP Request Format .............................................................................................................. 37
7.3.2 OCSP Response Format ........................................................................................................... 38
8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS .......................................................... 39
8.1 Frequency or Circumstances of Assessments ................................................................................. 39
8.2 Identity and Qualifications of Assessor .......................................................................................... 39
8.3 Assessor’s Relationship to Assessed Entity ..................................................................................... 39
8.4 Topics Covered by Assessment ...................................................................................................... 39
8.5 Actions Taken as a Result of Deficiency ......................................................................................... 39
8.6 Communication of Results ............................................................................................................. 39
9 OTHER BUSINESS AND LEGAL MATTERS ..................................................................... 40
9.1 Fees ............................................................................................................................................... 40
9.1.1 Certificate Issuance and Renewal Fees ....................................................................................... 40
9.1.2 Certificate Access Fees ............................................................................................................. 40
9.1.3 Revocation Status Information Access Fees ............................................................................... 40
9.1.4 Fees for Other Services............................................................................................................. 40
9.1.5 Refund Policy .......................................................................................................................... 40
9.2 Financial Responsibility................................................................................................................. 40
9.2.1 Insurance Coverage .................................................................................................................. 40
9.2.2 Other Assets ............................................................................................................................ 40
9.2.3 Insurance or Warranty Coverage for End-Entities ....................................................................... 40
9.3 Confidentiality of Business Information ......................................................................................... 41
9.4 Privacy of Personal Information .................................................................................................... 41
9.5 Intellectual Property Rights ........................................................................................................... 41
9.5.1 Property Rights in Certificates and Revocation Information ......................................................... 41
9.5.2 Property Rights in the CPS ....................................................................................................... 41
9.5.3 Property Rights in Names ......................................................................................................... 41
9.5.4 Property Rights in Keys ............................................................................................................ 41
9.6 Representations and Warranties.................................................................................................... 41
9.6.1 CA Representations and Warranties ........................................................................................... 41
9.6.2 Subscriber ............................................................................................................................... 42
9.6.3 Relying Party ........................................................................................................................... 42
9.6.4 Representations and Warranties of Other Participants.................................................................. 42
9.7 Disclaimers of Warranties ............................................................................................................. 42
9.8 Limitations of Liabilities ................................................................................................................ 43
9.9 Indemnities.................................................................................................................................... 43
9.10 Term and Termination .................................................................................................................. 43
9.10.1 Term ....................................................................................................................................... 43
9.10.2 Termination ............................................................................................................................. 43
9.10.3 Effect of Termination and Survival ............................................................................................ 43
9.11 Individual Notices and Communications with Participants ............................................................ 43
vi
9.12 Amendments ................................................................................................................................. 44
9.12.1 Procedure for Amendment ........................................................................................................ 44
9.12.2 Notification Mechanism and Period ........................................................................................... 44
9.12.3 Circumstances under Which OID Must be Changed .................................................................... 44
9.13 Dispute Resolution Provisions ........................................................................................................ 44
9.13.1 Disputes among Licensed CAs and Customers ........................................................................... 44
9.13.2 Alternate Dispute Resolution Provisions .................................................................................... 44
9.14 Governing Law .............................................................................................................................. 44
9.15 Compliance with Applicable Law .................................................................................................. 45
9.16 Miscellaneous Provisions ............................................................................................................... 45
9.16.1 Entire Agreement ..................................................................................................................... 45
9.16.2 Assignment ............................................................................................................................. 45
9.16.3 Severability ............................................................................................................................. 45
9.16.4 Waiver of Rights ...................................................................................................................... 45
9.16.5 Force Majeure ......................................................................................................................... 45
9.17 Other Provisions ............................................................................................................................ 45
10 BIBLIOGRAPHY ...................................................................................................... 46
11 ACRONYMS AND ABBREVIATIONS ............................................................................ 47
vii
1 Introduction
The Information Technology Act, 2000 was enacted by the Indian Parliament in
June, 2000. It was notified for implementation in October, 2000 with the issuance of
Rules under the Act. The purpose of the Act is to promote the use of digital
signatures for the growth of E-Commerce and E-Governance. It provides legal
recognition to electronic records, and puts digital signatures at par with handwritten
signatures. The Act defines the legal and administrative framework for the creation
of Public Key Infrastructure (PKI) in the country to generate trust in electronic
environment. To help establish PKI in the country and ensure interoperability,
technical standards have been framed in Rules and Regulations under the Act. The
Controller of Certifying Authorities (CCA) has been appointed by the Central
Government under section 17 of the Act for purposes of the IT Act. The Office of
the CCA came into existence on November 1, 2000. The IT Act aims at promoting
the growth of E-Commerce and E-Governance through the use of Electronic
Signatures including Public Key Cryptography based digital signatures.
CCA licenses Certifying Authorities (CAs) and exercise supervision over their
activities. It is required to certify the public keys of the CAs, lay down the standards
to be maintained by the CAs and perform several other functions under section 18 of
the Act to regulate the functioning of CAs in the country.
The Certification Practice Statement (CPS) of the Controller of Certifying
Authorities states how the PKI component(s) meet the assurance requirements
defined in the Certificate Policy(CP) and also security control and operational policy
& procedures and other matters relevant to obligations and responsibilities of the
CCA and CAs in accordance with the IT Act, Rules and Regulations.
India PKI is a hierarchical PKI with the trust chain starting from the Root Certifying
Authority of India (RCAI). RCAI is operated by the Office of Controller of
Certifying Authorities, Government of India. Below RCAI there are Certifying
Authorities (CAs) licensed by CCA to issue Digital Signature Certificates under the
provisions of ITAct. These are also called Licensed CAs.
1
Issue of X.509 Public Key Certificate containing the public key of the
Licensed CA
Generating CRLs
1.2 Identification
This document is the Certification Practice Statement of the RCAI. RCAI has
assigned following OID to this document.
id-India PKI ::= {2.16.356.100}
id-cp ::= {id-India PKI 2}
id-cps ::= {id-RCAI CPS 3}
2
1.3 PKI Participants
3
CRL Services: RCAI accepts the revocation request from the authorized
representative of Licensed CAs and also publish CRL in the repository
1.5.3 Person Determining Certification Practice Statement Suitability for the Policy
The determination of suitability of a CPS will be based on an independent auditor’s
results and recommendations.
1.5.5 Waivers
There shall be no waivers to this CPS.
4
2 Publication & PKI Repository Responsibilities
2.2.2 Interoperability
See Section 2.1.
5
3 Identification & Authentication
The requirements for identification and authentication are specified under
Information Technology Act, Rules and Guidelines issued there under. Before
issuing a Certificate, the RCAI ensure that all Subject information in the
Certificate conforms to the requirements that have been verified in accordance
with the procedures prescribed in this CPS.
All CA applicants shall fill the ‘Form for Application for grant of Licence to be a
Certifying Authority’ as described in Information Technology (Certifying
Authority) Rules - Schedule I, supported by such documents and information as
required by CCA.
3.1 Naming
6
3.1.6 Recognition, Authentication & Role of Trademarks
No stipulation.
7
documents required by CA to establish the applicant’s affiliation to organisation is
as specified under CCA-CALIC
9
The certificate request generated at CA should send to CCA by trusted
personals of CA along with an authorization letter from authorised CA
representative.
The CCA establishes the uniqueness of the DN submitted by the applicant.
The certificate request is used by the CCA to generate the certificate.
CCA confirm that prior to certify Public keys of CAs under a special
purpose trust chain where the corresponding private key of CA is used for
issuance SSL and code signing certificates, CA systems are operated in
offline mode.
The acceptance of certificate to be provided by CA prior to publish on the
web site of CCA
All certificates issued are published in the Repository and are accessible
through the web site of the CCA.
10
4.5 Key Pair and Certificate Usage
11
4.6.7 Notification of Certificate Issuance by the CA to Other Entities
See Section 4.4.3.
No Stipulation
13
4.9.3 Procedure for Revocation Request
When a revocation is requested by any entity external to the CA, the revocation
request may be submitted through:
a certificate revocation request delivered to CCA by an appropriately
authorized person.
4.9.5 Time within which CCA must Process the Revocation Request
CCA make best efforts to process revocation request within one working day after
a valid revocation request is received.
15
4.12 Key Escrow and Recovery
16
5 Facility Management & Operational Controls
5.1 Physical Controls
Physical access to RCAI for performing operations is controlled and restricted to
the authorized individuals only. The Root Facility is provided with physical
security round the clock.
By-pass or deactivation
The By-pass or deactivation of normal physical security arrangements are
authorized and documented.
Trespass detection and alarm system
Access to the site is controlled through proximity cards. In addition, a biometric
access system is used for access to the SR, of the authorized personnel.
The security guard in the Root Facility and the Chief Security Officer (CSO)
take the suitable escalation procedures.
DVR (Digital Video Recorder) system
The Root Facility is constantly monitored using a CCTV system to detect any
unusual activities. Round-the-clock Digital video Recording is also carried out
CA’s primary site consists of four physical security tiers comprising of:
Tier 1: The common area in the vicinity of the RCAI operations set-up where in
physical access check is performed. This is the area where common facilities are
incorporated.
Tier 2: This is the first level where RCAI operations commence. This is manned
by physical security personnel and also enforces physical proximity access
control restricting entries only to RCAI authorized personnel.
Tier 3: Enables two factor authentications (biometrics and physical proximity).
The CA operations are carried out in this area.
Tier 4: This is where the core RCAI operations are housed. Servers are installed
in this area.
17
Certificate issuance and revocation is done in this area which houses the
Certificate Manager server. The Key Ceremony is also done here. The HSM
module is housed in this area.
18
5.1.6 Media Storage
All media containing production software and data, audit, archive, or backup
information are stored within RCAI facilities and also in a secure off-site storage
facility with appropriate physical and logical access controls designed to limit
access only authorized personnel and protect such media from accidental damage
(e.g., water, fire, and electromagnetic exposure).
19
The following sections define these and other trusted roles.
5.2.1.1 RCAI Administrator
The RCAI administrator is responsible for:
1. Installation, configuration, and maintenance of the RCAI;
2. Establishing and maintaining RCAI system accounts;
3. Configuring certificate profiles or templates and audit parameters, and;
4. Generating and backing up RCAI keys.
Administrators shall not issue certificates to subscribers.
5.2.1.2 RCAI Officer
The RCAI officer is responsible for issuing certificates, that is:
1. Registering CAs and requesting the issuance of certificates;
2. Verifying the CA details and accuracy of information included in
certificates;
3. Approving and executing the issuance of certificates, and;
4. Requesting, approving and executing the revocation of certificates.
5.2.1.3 Audit Administrator
The Audit Administrator is responsible for:
1. Reviewing, maintaining, and archiving audit logs;
2. Performing or overseeing internal compliance audits to ensure that the
RCAI is operating in accordance with its CPS;
5.2.1.4 System Administrator
The System Administrator is responsible for the routine operation of the
RCAI equipment and operations such as system backups and recovery or
changing recording media.
21
3. Being trustworthy;
4. Having no other duties that would interfere or conflict with their duties for
the trusted role;
5. Having not been previously relieved of duties for reasons of negligence or
non-performance of duties;
6. Having not been denied a security clearance, or had a security clearance
revoked for cause;
7. Having not been convicted of an offense; and
8. Being appointed in writing by an appointing authority.
22
Periodic security awareness and any new technology changes training is provided
on an ongoing basis, based on the newer versions or releases of the products.
23
The following events shall be audited:
24
Auditable Event RCAI
The approval or rejection of a certificate status change request
CONFIGURATION
Any security-relevant changes to the configuration of the Component
ACCOUNT ADMINISTRATION
Roles and users are added or deleted
The access control privileges of a user account or a role are modified
CERTIFICATE PROFILE MANAGEMENT
All changes to the certificate profile
CERTIFICATE STATUS PROVIDERMANAGEMENT
All changes to the CSP profile (e.g. OCSP profile)
REVOCATION PROFILE MANAGEMENT
All changes to the revocation profile
CERTIFICATE REVOCATION LIST PROFILE MANAGEMENT
All changes to the certificate revocation list profile
MISCELLANEOUS
Appointment of an individual to a Trusted Role
Designation of personnel for multiparty control
Installation of the Operating System
Installation of the PKI Application
Installation of hardware cryptographic modules
Removal of hardware cryptographic modules
Destruction of cryptographic modules
System Startup
Logon attempts to PKI Application
Receipt of hardware / software
Attempts to set passwords
Attempts to modify passwords
Back up of the internal CA database
Restoration from back up of the internal CA database
File manipulation (e.g., creation, renaming, moving)
Posting of any material to a PKI Repository
Access to the internal CA database
All certificate compromise notification requests
25
Auditable Event RCAI
Loading tokens with certificates
Shipment of Tokens
Zeroizing Tokens
Re-key of the Component
CONFIGURATION CHANGES
Hardware
Software
Operating System
Patches
Security Profiles
PHYSICAL ACCESS / SITE SECURITY
Personnel Access to room housing Component
Access to the Component
Known or suspected violations of physical security
ANOMALIES
Software error conditions
Software check integrity failures
Receipt of improper messages
Misrouted messages
Network attacks (suspected or confirmed)
Equipment failure
Electrical power outages
Uninterruptible Power Supply (UPS) failure
Obvious and significant network service or access failures
Violations of Certificate Policy
Violations of Certification Practice Statement
Resetting Operating System clock
After back-up and archived, the audit logs are allowed by the system to be over-
written.
27
5.5 Records Archival
Data To Be Archived
Certification Practice Statement
Contractual obligations
System and equipment configuration
Modifications and updates to system or configuration
Certificate requests
Revocation requests
Subscriber identity authentication data as per Section 0
Documentation of receipt and acceptance of certificates
Documentation of receipt of Tokens
All certificates issued or published
All CRLs and CRLs issued and/or published
All Audit Logs
All Audit Log Summaries
Other data or applications to verify archive contents
Compliance audit reports
If RCAI equipment is damaged or rendered inoperative, but the signature keys are
not destroyed, RCAI makes all efforts to establish the operation as quickly as
possible, giving priority to the ability to generate CRL or make use of Disaster
Recovery facility for CRL generation.
If both primary and Disaster recovery sites cannot be used to establish revocation
capability in a reasonable time-frame, the RCAI systems will be treated as
compromised.
For RCAI key pair generation, multiparty controls are used as specified in Section
5.2.2. RCAI creates a verifiable audit trail for key pair generation as per the security
requirements Procedures which are followed and the same will be documented. The
process is validated by an Auditor.
31
6.1.6 Public Key Parameters Generation and Quality Checking
RSA and ECC keys are generated in accordance with FIPS 186-2.
6.1.7 Key Usage Purposes (as per X.509 v3 key usage field)
Key usages are covered in certificate profiles defined in CCA-IOG.
32
6.2.7 Private Key Storage on Cryptographic Module
RCAI stores Private Keys in hardware cryptographic module and keys are not
accessible without authentication mechanism that is in compliance with FIPS 140-
2 Level 3 rating of the cryptographic module.
33
When they are not used, activation data are always stored in a safe for which
access is controlled by holders in limited roles.
RCAI computer systems are configured with minimum required accounts and
network services.
RCAI has implemented a combination of physical and logical security controls to
ensure that the RCAI administration is not carried without less than two person
control.
34
6.6 Life-Cycle Technical Controls
3. The hardware and software are dedicated to performing the PKI activities.
There are no other applications; hardware devices, network connections, or
component software installed which is not part of the PKI operation.
4. Proper care is taken to prevent malicious software from being loaded onto
the equipment. Only applications required performing the PKI operations
is obtained from sources authorized by local policy.
5. RCAI hardware and software are scanned for malicious code on first use
and all media to be brought in thereafter.
35
when RCAI operation is required and ensured that not connected to any external
network
36
7 Certificate, CRL and OCSP Profiles
7.1 Certificate Profile
Certificate profiles are detailed in the CCA-IOG
Field Value
Version V2 (1)
Issuer Signature Algorithm sha256WithRSAEncryption {1 2 840 113549 1 1 11}
Issuer Distinguished Name Per the requirements in [CCA-IOG]
thisUpdate expressed in UTCTime until 2049
nextUpdate expressed in UTCTime until 2049 (>= thisUpdate + CRL
issuance frequency)
Revoked certificates list 0 or more 2-tuple of certificate serial number and
revocation date (in Generalized Time)
Issuer’s Signature sha256 WithRSAEncryption {1 2 840 113549 1 1 11}
CRL Extension Value
CRL Number c=no; monotonically increasing integer (never repeated)
Authority Key Identifier c=no; Octet String (same as in Authority Key Identifier
field in certificates issued by the CA)
CRL Entry Extension Value
Reason Code c=no; optional
37
Field Value
Version V1 (0)
Requester Name DN of the requestor (required)
Request List List of certificates as specified in RFC 2560
Request Extension Value
None None
Request Entry Extension Value
None None
Field Value
Response Status As specified in RFC 2560
Response Type id-pkix-ocsp-basic {1 3 6 1 5 5 7 48 1 1}
Version V1 (0)
Responder ID Octet String (same as subject key identifier in Responder
certificate)
Produced At Generalized Time
List of Responses Each response will contain certificate id; certificate status1,
thisUpdate, nextUpdate2,
Responder Signature sha256 WithRSAEncryption {1 2 840 113549 1 1 11}
Certificates Applicable certificates issued to the OCSP Responder
Response Extension Value
Nonce c=no; Value in the nonce field of request (required, if
present in request)
Response Entry Extension Value
None None
1
If the certificate is revoked, the OCSP Responder shall provide revocation time and revocation
reason from CRL entry and CRL entry extension.
2
The OCSP Responder shall use thisUpdate and nextUpdate from CA CRL.
38
8 Compliance Audit and Other Assessments
8.1 Frequency or Circumstances of Assessments
Annual compliance audit by empanelled Auditor is carried out of RCAI
infrastructure apart from half yearly internal audit
39
9 Other Business and Legal Matters
9.1 Fees
40
9.3 Confidentiality of Business Information
RCAI maintain the confidentiality of confidential business information that is
clearly marked or labeled as confidential, or by its nature reasonably is
understood to be confidential, and treat such information with the same degree
of care and security as the RCAI treats its own most confidential information.
41
2. Operate in accordance with this CPS.
3. Accept certificate signing requests from authorized representative of
Licensed CAs
4. Maintain separate special purpose Root for issuing SSL and code signing
certificates.
5. Issue Public Key certificates to the licensed CAs.
6. Publish the certificates in the repository.
7. Accept the revocation request from the authorized representative of
Licensed CAs.
8. Immediately publish the CRL after revocation of Licensed CA.
9.6.1.2 Licensed CA
Licensed CA represents and warrants in accordance with provisions of IT Act, 2000
& Rules made thereunder that;
1. signing private key is protected and that no unauthorized person shall ever has
access to that private key;
2. Each Subscriber has been required to represent and warrant that all information
supplied by the Subscriber in connection with, and/or contained in the Certificate
is true.
3. Only verified information appears in the certificate
9.6.2 Subscriber
No stipulation
42
9.8 Limitations of Liabilities
The Government of India disclaims any liability that may arise from use of any
certificate issued by the RCAI, or by the CCA’s decision to revoke a certificate
issued by it. In no event will the RCAI or the Government of India be liable for
any losses, including direct or indirect, incidental, consequential, special, or
punitive damages, arising out of or relating to any certificate issued by the RCAI.
The RCAI has no responsibility for any delays or damages due to force majeure
such as warfare or a natural disaster or reasons beyond provisions of the IT Act,
the rule and regulations.
9.9 Indemnities
No Stipulation
9.10.1 Term
The CPS becomes effective upon approval by CCA. Amendments to this CPS
become effective upon ratification by approval by CCA and publication by
RCAI at cca.gov.in. There is no specified term for this CPS.
9.10.2 Termination
While this CPS may be amended from time to time, it shall remain in force until
replaced by a newer version or explicitly terminated by CCA.
43
9.12 Amendments
44
9.15 Compliance with Applicable Law
This CPS is subject to applicable national, state, local and rules, regulations,
ordinances, decrees, and orders including, but not limited to, restrictions on
exporting or importing software, hardware, or technical information.
9.16.2 Assignment
Except where specified by other contracts, no party may assign or delegate this
CPS or any of its rights or duties under this CPS, without the prior written
consent of CCA. Further, the Office of CCA in its discretion may assign and
delegate this CPS to any party of its choice.
9.16.3 Severability
If any provision of this CPS is held to be invalid by a court of competent
jurisdiction, then the remaining provisions will nevertheless remain in full force
and effect.
45
10 Bibliography
The following documents were used in part to develop this CPS:
FIPS 140-2 Security Requirements for Cryptographic Modules, 1994-01 http://csrc.nist.gov/cryptval/
FIPS 186-2 Digital Signature Standard, 2000-01-27 http://csrs.nist.gov/fips/fips186.pdf
ITACT 2000 The Information Technoligy Act, 2000, Government of India, June 9, 2000.
RFC 3647 Certificate Policy and Certificate Practices Framework, Chokhani, Ford, Sabett, Merrill, and Wu.
November 2003.
46
11 Acronyms and Abbreviations
47
48