18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

For subscriber certificates, the prospective subscriber must perform the following steps when<br />

the subscriber applies for a certificate:<br />

� Obtain a public/private key pair for each certificate required, and;<br />

� Provide a point of contact for verification of any roles or authorizations requested.<br />

These steps may be performed in any order that is convenient for the CA, RAs, Trusted Agent<br />

and Subscribers, and that do not defeat security, but all must be completed prior to certificate<br />

issuance. All communications among CAs supporting the certificate application and issuance<br />

process shall be authenticated and protected from modification using mechanisms<br />

commensurate with the requirements of the data to be protected by the certificates being issued<br />

(i.e., communications supporting the issuance of Medium Assurance certificates shall be<br />

protected using Medium Assurance certificates, or some other mechanism of equivalent<br />

strength). Any electronic transmission of shared secrets shall be protected (e.g., encrypted)<br />

using means commensurate with the requirements of the data to be protected by the certificates<br />

being issued.<br />

4.1.1 Submission of <strong>Certificate</strong> Application<br />

For certificate applications to a <strong>Raytheon</strong> CA, an authorized representative of the Subject CA<br />

shall submit the application to the RPMA.<br />

For subscriber certificates, the application shall be submitted by an authorized prospective<br />

subscriber in the case of human subscribers, or an authorized <strong>PKI</strong> sponsor in the case of<br />

components.<br />

4.1.2 Enrollment Process and Responsibilities<br />

CAs external to the <strong>Raytheon</strong> policy domain applying for cross certification with the <strong>Raytheon</strong><br />

<strong>PKI</strong> shall submit a request for cross-certification to the <strong>Raytheon</strong> PMA accompanied by their<br />

CP. The <strong>Raytheon</strong> PMA shall require a CP/CPS compliance audit, from a third-party auditor, as<br />

described in section 8. The <strong>Raytheon</strong> PMA shall perform a certificate policy mapping to validate<br />

policy assurance levels are equivalent. Upon issuance, each cross-certificate issued by the<br />

<strong>Raytheon</strong> <strong>PKI</strong> shall be manually checked to ensure each field and extension is properly<br />

populated with the correct information, before the certificate is delivered to the Subject CA.<br />

<strong>Raytheon</strong> CAs shall submit a request to the <strong>Raytheon</strong> PMA, accompanied by their CPS. The<br />

<strong>Raytheon</strong> PMA shall evaluate the submitted CPS for acceptability. The <strong>Raytheon</strong> PMA may<br />

require an initial compliance audit, performed by parties of the <strong>Raytheon</strong> PMA’s choosing, to<br />

ensure that the CA is in compliance with this CP, prior to the PMA authorizing the <strong>Raytheon</strong><br />

Root CA to issue a certificate to the applying CA and authorizing the CA to issue and manage<br />

certificates asserting a policy OID from this CP.<br />

The RRCA shall only issue certificates to subordinate CAs upon receipt of written authorization<br />

from the <strong>Raytheon</strong> PMA.<br />

CAs shall issue certificates asserting a policy OID from this CP only upon receipt of written<br />

authorization from the <strong>Raytheon</strong> PMA, and then may do so only within the constraints imposed<br />

by the <strong>Raytheon</strong> PMA or its designated representatives.<br />

For applications by end-entities, the Trusted Agent or Registration Authority must verify all<br />

subscriber information, in accordance with section 3.2.3. In addition, the Trusted Agent or<br />

Registration Authority shall sign the Subscriber Agreement. Subscribers are expected to<br />

31 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!