18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

certificate, or make an informed decision to accept the risk, responsibility, and consequences for<br />

using a certificate whose authenticity cannot be guaranteed to the standards of this CP. Such<br />

use may occasionally be necessary to meet urgent operational requirements.<br />

4.9.7 CRL Issuance Frequency<br />

CRLs shall be issued periodically, even if there are no changes to be made, to ensure<br />

timeliness of information. <strong>Certificate</strong> status information may be issued more frequently than the<br />

issuance frequency described below. A CA shall ensure that superseded certificate status<br />

information is removed from the <strong>PKI</strong> Repository upon posting of the latest certificate status<br />

information.<br />

<strong>Certificate</strong> status information shall be published not later than the next scheduled update. This<br />

will facilitate the local caching of certificate status information for off-line or remote (laptop)<br />

operation. <strong>PKI</strong> participants shall coordinate with the <strong>PKI</strong> Repositories to which they post<br />

certificate status information to reduce latency between creation and availability.<br />

The following table provides CRL issuance frequency requirements for medium-software,<br />

medium-CBP-software, medium-hardware, and medium-CBP-hardware assurance certificates.<br />

CRL Issuance Frequency<br />

Routine At least once every 30 days for Off-line Roots and<br />

Off-line Bridge CAs; At Least Once every 24 hours<br />

for all others<br />

Loss or Compromise of Private<br />

<strong>Key</strong><br />

Within 18 Hours of Notification<br />

CA Compromise Immediately, but no later than within 18 hours after<br />

notification<br />

The following table provides CRL issuance frequency requirements for the high-hardware<br />

assurance certificates.<br />

CRL Issuance Frequency<br />

Routine At least once every 30 days for Off-line Roots; At<br />

Least Once every 24 hours for all others<br />

Loss or Compromise of Private<br />

<strong>Key</strong><br />

Within 6 Hours of Notification<br />

CA Compromise Immediately, but no later than within six hours after<br />

notification<br />

The CAs that issue routine CRLs less frequently that the requirement for Emergency CRL<br />

issuance (i.e., CRL issuance for loss or compromise of key or for compromise of CA) shall meet<br />

the requirements specified above for issuing Emergency CRLs. Such CAs shall also be<br />

required to notify the <strong>Raytheon</strong> PMA upon Emergency CRL issuance. The <strong>Raytheon</strong> PMA shall<br />

in turn notify the CertiPath Operational Authority and all cross certified CAs of revocation.<br />

38 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!