18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

� Verifying identity, pursuant to Section 3.2; and<br />

� Security communicating subscriber information to the RA.<br />

5.2.2 Number of Persons Required per Task<br />

Two or more persons shall be required to perform the following tasks:<br />

� CA key generation;<br />

� CA signing key activation;<br />

� CA private key backup.<br />

Where multiparty control is required, at least one of the participants shall be an Administrator.<br />

All participants shall serve in a trusted role as defined in Section 5.2.1.<br />

Multiparty control shall not be achieved using personnel that serve in the Audit Administrator<br />

Role.<br />

All roles are recommended to have multiple persons in order to support continuity of operations.<br />

5.2.3 Identification and Authentication for Each Role<br />

An individual shall identify and authenticate him/herself before being permitted to perform any<br />

actions set forth above for that role or identity.<br />

5.2.4 Roles Requiring Separation of Duties<br />

Role separation, when required as set forth below, may be enforced either by the CA<br />

equipment, or procedurally, or by both means.<br />

Individual CA personnel shall be specifically designated to the four roles defined in Section 5.2.1<br />

above. Individuals may assume more than one role, except:<br />

� Individuals who assume an Officer role may not assume an Administrator or Audit<br />

Administrator role;<br />

� Individuals who assume an Audit Administrator shall not assume any other role on the<br />

CA; and<br />

� Under no circumstances shall any of the four roles perform its own compliance auditor<br />

function.<br />

No individual shall be assigned more than one identity.<br />

5.3 Personnel Controls<br />

5.3.1 Qualifications, Experience, and Clearance Requirements<br />

A group of individuals responsible and accountable for the operation of each CA and CSA shall<br />

be identified. The trusted roles of these individuals per Section 5.2.1 shall be identified.<br />

All persons filling trusted roles shall be selected on the basis of loyalty, trustworthiness, and<br />

integrity, and shall be subject to background investigation. Personnel appointed to trusted roles<br />

(including CA trusted roles, CSA trusted roles, Trusted Agent, and RA role) shall:<br />

� Have successfully completed an appropriate training program;<br />

� Have demonstrated the ability to perform their duties;<br />

46 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!