18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.3 Other Aspects of <strong>Key</strong> Management ........................................................................... 65<br />

6.3.1 <strong>Public</strong> <strong>Key</strong> Archival .................................................................................................. 65<br />

6.3.2 <strong>Certificate</strong> Operational Periods/<strong>Key</strong> Usage Periods ................................................ 65<br />

6.4 Activation Data ............................................................................................................. 65<br />

6.4.1 Activation Data Generation and Installation ............................................................ 65<br />

6.4.2 Activation Data Protection ....................................................................................... 65<br />

6.4.3 Other Aspects of Activation Data ............................................................................ 65<br />

6.5 Computer Security Controls ....................................................................................... 66<br />

6.5.1 Specific Computer Security Technical Requirements ............................................. 66<br />

6.5.2 Computer Security Rating ....................................................................................... 66<br />

6.6 Life-Cycle Technical Controls .................................................................................... 66<br />

6.6.1 System Development Controls ................................................................................ 66<br />

6.6.2 Security Management Controls ............................................................................... 67<br />

6.6.3 Life Cycle Security Controls .................................................................................... 67<br />

6.7 Network Security Controls .......................................................................................... 67<br />

6.8 Time Stamping ............................................................................................................. 67<br />

7 CERTIFICATE, CRL AND OCSP PROFILES................................................................... 69<br />

7.1 <strong>Certificate</strong> Profile ......................................................................................................... 69<br />

7.1.1 Version Numbers ..................................................................................................... 69<br />

7.1.2 <strong>Certificate</strong> Extensions .............................................................................................. 69<br />

7.1.3 Algorithm Object Identifiers ..................................................................................... 69<br />

7.1.4 Name Forms ............................................................................................................ 69<br />

7.1.5 Name Constraints .................................................................................................... 71<br />

7.1.6 <strong>Certificate</strong> <strong>Policy</strong> Object Identifier ........................................................................... 71<br />

7.1.7 Usage of <strong>Policy</strong> Constraints Extension ................................................................... 71<br />

7.1.8 <strong>Policy</strong> Qualifiers Syntax and Semantics .................................................................. 71<br />

7.1.9 Processing Semantics for the Critical <strong>Certificate</strong> <strong>Policy</strong> Extension ......................... 71<br />

7.2 CRL Profile ................................................................................................................... 72<br />

7.2.1 Version Numbers ..................................................................................................... 72<br />

7.2.2 CRL and CRL Entry Extensions .............................................................................. 72<br />

7.3 OCSP Profile ................................................................................................................. 72<br />

7.3.1 Version Number ...................................................................................................... 72<br />

7.3.2 OCSP Extensions .................................................................................................... 72<br />

8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS .......................................................... 73<br />

8.1 Frequency or Circumstances of Assessments ......................................................... 73<br />

8.2 Identity and Qualifications Of Assessor .................................................................... 73<br />

8.3 Assessor’s Relationship To Assessed Entity ........................................................... 73<br />

8.4 Topics Covered By Assessment ................................................................................ 73<br />

8.5 Actions Taken as a Result of Deficiency ................................................................... 73<br />

8.6 Communication of Results ......................................................................................... 74<br />

8 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!