DPWN PKI CP - DHL

39
DPWN PKI Project Unclassified DPWN PKI Project Certificate Policy for DPWN Version 1.0 DPWN PKI Project Robert Sieber, DP ITS 1/39

Transcript of DPWN PKI CP - DHL

Page 1: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

DPWN PKI Project

Certificate Policy for DPWN Version 1.0

DPWN PKI Project Robert Sieber, DP ITS 1/39

Page 2: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

Document InformationAuthor(s)/person(s) in charge

Robert Sieber, DP ITS

Name Certificate Policy for DPWN

Repository

Template Certificate Policy and Certification Practice Statement

Reviewed by PKI Board

Review date 2006-11-20

Approved by PKI Board

Approval date 2006-11-20

Actual state Final

Change LogVersion Date What was changed Editor0.1 2005-08-16 First draft Robert Sieber0.2 2005-08-25 1st review Müller-Hipper0.3 2005-08-29 2nd review Robert Sieber0.4 2005-08-29 3rd review Lisa Anders0.5 2005-10-04 Team review confcall 5th October Robert Sieber0.6 2006-01-30 Updated chapter 9 and 10 Tomas Novak0.7 2006-04-17 Team review Tomas Novak0.8 2006-06-20 Lutz’s comments added Tomas Novak1.0 2006-11-20 PKI Board approval. Lutz Mueller-Hipper

Distribution ListName Function Address, e-mailDPWN PKI Project Distribution of

DPWN-PKI project information

[email protected]

List of abbreviations and definitions

All abbreviations and definitions that are used are contained in the “DPWN PKI Glossary”. This document can be found at https://keyserver.dpwn.net/pks/glossary.

DPWN PKI Project Robert Sieber, DP ITS 2/39

Page 3: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

Table of Contents

1 Introduction ............................................................................................................................ 8

1.1 Overview .................................................................................................................... 8

1.2 Document Name and Identification ............................................................................ 9

1.3 PKI Participants .......................................................................................................... 9

1.3.1 DPWN Root CA ......................................................................................... 9

1.3.2 DPWN Intermediate CAs .......................................................................... 10

1.3.3 DPWN Issuing CAs ................................................................................... 10

1.3.4 DPWN RAs ............................................................................................... 10

1.3.5 Subscribers ............................................................................................... 10

1.3.6 Relying Parties .......................................................................................... 11

1.3.7 Other Participants ..................................................................................... 11

1.4 Certificate Usage ...................................................................................................... 11

1.5 Policy Administration ................................................................................................ 12

2 Publication and Repository ................................................................................................ 13

3 Identification and Authentication ....................................................................................... 14

3.1 Naming ..................................................................................................................... 14

3.2 Initial Identity Validation ............................................................................................ 15

3.3 Identification and Authentication for Re-Key Requests ............................................. 15

3.4 Identification and Authentication for Revocation Requests ....................................... 15

4 Certificate Life Cycle Operational Requirements ............................................................. 16

4.1 Certificate Applications ............................................................................................. 16

4.2 Certificate Application Processing ............................................................................ 16

4.3 Certificate Issuance .................................................................................................. 17

4.4 Certificate Acceptance .............................................................................................. 17

4.5 Key Pair and Certificate Usage ................................................................................ 17

4.5.1 Subscriber ................................................................................................. 17

4.5.2 Relying Party ............................................................................................ 19

4.6 Certificate Renewal .................................................................................................. 20

DPWN PKI Project Robert Sieber, DP ITS 3/39

Page 4: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4.7 Certificate Re-Key .................................................................................................... 20

4.8 Certificate Modification ............................................................................................. 20

4.9 Certificate Revocation and Suspension .................................................................... 21

4.10 Certificate Status Service ....................................................................................... 21

4.11 End of Subscription ................................................................................................ 22

4.12 Key Backup and Recovery ..................................................................................... 22

5 Management, Operational and Physical Controls ............................................................ 23

5.1 Physical Security Controls ........................................................................................ 23

5.2 Procedural Controls .................................................................................................. 23

5.3 Personnel Security Controls ..................................................................................... 24

5.4 Audit Logging Procedures ........................................................................................ 25

5.5 Records Archival ...................................................................................................... 26

5.6 Key Changeover ....................................................................................................... 26

5.7 Compromise and Disaster Recovery ........................................................................ 26

5.8 CA or RA Termination .............................................................................................. 26

6 Technical Security Controls ............................................................................................... 28

6.1 Key Pair Generation and Installation ........................................................................ 28

6.2 Private Key Protection and Cryptographic Module Engineering Controls ................. 29

6.3 Other Aspects of Key Pair Management .................................................................. 29

6.4 Activation Data ......................................................................................................... 30

6.5 Computer Security Controls ..................................................................................... 30

6.6 Network Security Controls ........................................................................................ 30

6.7 Time Stamping ......................................................................................................... 30

7 Certificate and CRL Profiles ............................................................................................... 31

7.1 Certificate Profile ...................................................................................................... 31

7.2 CRL Profile ............................................................................................................... 31

7.3 OCSP Profile ............................................................................................................ 31

8 Compliance Audit and Other Assessment ........................................................................ 32

8.1 Frequency or circumstances of assessment ............................................................ 32

DPWN PKI Project Robert Sieber, DP ITS 4/39

Page 5: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

8.2 Identity/qualifications of assessor ............................................................................. 32

8.3 Assessor's Relationship to Assessed Entity ............................................................. 32

8.4 Topics Covered by Assessment ............................................................................... 32

8.5 Actions Taken as a Result of Deficiency .................................................................. 32

8.6 Communications of Results ...................................................................................... 33

9 Other Business and Legal Matters ..................................................................................... 34

9.1 Fees ......................................................................................................................... 34

9.1.1 Certificate issuance or renewal fees ......................................................... 34

9.1.2 Certificate access fees .............................................................................. 34

9.1.3 Revocation or status information access fees ........................................... 34

9.1.4 Fees for other services ............................................................................. 34

9.1.5 Refund policy ............................................................................................ 34

9.2 Financial Responsibilities ......................................................................................... 34

9.2.1 Insurance coverage ................................................................................. 34

9.2.2 Other assets ............................................................................................ 34

9.2.3 Insurance or warranty coverage for end-entities ...................................... 35

9.3 Confidentiality of Business Information ..................................................................... 35

9.3.1 Scope of confidential information .............................................................. 35

9.3.2 Information not within the scope of confidential information ...................... 35

9.3.3 Responsibility to protect confidential information ...................................... 35

9.4 Privacy and Personal Information ............................................................................. 35

9.4.1 Privacy plan .............................................................................................. 36

9.4.2 Information treated as private ................................................................... 36

9.4.3 Information not deemed private ................................................................ 36

9.4.4 Responsibility to protect private information ............................................. 36

9.4.5 Notice and consent to use private information .......................................... 36

9.4.6 Disclosure pursuant to judicial or administrative process .......................... 36

9.4.7 Other information disclosure circumstances ............................................. 36

9.5 Intellectual Property Rights ....................................................................................... 36

9.6 Representations and Warranties .............................................................................. 37

DPWN PKI Project Robert Sieber, DP ITS 5/39

Page 6: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

9.7 Disclaimers of Warranties ......................................................................................... 37

9.8 Limitations of Liability ............................................................................................... 37

9.9 Indemnities ............................................................................................................... 37

9.10 Term and Termination ............................................................................................ 38

9.11 Individual Notices and Communications with Participants ...................................... 38

9.12 Amendments .......................................................................................................... 38

9.12.1 Procedure for amendment ...................................................................... 38

9.12.2 Notification mechanism and period ......................................................... 38

9.12.3 Circumstances under which OID must be changed ................................ 38

9.13 Dispute Resolution Procedures .............................................................................. 38

9.14 Governing Law ....................................................................................................... 38

9.15 Compliance with Applicable Law ............................................................................ 39

9.16 Miscellaneous Provisions ....................................................................................... 39

9.17 Other Provisions ..................................................................................................... 39

DPWN PKI Project Robert Sieber, DP ITS 6/39

Page 7: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

Sequential List of Tables and Figures:

Figure 1 - DPWN Three-tier PKI Hierarchy............................................................................. 9

DPWN PKI Project Robert Sieber, DP ITS 7/39

Page 8: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

1 Introduction

Deutsche Post World Net (DPWN) is the world's leading logistics group. Its integrated Deutsche Post,

DHL and Postbank companies offer tailored, customer-focused solutions for the management and

transport of goods, information and payments through a global network combined with local expertise.

Deutsche Post World Net is also the leading provider of Dialog Marketing services, with a unique

portfolio of efficient outsourcing and system solutions for the mail business. Some 380,000 employees in

more than 220 countries and territories worldwide generated revenue of EUR 43 billion ($58 billion) in

2004.

This Certificate Policy (CP) applies to all Certification Authorities (CAs) and Registration Authorities

(RAs) within Deutsche Post World Net (DPWN). This CP comprises the sections included in the table of

contents as well as other documents published and publicly available in the DPWN repository at:

https://keyserver.dpwn.net/repository.

This CP complies with the formal requirements of IETF RFC 3647 regarding format and content. While

certain section titles are included according to the structure of RFC 3647, the associated topics may not

necessarily apply in the implementation of the DPWN PKI services. Such components are indicated with

“section not applicable”

In the case of the DPWN Root being publicly signed, then this CP has been formally reviewed for

compliance with the public signer of the DPWN Root CA.

1.1 Overview

This CP applies to all DPWN CAs and DPWN RAs. Also LRAs are affected by this document.

DPWN PKI Project Robert Sieber, DP ITS 8/39

Page 9: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

DPITS

root tier

intermediate tier

issuing tier

DPWN SSL CA

DPITS DPITS

. . .

. . .

public CA

Figure 1 - DPWN Three-tier PKI Hierarchy

1.2 Document Name and Identification

This CP is securely made available on https://keyserver.dpwn.net/pks/cp-eng.html. This DPWN CP

utilizes the following OID: 1.3.6.1.4.1.5064.4.1.1

1.3 PKI Participants

This subcomponent describes the types of entities that fulfill any role within the DPWN PKI

implementation.

1.3.1 DPWN Root CA

DPWN Root is the highest Certification Authority level within the DPWN PKI deployment. This

Certification Authority allows DPWN entities to operate their own PKI related services in acceptance of

the DPWN certificate policy.

This CP applies to the DPWN entity management hierarchy and it is binding in part or in whole towards

all entities, which make use of any DPWN certification services.

DPWN PKI Project Robert Sieber, DP ITS 9/39

Page 10: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

DPWN operates a CRL (and eventually OSCP) service providing notice or knowledge to relying parties

associated with the revoked and/or suspended certificates. Also the download of public certificates is

provided to relying parties.

1.3.2 DPWN Intermediate CAs

Using an intermediate CA is mandatory for all subscribers to the DPWN Root CA. DPWN supports the

deployment of PKI services within each DPWN entity using an intermediate CA and at agreed upon, pre-

defined levels.

Every intermediate CA operates a CRL or OSCP service providing notice or knowledge to relying parties

associated with the revoked and/or suspended certificates.

1.3.3 DPWN Issuing CAs

Each DPWN entity (DPAG, DHL, DP-ITS) operates its own issuing CAs using this CP. Every issuing CA

must be a subordinated CA to the appropriate intermediate CA. A partition is also required between CAs

issuing certificates for users vs. devices. Additionally, it is mandatory that all certificate templates that

are used conform to this CP and the corresponding Certification Practice Statement (CPS).

It might be possible to operate company wide issuing CAs directly under the root CA or under a special

intermediate CA.

Every issuing CA operates a CRL or OSCP service providing notice or knowledge to relying parties

associated with the revoked and/or suspended certificates.

1.3.4 DPWN RAs

There is no need to operate any explicit RA. Authentication and identification procedures are described

later in this CP.

1.3.5 Subscribers

Subscribers of DPWN CAs on Root or intermediate levels may only be legal DPWN entities. There is no

support for natural persons. Natural persons are supported by the person-related issuing CAs.

Subscribers are parties that:

• apply for a certificate

• are identified in a certificate

DPWN PKI Project Robert Sieber, DP ITS 10/39

Page 11: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

• hold a private key corresponding to a public key that is listed in a subscriber certificate

1.3.6 Relying Parties

Relying parties are entities including natural persons (individuals) and/or legal persons (companies) that

rely on a certificate and/or digital signature that is verifiable with reference to a public key listed in a

subscriber’s certificate.

To verify the validity of a digital certificate that they receive, relying parties must always refer to the

DPWN CRL or OSCP prior to relying on information featured in a certificate.

1.3.7 Other Participants

Section not applicable

1.4 Certificate Usage

Certain limitations apply to the DPWN Root and/or intermediate CAs’ certificate usage.

The DPWN Root CA only issues certificates for setting up intermediate CAs or CAs used across the

group.

Certificates from the DPWN Root CA can only be used for issuing subordinated CA certificates. These

certificates are only allowed to setup DPWN intermediate CAs and CAs for usage across the group (e.g.

CAs for SSL certificates). To get a certificate from the DPWN Root CA, the entity has to be owned by

DPWN (at least 51%).

Certificates from DPWN intermediate CAs can only be used for issuing subordinated CA certificates.

These certificates must only authorize the issuing CAs from the legal entity. There is no support for

issuing subordinated CA certificates for another entity’s issuing CA within DPWN. An entity is only

allowed to issue certificates for its own entity, except when the entity is a subsidiary (at least 51%) and

employs less than 250 people.

Certificates from DPWN issuing CAs can only be used to issue certificates to DPWN employees or

devices owned by DPWN or operated on behalf of DPWN. Under some circumstances it is allowed to

issue person-related certificates to contractors.

DPWN PKI Project Robert Sieber, DP ITS 11/39

Page 12: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

It is not required that certificates are used to sign any kind of document and/or communication pertaining

to any act of legal significance. Signed documents and/or communication are intended to be used to

verify that the content was not altered during storage or transmission.

1.5 Policy Administration

The DPWN PKI Board manages this CP. DPWN is responsible for the registration, maintenance and

interpretation of this CP.

Every entity that operates a CA within the DPWN PKI has to provide the following information within

each of its CPSs:

• CA contact information (a mail distribution group with at least two individuals; for DPWN Root

and Intermediate CAs DPWN PKI board is also included in the distribution group)

• Certificate type, validation procedures and usage

• reliance limits and liability limitations

• obligations of parties involved in the certificate life cycle

• certificate status-checking

• registration procedures

• CA, RA, LRA model

• Applicable agreements, Certificate

• privacy policy

• applicable law, complaints and dispute resolution

Any policy has to be approved by DPWN PKI Board and has to comply with the provisions of the DPWN

CPs. The DPWN PKI Board is represented by:

Deutsche Post AG

Martin Hagen

Hilpertstraße 31

64295 Darmstadt

Germany

Phone: +49 6151 908 6690

Fax: +49 6151 3909 16690

[email protected]

DPWN PKI Project Robert Sieber, DP ITS 12/39

Page 13: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

2 Publication and Repository

DPWN publishes information about the digital certificates it issues in online repositories. Information on

public keys can be found at https://keyserver.dpwn.net and ldap://keyserver.dpwn.net.

DPWN retains an online document repository where it makes certain disclosures about its practices,

procedures and the content of certain policies including its CPSs and CPs. The repository can be found

at https://keyserver.dpwn.net. DPWN refrains from making certain subcomponents and elements of such

documents publicly available, including certain security controls, procedures related with the functioning

of amongst other things its registration authorities, root signing procedures etc.

DPWN publishes digital certificate status information in frequent intervals as indicated by its CPS.

Certificate services participants are obliged to publish documents regarding certificate issuance, e.g.

CP, CPS, CRL and certificates, under the terms of this CP.

DPWN PKI Project Robert Sieber, DP ITS 13/39

Page 14: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

3 Identification and Authentication

This component describes the procedures used to authenticate an end-user certificate applicant’s

identity and/or other attributes to a CA or RA prior to certificate issuance. It also describes how parties

requesting a re-key or revocation are authenticated. This component also addresses naming practices,

including the recognition of trademark rights in certain names

3.1 Naming

To identify subscribers, DPWN follows certain naming and identification rules that include types of

names assigned to the subject, such as X.500 distinguished names, RFC-822 names, RFC-1034 DNS

names and X.400 names.

To identify a subscriber for Root and Intermediate CAs, DPWN follows the naming and identification

rules of X.500 distinguished names. When applying for a DPWN certificate, the applicant’s name must

meet the following criteria:

• Root CA: CN = DPWN Root CA R2 PSOU= R2O = Deutsche Post World Net

• Intermediate CA: CN = “entity name” Intermediate CA M2 PSOU = M2O = “entity name”O = Deutsche Post World Net

o for example: CN = DP AG Intermediate CA M2 PSOU = M2O = Deutsche Post AGO = Deutsche Post World Net

CN = DHL Intermediate CA M2 PSOU = M2O = DHLO = Deutsche Post World Net

CN = DP ITS Intermediate CA M2 PSOU = M2O = Deutsche Post ITSolutions GmbHO = Deutsche Post World Net

• Company-wide CAs: CN = DPWN “purpose” CA I2 PSOU = I2O = Deutsche Post World Net

o for example: CN = DPWN SSL CA I2 PS

DPWN PKI Project Robert Sieber, DP ITS 14/39

Page 15: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

OU = I2O = Deutsche Post World Net

Naming conventions for issuing CAs have to be published in every certificate template described in the

CA’s CPS. All naming conventions must meet the requirements of this CP.

DPWN does not issue anonymous or pseudonymous certificates to subscribers. Names assigned to

subscribers of a certificate are unique within the DPWN PKI domain. DPWN does not accept

trademarks, logos or otherwise copyrighted graphic or text material for inclusion in its certificates apart

from such material owned by DPWN.

3.2 Initial Identity Validation

The subscriber identified in the subject field must prove possession of the private key corresponding to

the public key being registered with DPWN PKI.

For issuing certificates, DPWN takes steps to identify the subscriber, including but not limited to:

• a physical appearance before a digital certificate is issued

• controlling documents such as identity cards, passport or drivers’ licenses

• controlling organizational documents like corporate identification badges or duly signed

authorization documents

3.3 Identification and Authentication for Re-Key Requests

All terms mentioned in 3.2 also apply for identification and authentication for re-key requests. If the re-

key request contains a new private key, then this request has to be digitally signed by the old key.

Re-key requests after revocation are handled the same as initial key requests.

3.4 Identification and Authentication for Revocation Requests

All terms mentioned in 3.2 also apply for identification and authentication for revocation requests. DPWN

requires the usage of an online authentication mechanism. Revocation requests for certificate authorities

have to be addressed to the DPWN PKI Board.

DPWN PKI Project Robert Sieber, DP ITS 15/39

Page 16: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4 Certificate Life Cycle Operational Requirements

For all CAs and RAs there is a continuous obligation to inform DPWN Policy Managing Authority of all

changes in the information featured in a certificate during the operational period of such a certificate.

4.1 Certificate Applications

Certificate applicants have the responsibility of providing accurate information on their certificate

applications.

Subscribers undergo the following enrollment process:

• filling out an application form

• generating a key pair

• delivering the generated public key corresponding to a private key to DPWN

• demonstrating that the applicant has possession of the private key corresponding to the public

key

• accepting the subscriber agreement and/or CP

Applications for CAs or RAs can be submitted by legal representatives for the whole organization within

DPWN only. If the certificate applicant wants to establish an intermediate or issuing CA, then his CA

structure, set-up, configuration, policy and processes have to be initially audited.

4.2 Certificate Application Processing

After receiving an applicant’s application, the DPWN CA or RA may perform identification and

authentication procedures to validate the certificate application. The DPWN CA or RA either approves or

rejects the certificate application. Such approval or rejection does not necessarily have to be justified to

the applicant or any other party.

A DPWN CA or RA must act on and process a certificate application within:

• 10 business days for end user or device certificates

• 25 business days for requests concerning a new CA or RA

DPWN PKI Project Robert Sieber, DP ITS 16/39

Page 17: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4.3 Certificate Issuance

Following the submission of a certificate application or a certificate renewal request, a DPWN CA or RA

approves or disapproves the submitted information. Following application and credentials approval of

the DPWN RA administrator, the DPWN CA issues the certificate.

4.4 Certificate Acceptance

An issued DPWN certificate is deemed to have been accepted by the subscriber (end user, device)

when any of the following conditions apply:

• acknowledgement of acceptance was made by sending an email to: [email protected]

• the certificate was used for the first time

• after a lapse of five days from issuance

Following conditions apply when the subscriber is a CA or RA:

• acknowledgement of acceptance by sending an email to: [email protected] and getting

response from DPWN PKI that this acceptance has been received

Any usage before acceptance of the certificate is prohibited for CA/RA certificates.

Any objection to accepting an issued certificate must explicitly be notified to the issuing authority. The

justification for the rejection including any fields in the certificate that contain erroneous information must

also be submitted.

DPWN posts issued certificates to an X.500, HTTP or LDAP repository,. It also reserves the right to

publish the certificates to any directory in DPWN if there is a need to do so.

4.5 Key Pair and Certificate Usage

The responsibilities relating to the use of keys and certificates include the following.

4.5.1 Subscriber

Unless otherwise stated in this CP or in the CPS, subscribers are responsible for:

• having knowledge of and, if necessary, seeking training on using digital certificates and

certificate service technologies

• generating their private key pair securely, using a trustworthy system

• providing accurate information in their communications with DPWN PKI

• ensuring that the public key submitted to DPWN PKI corresponds to their own private key

DPWN PKI Project Robert Sieber, DP ITS 17/39

Page 18: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

• ensuring that the public key submitted to DPWN PKI is the correct one

• generating a new, secure key pair to be used in association with a certificate that they request

from DPWN PKI

• reading, understanding and agreeing to all terms and conditions in the DPWN CP and CPS and

associated policies published in the DPWN Repository

• refraining from tampering with a DPWN certificate

• using DPWN certificates in accordance with the DPWN CP and CPS

• notifying DPWN PKI of any changes to the submitted information

• ceasing to use a DPWN certificate for encryption and signing if any featured information

becomes invalid

• ceasing to use a DPWN certificate for encryption and signing when it becomes invalid

• removing server certificates from any applications and/or devices upon which they have been

installed when the certificates become invalid

• preventing the compromise, loss, disclosure, modification, or otherwise unauthorized use of

their private key

• using secure devices and products that provide appropriate protection to their keys

• refraining from submitting any material that contains statements that violate any law or the rights

of any party to DPWN PKI or any DPWN directory

• requesting the suspension or revocation of a certificate in the case of an occurrence that

materially affects the integrity of a DPWN certificate

Without other limiting subscriber obligations stated elsewhere in this CP, subscribers are liable for any

misrepresentations they make in certificates to third parties that reasonably rely on the representations

contained therein and have verified one or more digital signatures within the certificate.

Parties accessing the DPWN repository and web site, including subscribers and relying parties, agree

with the provisions of this CP and any other conditions of usage that DPWN may make available by

means of a subscriber agreement or a relying party agreement. Additionally parties demonstrate

acceptance of the conditions of CP usage by submitting a query regarding the status of a digital

certificate or by using or relying upon any such information or services provided. Using DPWN

repositories can:

• provide information as a result of the search for a digital certificate

• verify the status of digital signatures created with a private key corresponding to a public key

included in a certificate

• provide information published on the DPWN web site

DPWN PKI Project Robert Sieber, DP ITS 18/39

Page 19: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

It is the sole responsibility of the parties accessing information featured in the DPWN repositories and

web site to assess and rely on information featured therein. Parties acknowledge that they have

received adequate information to decide whether to rely upon any information provided in a certificate.

DPWN takes all steps necessary to update its records and directories concerning the status of the

certificates and to issue associated warnings.

4.5.2 Relying Party

A party relying on a DPWN certificate promises to:

• have knowledge on using digital certificates and certificate service technologies

• receive notice of the DPWN CP and associated conditions for relying parties

• verify a DPWN certificate by using a CRL (including the DPWN Root CRL) among others in

accordance with the certificate path validation procedure

• trust a DPWN certificate only if all information featured on such certificates can be verified as

being correct and updated

• rely on a DPWN certificate as may be reasonable under the circumstances

Parties (including subscribers and relying parties) accessing the DPWN Repository and web site agree

with the provisions of this CP and any other conditions of usage that DPWN may make available. Parties

demonstrate acceptance of the CP usage conditions by submitting a query regarding the status of a

digital certificate or by using or relying upon any such information or services provided.

Using DPWN repositories can:

• provide information as a result of the search for a digital certificate

• verify the status of digital signatures created with a private key corresponding to a public key

included in a certificate

• provide information published on the DPWN web site

It is the sole responsibility of the parties accessing information featured in the DPWN repositories and

web site to assess and rely on information featured therein. Parties acknowledge that they have

received adequate information in order to decide whether or not to rely upon any information provided in

a certificate. DPWN takes all steps necessary to update its records and directories concerning the status

of the certificates and issue associated warnings.

DPWN PKI Project Robert Sieber, DP ITS 19/39

Page 20: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4.6 Certificate Renewal

Certificate renewal means the issuance of a new certificate to the subscriber without changing the

subscriber’s public key or any other information in the certificate (except the validity date).

Renewal is permitted from 30 days before certificate expiration date up until 30 days after the certificate

expiration date. For end-user subscriber certificates, the same public key can be used to issue a

certificate up to two (2) consecutive times in total, or for a total length of four (4) years for the same key

pair to be used. Beyond that time limit, the same key pair may not be used any longer.

The subscriber may directly request the certificate renewal from the subscriber interface. A DPWN RA or

CA does not automatically renew subscriber certificates unless they receive a subscriber request.

The DPWN CA issues a new certificate following user authentication through a password or log in with a

certificate that is still valid.

The rest of the procedures remain the same as with the initial registration process including:

• notification of the new certificate to the subscriber

• constituting acceptance of the certificate

• publication of the certificate by the CA

• notification of certificate issuance by the CA to other entities

Renewal of CA/RA certificates on Root or Intermediate levels is prohibited. CA/RA has to apply for a

new certificate. The whole application and issuance processes have to be walked through.

4.7 Certificate Re-Key

A certificate re-key means the generation of a new key pair and application for the issuance of a new

certificate that certifies the new public key.

Section not applicable for DPWN PKI.

4.8 Certificate Modification

Certificate modification means the issuance of a new certificate due to changes in the information in the

certificate other than the subscriber’s public key.

Section not applicable for DPWN PKI.

DPWN PKI Project Robert Sieber, DP ITS 20/39

Page 21: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4.9 Certificate Revocation and Suspension

Upon request from a DPWN CA/RA, DPWN suspends or revokes a digital certificate if:

• there has been a loss, theft, modification, unauthorized disclosure, or other compromise of the

private key of the certificate’s subject

• the certificate’s subject has breached a material obligation under this CP or the CPS

• the performance of a person’s obligations under this CP is delayed or prevented by a natural

disaster, computer or communications failure, or other cause beyond the person's reasonable

control, and as a result, another person’s information is materially threatened or compromised

• there has been a modification of the information contained in the certificate of the certificate’s

subject

A subscriber must contact a DPWN CA/RA at all times to request suspension or revocation. Such

contact can take place online or by non-digital channels. DPWN suspends or revokes a certificate

promptly after verifying the identity of the requesting party and confirming that the certificate has not

been issued in accordance with the procedures required by this CP and the CPS. Verification of the

identity can be done through information elements featured in the identification data the subscriber has

submitted to the DPWN CA/RA. The DPWN CA takes prompt action to revoke the certificate. Relying

parties must use online resources that DPWN makes available through its repository to check the status

of certificates on which they wish to rely. DPWN CRLs are updated on regular basis.

Suspension of DPWN certificates is supported. Request for suspension can be submitted by a

subscriber or a DPWN CA/RA. Suspension may last for as long as it is required to determine the

conditions that caused the request of suspension. Following evidence that such conditions did not allow

for a key compromise, a subscriber may request the re-activation of a certificate.

DPWN publishes notices of suspended or revoked certificates in the DPWN repository. DPWN may

publish its suspended or revoked certificates in its CRL and additionally, by any other means as it sees

fit. During suspension, or upon revocation of a certificate, the operational period of that certificate is

immediately considered terminated.

4.10 Certificate Status Service

DPWN PKI may make the certificate status checking services available.

DPWN PKI Project Robert Sieber, DP ITS 21/39

Page 22: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

4.11 End of Subscription

Subscriber subscriptions end when a certificate is revoked, expired or the service is terminated.

4.12 Key Backup and Recovery

All generated CA / RA keys must be stored within a HSM for recovery purposes. They must also be

archived for the lifetime of the CA plus maximum of two years on a permanent backup medium through

a trusted secure procedure.

There is no need to archive or backup keys used by devices within DPWN.

End user certificates have to be backed-up on an HSM for recovery purposes. They might be archived

as long as needed. The individual regulations are published in the CPS of the issuing CA. Public keys of

signing key pairs must be archived and published for a minimum of 15 years after the date of the last

issued certificate to approve signatures.

Signing keys need not be backed up or archived for any purpose.

DPWN PKI Project Robert Sieber, DP ITS 22/39

Page 23: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

5 Management, Operational and Physical Controls

This component describes non-technical security controls (physical, procedural and personnel controls)

used by the issuing CA to securely perform functions of key generation, subject authentication,

certificate issuance, certificate revocation, auditing and archiving.

5.1 Physical Security Controls

DPWN implements physical controls on its own premises including the following:

DPWN secure premises are located in an area appropriate for high security operations. There are

numbered zones and locked rooms, cages, safes, and cabinets. Physical access is restricted by

implementing mechanisms to control access from one area of the facility to another or access into high

-security zones, such as locating CA operations in a secure computer room physically monitored and

supported by security alarms and requiring movement from zone to zone to be accomplished using

token and access control lists.

Power and air conditioning operate with a high redundancy rate. Premises are protected from any water

exposures. Prevention and protection and measures against fire exposures are implemented.

Media is stored securely. Backup media is also stored in a separate location that is physically secure

and protected from fire and water damage.

Waste disposal is controlled.

5.2 Procedural Controls

DPWN follows personnel and management practices that provide reasonable assurance of the

trustworthiness and competence of the staff members and of the satisfactory performance of their duties

in the fields of the electronic signature related technologies. Each DPWN member of the DPWN staff

executes a statement of abiding by data protection legislation and meeting confidentiality requirements

like they associate with their post.

All members of the DPWN personnel or the personnel of an authorized outsourced agent operating the

key management operations, administrators, security officers, and system auditors or any other

operations that materially affect such operations are considered as serving in a trusted position.

DPWN PKI Project Robert Sieber, DP ITS 23/39

Page 24: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

DPWN conducts an initial investigation of all staff members who are candidates to serve in trusted roles

to make a reasonable attempt to determine their trustworthiness and competence.

Where dual control is required, at least two trusted DPWN staff members need to bring their respective

and split knowledge in order to be able to proceed with the ongoing operation.

The PKI roles are defined by the corresponding CPS documents.

Internal control procedures are designed to ensure that at a minimum, two trusted personnel are

required to have either physical or logical access to the device. Access to CA cryptographic hardware is

strictly enforced by multiple trusted persons throughout its lifecycle, from incoming receipt and

inspection to final logical and/or physical destruction. Once a module is activated with operational keys,

further access controls are invoked to maintain split control over both physical and logical access to the

device.

5.3 Personnel Security Controls

DPWN should perform checks to establish the background, qualifications, and experience needed to

perform within the competence context of the specific job. Such background checks might typically

include:

• criminal convictions for serious crimes

• misrepresentations by the candidate

• appropriateness of references

• any clearances if available

• finished probation period

DPWN makes the relevant checks to prospective employees by means of status reports issued by a

competent authority, third -party statements or self-declarations.

DPWN makes training available for their personnel to perform their CA and RA work functions. Periodic

training updates might also be performed to establish continuity and updates of the knowledge of the

personnel and procedures.

DPWN sanctions personnel for unauthorized actions, unauthorized use of authority, and unauthorized

use of systems for the purpose of imposing accountability on a participant's personnel, as may be

appropriate under the circumstances.

DPWN PKI Project Robert Sieber, DP ITS 24/39

Page 25: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

Independent contractors are subject to the same privacy protection and confidentiality conditions as

DPWN personnel.

5.4 Audit Logging Procedures

Audit logging procedures include event logging and audit systems, implemented for the purpose of

maintaining a secure environment. DPWN implements the following controls:

CA key life cycle management events logging, including:- key generation, backup, storage, recovery, archival, and destruction- cryptographic device life cycle management events

CA and Subscriber certificate life cycle management events logging, including:- certificate Applications, renewal, rekey, and revocation- successful or unsuccessful processing of requests- generation and issuance of Certificates and CRLs

Security-related events logging including:- successful and unsuccessful PKI system access attempts- PKI and security system actions performed by DPWN personnel- security sensitive files or records read, written or deleted- security profile changes- system crashes, hardware failures and other anomalies- firewall and router activity- CA facility visitor entry/exit

Audit trail records contain:- the identification of the operation- the date and time of the operation- the identification of the certificate involved in the operation- the identification of the person that performed the operation- a reference to the request of the operation

Documents that are required for audit include:- infrastructure plans and descriptions- physical site plans and descriptions- configuration of hardware and software- personnel access lists

DPWN stores real-time audit logs, which are subsequently processed and archived on a regular basis. Following an alarm or anomalous event the Network Administrator is notified. The log files should be properly protected by an access control mechanism. DPWN implements audit log back up procedures.

Audit logs can only be viewed by authorized personnel as defined by the roles’ definition.

A subject that has caused an audit event to occur is not notified of the audit action. DPWN performs vulnerability assessments at least once a year.

DPWN PKI Project Robert Sieber, DP ITS 25/39

Page 26: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

5.5 Records Archival

DPWN retains records of DPWN digital certificates, audit data, certificate application information and

documentation supporting certificate applications in a trustworthy manner. DPWN retains records of

DPWN digital certificates in a trustworthy manner for a term indicated in the DPWN CPS.

Conditions for the archive protection include:

• viewing of an archive only by the records administrator (staff member assigned with the records

retention duty)

• protection against archive modification, such as storing the data on a write once medium

• protection against archive deletion

• protection against deterioration of the media on which the archive is stored, such as a

requirement for data to be migrated periodically to fresh media

5.6 Key Changeover

In terms of changing CA keys the new CA key will be made available via the following interfaces:

• distribution via DPWN directories for internal subscribers

• publication in DPWN repository for external subscribers and relying parties

5.7 Compromise and Disaster Recovery

In one or more separate internal documents, DPWN notes applicable incidents, makes compromise

reports and describes the handling procedures. DPWN documents the recovery procedures used if

computing resources, software, and/or data are corrupted or suspected of being corrupted.

DPWN strives to reestablish a secure environment taking steps that include, but are not limited to,

revoking of a corrupted (or suspected of being corrupted) entity’s certificate. Subsequently DPWN may

reissue a new certificate to the entity.

A business continuity plan has been implemented to ensure business continuity following a natural or

other disaster.

5.8 CA or RA Termination

Before terminating its CA activities with DPWN PKI, a DPWN PKI Partner:

• provides valid certificate subscribers with reasonable notice of its intention to cease acting as a

CA

DPWN PKI Project Robert Sieber, DP ITS 26/39

Page 27: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

• revokes all certificates that are still valid (i.e. have not been revoked or expired) at the end of the

notice period without seeking subscriber’s consent

• gives timely revocation notice to each affected subscriber

• makes reasonable arrangements to preserve its records according to this CP

• provides succession arrangements, if possible, for the re-issuance of certificates by a successor

CA under the same CP

DPWN PKI Project Robert Sieber, DP ITS 27/39

Page 28: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

6 Technical Security Controls

This component is used to define the security measures taken by DPWN PKI to protect its cryptographic

keys and activation data. This component also describes other technical security controls used by

DPWN PKI to securely perform the key generation functions, user authentication, certificate registration,

certificate revocation, auditing and archiving. It can also be used to define any other technical security

controls regarding PKI.

6.1 Key Pair Generation and Installation

The DPWN CAs’ private keys are used to sign their issued certificates, certification revocation lists and

accredited root -signed entities (other CAs). Other usages are restricted.

For its root key, DPWN uses FIPS compliant algorithm with a key length of at least 2048 bits and a

validity period no longer than 15 years.

DPWN securely generates and protects its own private key(s), using a trustworthy system, and takes

necessary precautions to prevent the compromise or unauthorized use of it. DPWN implements and

documents key generation procedures, in line with this CP. DPWN acknowledges public, international

and European standards on trustworthy systems.

The generation of the private key(s) of DPWN CAs occurs within a secure cryptographic device meeting

appropriate requirements including ISO 15782-1, FIPS 140-1 at least level 2, ANSI X9.66. The

generation of the DPWN CAs private key(s) requires the control of more than one appropriately

authorized staff members serving in trustworthy positions. More than one member of the management

makes the key generation authorization in writing.

DPWN CAs use a secure cryptographic device to store its own private key(s) meeting the appropriate

ISO 15782-1/FIPS 140-1/ANSI X9.66 level requirements. The storage of the DPWN private key requires

multiple controls by appropriately authorized staff members serving in trustworthy positions. More than

one member of the management makes the key storage authorization and personnel assignment in

writing.

DPWN’s private key(s) is/are backed up, stored and recovered by multiple and appropriately authorized

staff members serving in trustworthy positions. More than one member of the management makes the

key storage authorization and personnel assignment in writing.

DPWN’s secret share holdings use multiple authorized holders to safeguard and improve the

trustworthiness of private key(s) and to provide for key recovery. Before secret shareholders accept a

DPWN PKI Project Robert Sieber, DP ITS 28/39

Page 29: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

secret share they must personally have observed the creation, re -creation, and distribution of the share

or its subsequent custody chain. A secret shareholder receives the secret share within a physical

medium, such as a DPWN approved hardware cryptographic module. DPWN keeps written records of

secret shared distribution.

DPWN private keys are destroyed at the end of their lifetime in order to guarantee that they cannot ever

be retrieved and used again. DPWN keys are destroyed by shredding their primary and backup storage

CD-ROMs, by deleting their shares and by powering off any hardware modules on which the keys are

stored.

The key destruction process is documented and associated records are archived.

6.2 Private Key Protection and Cryptographic Module Engineering Controls

DPWN uses appropriate cryptographic devices to perform CA key management tasks. Those

cryptographic devices are known as Hardware Security Modules (HSMs). Such devices meet the

requirements of FIPS PUB 140-1 Level 2 or higher, which guarantees, amongst other things, that any

device tampering is immediately detected; and private keys cannot leave devices unencrypted.

Hardware and software mechanisms that protect CA private keys are documented. The documentation

demonstrates that CA key protection mechanisms are of at least equivalent strength to the CA keys they

are protecting.

In case HSMs require maintenance or repair that cannot be done within DPWN premises, they are

securely shipped to their manufacturer.

The DPWN Root CA private key remains distributed under all entities operating an intermediate CA.

Within these entities the transport key must remain under n out of m multi-person control. The DPWN

Root CA private key is not escrowed. DPWN records each step of the key backup process using a

specific form for logging information.

6.3 Other Aspects of Key Pair Management

DPWN archives its own public key. DPWN issues subscriber certificates with usage periods as indicated

on such certificates.

DPWN PKI Project Robert Sieber, DP ITS 29/39

Page 30: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

6.4 Activation Data

DPWN securely stores and archives activation data associated with its own private key and operations.

6.5 Computer Security Controls

The following functionality may be provided by the operating system, or through a combination of

operating system, PKI CA software, and physical safeguards (policies and procedures). Each CA server

will include the following functionality:

access control to CA services and PKI roles, see Section 5.1

enforced separation of duties for PKI roles, see Section 5.2

identification and authentication of PKI roles and associated identities, see Section 5.3

use of cryptography for session communication and database security, mutually authenticated

and encrypted SSL/TLS is used for all communications

archival of CA history and audit data, see Sections 5.5 and 5.6

audit of security related events, see Section 5.4

trusted path for identification of PKI roles and associated identities, use of X.509 certificates for

all administrators

recovery mechanisms for keys and CA system, see Section 5.7 and business continuity plan

DPWN Root CA server will be detached from the network and stored in an isolated cage. OS

Administration will be done by the CA Administrator group. Patching will be done in accordance with the

CPS document

6.6 Network Security Controls

DPWN maintains high-level network systems security including firewalls and intrusion detection systems

directly or through an authorized agent.

6.7 Time Stamping

Section not applicable

DPWN PKI Project Robert Sieber, DP ITS 30/39

Page 31: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

7 Certificate and CRL Profiles

This component is used to specify the certificate format and, if CRL and/or OCSP are used, the CRL

and/or OCSP format.

7.1 Certificate Profile

DPWN publishes the certificate profiles in its CPS.

7.2 CRL Profile

In conformance with IETF PKIX RFC 2459, DPWN supports CRLs compliant with:

• version numbers supported for CRLs

• CRL and CRL entry extensions populated and their criticality

7.3 OCSP Profile

DPWN publishes the OCSP profiles in its CPS.

DPWN PKI Project Robert Sieber, DP ITS 31/39

Page 32: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

8 Compliance Audit and Other Assessment

This component addresses the following:• list of topics covered by the assessment and/or assessment methodology• frequency of compliance audit or other assessments • identity and/or qualifications of the personnel performing the audit or other assessments• relationships between the assessor and the entity being assessed. • actions taken as a result of deficiencies found during the assessment• who is entitled to see results

8.1 Frequency or circumstances of assessment

The audit will be conducted annually and can be performed by assigned DPWN department or by an external audit firm.

More than one audit per year is possible if this is requested by the audited party or is a result of unsatisfactory results of previous audit.

8.2 Identity/qualifications of assessor

The auditor must demonstrate competence in the field of compliance audits.

8.3 Assessor's Relationship to Assessed Entity

Compliance Audits performed by third-party audit firms shall be conducted by firms independent of the audited entity. Such firms shall not have a conflict of interest that hinders their ability to perform auditing services.

8.4 Topics Covered by Assessment

The purpose of a compliance audit shall be to verify that the audited party has in place, a system to assure the quality of the services that it provides, and that it complies with all of the requirements of this CP and its CPS. All aspects of the audited party’s operation related to this CP shall be subject to compliance audit inspections.

8.5 Actions Taken as a Result of Deficiency

In case of a deficiency, the DPWN PKI Board will announce the steps that will be taken to remedy the deficiency. This announcement will include a timetable.

If a discovered deficiency has direct consequences on the reliability of the certification process, the certificates (suspected to be) issued under the influence of this problem shall be revoked immediately.

DPWN PKI Project Robert Sieber, DP ITS 32/39

Page 33: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

8.6 Communications of Results

The Compliance Auditor shall provide the DPWN PKI Board with a copy of the results of the Compliance Audit. The results will not be made public unless required by law.

DPWN PKI Project Robert Sieber, DP ITS 33/39

Page 34: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

9 Other Business and Legal Matters

This component covers general business and legal matters.

9.1 Fees

No stipulation.

9.1.1 Certificate issuance or renewal fees

No stipulation.

9.1.2 Certificate access fees

No stipulation.

9.1.3 Revocation or status information access fees

No stipulation.

9.1.4 Fees for other services

No stipulation.

9.1.5 Refund policy

No stipulation.

9.2 Financial Responsibilities

No Financial responsibility is accepted for certificates issued under this policy.

9.2.1 Insurance coverage

No stipulation.

9.2.2 Other assets

No stipulation.

DPWN PKI Project Robert Sieber, DP ITS 34/39

Page 35: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

9.2.3 Insurance or warranty coverage for end-entities

No stipulation.

9.3 Confidentiality of Business Information

9.3.1 Scope of confidential information

Audit information is to be considered confidential and shall not be disclosed to anyone for any purpose other than audit purposes or where required by law, or a contractual agreement between the CA and the company being given access to the report that protects the confidentiality of the audit information.

Any disclosure of information is subject to the requirements of any privacy laws and other relevant legislation and applicable organizational policy.

The digital signature private key of each Subscriber is to be held only by the Subscriber and shall be kept confidential by them. Any disclosure of the private key or media containing the private key by the Subscriber is at the Subscriber's own risk.

The Subscriber shall keep the Subscriber's copy of their confidentiality private key confidential. Disclosure by the Subscriber is at the Subscriber's own risk. Confidentiality keys may be backed up by the issuing CA in which case these keys shall be protected in accordance with Section 6, and shall not be disclosed without prior consent of the Subscriber or a duly authorized representative of the issuing CA unless required by law.

9.3.2 Information not within the scope of confidential information

Certificates, OCSP responses, CRLs and personal or corporate information appearing in them and in public directories are not considered confidential information.

9.3.3 Responsibility to protect confidential information

A CA must ensure that confidential information be physically and/or logically protected from unauthorized viewing, modification or deletion. In addition, the CA must ensure that storage media used by the CA system is protected from environmental threats such as temperature, humidity and magnetism.

Confidentiality keys may be backed up by the issuing CA, in which case these keys shall be protected in accordance with Section 6, and shall not be disclosed without prior consent of the Subscriber or a duly authorized representative of the issuing CA unless required by law.

9.4 Privacy and Personal Information

The DPWN service collects information about the subscribers. Information included in issued certificates and CRLs is not considered confidential.

DPWN PKI Project Robert Sieber, DP ITS 35/39

Page 36: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

Under no circumstances will the DPWN CA have access to the private keys of any subscriber to whom it issues a certificate.

9.4.1 Privacy plan

A CA’s guiding principle is to not disclose private personal information of its Subscribers, customers, employees, and partners without the prior consent of the aforementioned unless required by law.

9.4.2 Information treated as private

Any information about subscriber or requester that is not made public through the certificates issued by this CA, the CRL or the LDAP directory’s content is considered private information.

9.4.3 Information not deemed private

Subject to local laws, all information made public in a certificate is deemed not private.

9.4.4 Responsibility to protect private information

A CA must ensure that private personal information be physically and/or logically protected from unauthorized viewing, modification or deletion. In addition, the CA must ensure that storage media used by the CA system is protected from environmental threats such as temperature, humidity and magnetism.

9.4.5 Notice and consent to use private information

Unless where otherwise stated in this CP, the applicable Privacy Policy or by agreement, private information will not be used without the consent of the party to whom that information applies. This section is subject to applicable privacy laws.

9.4.6 Disclosure pursuant to judicial or administrative process

This section is subject to applicable privacy laws.

9.4.7 Other information disclosure circumstances

No stipulation.

9.5 Intellectual Property Rights

DPWN owns and reserves all intellectual property rights associated with its database, web sites, DPWN CA certificates and any other publication whatsoever originating from DPWN CA including this CP.

DPWN PKI Project Robert Sieber, DP ITS 36/39

Page 37: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

9.6 Representations and Warranties

A CA will issue and revoke certificates, operate its certification and repository services, and provide certificate status information in accordance with this CP. Authentication and validation procedures will be implemented as set forth in Section 3 of this CP.

All CAs will operate in accordance with this CP, their respective CPS(s) and applicable when issuing and managing certificates provided to CAs, RAs, sub-CAs and Subscribers under this CP. All participating CAs will require that all the RAs operating on their behalf will comply with the relevant provisions of this CP concerning the operations of the RAs. All participating CAs will take commercially reasonable measures to make Subscribers and Relying Parties aware of their respective rights and obligations with respect to the operation and management of any keys, certificates or End-Entity hardware and software used in connection with the PKI. Subscribers should also be notified as to procedures for dealing with suspected key compromise, certificate or key renewal, and service cancellation.

When a CA publishes or delivers a certificate, it declares that it has issued a certificate to a Subscriber and that the information stated in the certificate was verified in accordance with this CP.

CA personnel associated with PKI roles shall be individually accountable for actions they perform. "Individually accountable" means that there shall be evidence that attributes an action to the person performing the action.

Subscribers are required to protect their private keys, associated passphrase(s) and tokens, as applicable, in accordance with Section 6, and to take all commercially reasonable measures to prevent their loss, disclosure, modification, or unauthorized use Any Subscriber information shall be complete, validated and accurate with full disclosure of all required information in connection with a certificate or a query to a CA. The Subscriber shall only use the keys and certificates for the purposes identified in this CP and in any applicable agreement(s).

When a Subscriber suspects a private key compromise, the Subscriber shall notify the issuing Certification Authority in the manner specified by Section 4.9. When any other entity suspects private key compromise, they should notify the issuing CA

9.7 Disclaimers of Warranties

Not applicable.

9.8 Limitations of Liability

In no event will DPWN be liable for any damages to Subscribers, Relying Parties or any other party arising out of or related to the misuse of, or reliance on Certificates issued by DPWN CAs.

9.9 Indemnities

The DPWN CA declines any payment of indemnities for damages arising from the use or rejection of certificates it issues.

DPWN PKI Project Robert Sieber, DP ITS 37/39

Page 38: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

End entities shall indemnify and hold harmless the DPWN CAs operating under this CP/CPS against all claims and settlements resulting from fraudulent information provided with the certificate application, and the use and acceptance of a certificate which violates the provisions of this CP/CPS document.

9.10 Term and Termination

This document remains in force until:- no more valid certificates, issued under this CP, exist- it is replaced by a new version.

This document remains available for at least 5 years after no more valid certificates, issued under this CP, exist.

9.11 Individual Notices and Communications with Participants

Any participant has to communicate, in a proper way, to all those concerned, any changes in its status as participant of the DPWN PKI which may reasonably affect any or all of those concerned.

9.12 Amendments

Changes to this CP are indicated by an appropriate numbering.

9.12.1 Procedure for amendment

Amendments to this CP must undergo the same procedures as for the initial approval. Rephrasing provisions to improve their understandability as well as pure spelling corrections are not considered amendments.

9.12.2 Notification mechanism and period

The amended CP document shall be published on the DPWN CA Web pages at least 2 weeks before it becomes effective.

The DPWN CA will inform its subscribers and all relying parties it knows of by means of an e-mail.

9.12.3 Circumstances under which OID must be changed

No stipulation.

9.13 Dispute Resolution Procedures

Disputes arising out of the CP shall be resolved by the DPWN PKI Board.

9.14 Governing Law

Section not applicable.

DPWN PKI Project Robert Sieber, DP ITS 38/39

Page 39: DPWN PKI CP - DHL

DPWN PKI Project Unclassified

9.15 Compliance with Applicable Law

This CP is subject to applicable national, state, local and foreign laws, rules, regulations, ordinances, decrees and orders including but not limited to restrictions on exporting or importing software, hardware or technical information.

9.16 Miscellaneous Provisions

No stipulation.

9.17 Other Provisions

No stipulation.

DPWN PKI Project Robert Sieber, DP ITS 39/39