tistech ic lysimiar,buthasbe n res ructure in recog ition ofth publc tion ofBS 10 0 :2 14,Evide tialweighta dlegaladmis sibi tyof lecronic in ormation —Specification an c n beconsid re t
Trang 3identity to information
Trang 5electronic identity to inf ormation
Code of practice for the implementation of BS 10008
Trang 6BSISta d rdsLimite
3 9ChiswickHig R a
Lon onW 44A L
©BritishSta d rdsInsitution2 14
A ll rig t reserv ed.Ex ceptaspermite u d r h C pyrig t,Desig sa dP te t A ct 9 8,nopar of his
publcation ma bereprod ce , sore in aretiev al sys emor ra smite ina yformorbya yme ns–elect onic,
photoco yin , recordin oroth rwise–withoutpriorpermisioninwritin f omth publsh r
W his ev erycareh sbe nta e ind v elo in a dcompi n thispublcation,BSIacept nolabi tyfora ylos or
d ma eca se ,arisin directlyorin irectlyincon ection withrela ceon it conte t ex cept oth ex te t h t
suchlabi tyma notbeex clu e inlaw
W hieev eryeffor h sbe nma etotaceal co yrig thold r,a yon claimin co yrig t houldg tintouchwith
th BSI at h ab v ea dres
BSIh snoresp nsibi tyfor h per ise ceorac uracyofURLsf orex tern l or hird-paryintern tw ebsites ef ere
tointhisb ok,a ddoesnotg ara te th ta yconte tonsuchwebsitesis,orwi remain, ac urateor
ap ro riate
T herig t ofP terHow esa d A la Shipma tobeid ntifie as h a thor of hisWorkh sbe nasere byth m
inacord ncewithsections7 a d7 of h C pyrig t, Desig sa d P te t A ct 9 8
TypesetinFrutig rbyL t erpar Limite , et erpar.com
Printe in Gre tBritainbyB rf or Group, www.ber or co.u
BritishLibraryCatalo uin inP blcatio Data
Acatalog erecordf or hisb okisav aiablef omth BritishLibrary
ISBN9 805 08 6 85
Trang 8A nne AEx ampleelec ronic id ntity manag me tp lcys ateme t 6
Trang 9Evide tialweighta dlegaladmiss ibi tyoflnkingelecronicide titytoin ormation–Codeofpracice
for h impleme tation ofBS10 00 8( ref er e toin thisdocume tas’th C d ’)isprimariyconcern d
w ith th auth nticity, nte rityan av aiabi tyofelect onicid ntity,toth d monsrablelev elsof
ceraintyre uire byan organiz tion tisparicularlyap lc blew hereelect onicid ntityat a h dto
specif icdocume t oroth rinf ormationmaybeuse asev id ncein disputesinsid an outid th
le alsys em
T hisisth f if he ition ofth C d , w hichw asf irtpublsh d byBSI n 19 8,asPD5 0 T hise ition is
ane itorialrev ision ofth four he ition (2 0 ) tistech ic lysimiar,buthasbe n res ructure in
recog ition ofth publc tion ofBS 10 0 :2 14,Evide tialweighta dlegaladmis sibi tyof lecronic
in ormation —Specification an c n beconsid re tobea g id toth impleme tation ofth British
Stan ardin relation toln in elect onicid ntitytoinf ormation
User ofal prev iouse itionsshould consid r h adv antag sofasesin th irinf ormation
manag me t ys emsinlg tofthisn we ition, an ame d th ir ys emsan /ordocume tation
w hereap ro riate
T hispublc tion is h third par ofBIP0 0 , which ismad upofth f olow in :
• BIP0 0 -1 ( 2014), Evide tialweighta dlegaladmiss ibi tyofin ormation storedelecronicaly—
Codeofpracice forth impleme tation ofBS100 0 8;an
• BIP0 0 -2( 2014), Evide tialweighta dlegaladmiss ibi tyofin ormation ta sferedelecronicaly
—Codeofpraciceforth impleme tation ofBS10 0 0 8
T heC d ispublsh d byBSI n recog ition ofth larg n mberofimpleme tationsofelect onic
inf ormation manag me t ys ems,an of h contin in u cer aintyab ut h le ala ceptabi tyof
anelectonicid ntityln e toelect onicinf ormation tprov id sgo d pra ticeg idancef orth useof
electonicid ntitymanag me t ys ems
Trang 10T heE itor w ouldespecialylk tothan th BSILe al A dmis ibi tyE itorialBoard an Pan lan
commit e sIDT /1,Docume tmanag me tap lc tionsan IDT /1/ 5,Rev isionsofBS10 0 f or h ir
contibution toth cur e tan prev iouse itionsofthispublc tion, n par icularf orth irbusin s
f oresig tan tireles readin of h man script T heir u g sionsforimprov eme t ad e v alu to
th f inalpublc tions
T hemember ofIDT /1 areMarin Baie , anCurin ton,A an i ns on,MarcFresko,P terHowes, P i p
Jon s,An rewKe n , Bi Mayon-W hite,R g rSPo le, NickPo e, an Wald n,LeonieWat on, An rew
Pibw or h,Nei Pitman,Alan Shipman an TomW ilson
T hemember ofIDT /1/ 5areElsabeth B lsle,B rnieDy r, P terHow es,Richard Jeffre -C ok,Bi
Mayon-W hite,R g rSPo le, Alan Shipman,R d Ston an Tom W ilson
In paricular, w ew ould lk tothan Je nif erCar uth fomBSIf orh rex cele tadv icean
co y-e itin ski sin d v elo in BS10 0 :2 14
P terHow es
A lan Shipman
( Editor)
Group5Trainin Limite
T hef ir te ition ofPD5 0 , publsh din 19 8,w assp nsore byGroup5, nasociation withth
Elect onicOriginal nitiativ e
BSI would lk tothan th f olowin peo lew horev iew ed th f if the ition ofthisb ok:
Joh Av alan t, Managin Director&Principal Cerulean AsociatesL C
Dian Shi ito,QualtySysemsManag r,CDS
Nei Mau e,Ge eralManag r,A re a Group
Elsabeth B lsle,Managin Director, S an ox
Trang 11Electronic ide tit y
T heimpleme tation an useofelectonicinformation manag me t ys emsan elect onic
commu ic tionssysemsprov id sig ific ntbe ef it toman organiz tions.T hetaditionalproces esof
asociatin id ntityw ithinf ormation toates origin, authorityorco yrig tow nerhipare, how ev er,
nolon ersuff icie tan th proces of‘sig in ’ in in , a paperdocume ttoconfirmw hoprod ce ,
ap rov edorauthorize itmaynolon erbepra tic lya hiev ableoreff icie t.Methodsf orprov idin
ane uiv ale t oth seid ntitymarksn e tobeprov id dbysuch sysems.T heC d d tais
o erationalproce uresan tech olog re uireme t forth see uiv ale tmethods
Man tech iq esareav aiabletoreprese tth inte torconse tofanin iv id alex pres e inan
electonicdocume torelectonictansa tion an toshowthatth elect onicdocume torelect onic
tansa tion w asa tualycreate orap rov edbythatpar icularin iv id al thatis,th elect onic
e uiv ale tofa han writ e sig ature
W hereco yrig tow nerhipc nbeasociate w ithelectonicinf ormation,ad itionalev id nceis
av aiablew ith re ard toth id ntityofth inf ormation ow ner.Ad itionaly,w hereelectonic
inf ormation hasbe ne crypte , th remaybead itional ev id nceof h inf ormation own r
INFORMATION –Ide titytheft: The problem
Ac ordin toAction Frau ,th UK ’snationalf rau an intern tcrimerep r in ce t e, d ntity
th f tisw he peronald taisaresole an id ntityf au is h useof hats ole id ntityin
criminal a tiv itytoo tain go dsor erv icesbyd ception
Frau ser c n useid ntityd tais o:
• o e ban a cou t;
• o tain cre itc rds, oansan s atebe ef it;
• ord rgo dsin th targ te per on’sname;
• tak ov er h targ te peron’sex isin a cou t ;
• tak outmo iephon conta t ;an
• o tain g n in docume t such aspas p r san driv in lce cesinth targ te peron’s
name
Stealn an in iv id al’sid ntityd taisdoesnot,on it ow n,consituteid ntityf rau B tusin
thatid ntityf oran ofth ab v ea tiv itiesdoes
htp:/w ww.actionf a d.p lce.u / a d_protection/id ntity_fra d
Inth UK,CIF AS( th UK’sFrau Prev ention Serv ice)rep re thatth f rau ule tuseofid ntity
d taisisth big es an mos perurbin fau threat
5 % ofal f rau sid ntif ie in th UKd rin 2 12relate toth imperonation ofan in oce t
v ictim orth useofa completelyf alseid ntity Furh rmore,w his th n mberoff rau c ses
id ntif ie roseby5% betwe n2 1 an 2 12th n mberofid ntityf rau c sesid ntif ie rose
by9.1% in th sameperiod
htp:/w ww.cif as.org.u / a dte dswe tytwelv e
Trang 12Id ntityth f tisa worldw id isu nDecember2 13th JusiceDepar me t’sB reauofJusice
Statisics(BJS)an ou ce thatanesimate 16.6mi ionpeo le,represe tin 7perce tofal
per onsag 16orold rin th Unite States,ex perie ce atleas on incid ntofid ntityth f tin
2 12 d ntityth f tv ictimsrep r e a totalof$2 7bi ion in directan in irectlos esat ribute
toal incid nt ofid ntityth f tex perie ce in 2 12 tisimp r anttorealzethatth selos es
ex ce d d th $14bi ion v ictimslos f rom al oth rpro erycrimes( burglary,motorv ehicleth f t,
an th f t)measure byth USNationalCrimeVictimiz tion Surv eyf orth sameperiod
htp:/w ww.bjs.gov /in ex cfm?ty= bd tai&id=4 21
T heC d d taisproce uresf orth useofcer ific tes hatid ntif yin iv id alsororganiz tionsas
elect onicv erionsofth man al sig in ’ ofdocume t byth sein iv id alsororganiz tions A n
in epe d ntv erif ic tionof uch a cerif ic temaybere uire eith rat h timeofa specifica tion or
proces (e.g.an electoniccommu ic tion bein se torsore ),orsubse u ntly, T hispar ofBIP0 0
d fin sproce uresthat hould beimpleme te wh n usin sucha f aci ty
Forth purp sesofth C d ,anorganiz tion abletov erif ysuch cer if ic tesan sig aturesis efere
toasa ‘t us e third pary’( T T P).AT T Pisan organiz tion thatwi per orm th v erif ic tion of
cerif ic tesuse byanorganiz tion,oris u d toa paricularin iv id al T heT T Pmaybeth original
is u rofth cer if ic tes nsomec ses, howev er,anag ntof h T T Pmayhav ebe n th cerific te
is u r
T heA meric n BarA ssociation publc tion,DigitalSign tureGuideln s :Legal n rastrucurefor
Cerification Authoritiesa dS cureElec ronicCommere,s atesthata T T P’mus hav esuff icie t
f inancialresources:
1 tomaintain it o erationsin conf ormityw ithit d ties,an
2 tobereasonablyabletobearit riskoflabi tytosubscriber an per onsrelyin on cer if ic tes
is u d byth cer if ic tion authority[T T P]
T hisbasicte etshouldbeascerain d byth userofth T T P,especialyasitispla in relancean
tus in th T T P’s erv ices
T hisin turn leads oanoth rimp r antfa tor.T helev elofsuretyre uire f ora paricularcerif ic te
mayv aryd pe din up n th v alu ofth inf ormation bein sig e T heusern e s oe surethat
th labi tya cepte byth T T Pisap ro riatef or h specif icinf ormation bein sig e
INFOR MATION–tS cheme
P o lean organiz tionsn e tohav etus in e-commerce Tothise d,commercialsecurity
serv ices,g n ralyc le ’tus serv ices’ arebein intod ce toh lpd f en agains f rau an
los ofpriv acy tS h mew ascreate tof aci tateconf id ncethat h se’Trus Serv iceProv id r ’
( T SPs), w il d lv erth serv icesth yclaimtooff erhon s lyan ex per ly
tS h meisan in epe d nt,non-pro tmakin , n us ry-le UKb d setuptoap rov eth se
serv icesan prov id thatconf id nce MemberhipoftS h meisa tiv elye courag d a ros al
interese sector ofU in us ry,an abroadran eoforganiz tionsarealread represe te an
contibutin toit d v elo me t
Asaw are es ofe-securitygrow s,anincreasin n mberofe d user an relyin pariesare
lo kin forex tra as urancebef orecommit in toonln t ansa tions n par icularth yw il lo k
f ora w ebseal toshowthata w ebsiteo eratestoparicularsan ards nth samew ay,th
tS h meMarka t asa t us sealtoshowthat h serv iceprov id risf olow in bes pra tice
Trang 13• th serv icehasbe n thorou hlyev aluate agains rigorouscriteria byin epe d ntex pers;
• th serv iceprov id rhasagre d tok eptoth secriteria;
• th serv iceprov id r ubscribestoth tSch meCodeofConduc;an
• th serv iceprov id rhasagre d toa tpromptlyan f airlytoreme yf ault
ht p:/www.t ch me.org/
T heC d d taisinf ormation thata user hould ch ckbef oreusin a T T P talsod taisis u sthata
T T Pshouldad res
An mberofth seareasw il berelativ elyn wtoman organiz tions Ke an cer ific teisuin
organiz tionsan serv iceprov id r ,howev er, off erprod ct an serv icesthatad res th seareas.T heir
g idancec nbev eryusef ul but, asw ith al serv iceorprod ct up ler ,th on sw il res withth
user( organiz tion orin iv id al)rath rthan w ith th sup ler
Man serv iceprov id r w il inclu ea cerif ic tep lcyan a ’cer ific tion pra ticesateme t’ (CPS)as
par ofth ircommitme ttoth iruser T hese( an th sup ler’sconta t)n e toberev iew edin
d tai agains th organiz tion’sre uireme t if uch a sup lerisuse
P rpose of t he Code
T heC d cov er:
• se d ran recipie tid ntityv erif ic tion;
• ev id ntialyprov ableelectonicsig atures;an
• ln in id ntityofco yrig town r hiptoelect onicinf ormation
T heC d alsocov er th ap lc tionof ech olog toprov id elect onicmesag se d ran recipie t
id ntityv erif ic tion;thisisth asociation ofid ntityw ith a tansere docume t.T hismaybebyth
useofa digitalsig ature; wh reth simiaroras ociate cryptographictech iq esarealsouse f or
conf id ntialty, thisap lc tionisad res e in thispar ofBIP0 0
T heC d doesnotcov er h ap lc tion ofid ntityan id ntitytok nsf ora ces toserv ices.T hese
logic l an ph sic la ces cont olf unctionsmaywel usetech iq esin common w ith thoseuse in th
C d T hef un ame talq es ionask d w he an id ntityisatribute toanin iv id alof‘A reth y
realyw hoth ysayth yare?’ sa common isu thatmus bead res e
T heC d doesnot ecomme d specif ictech ologies–itsimplyd taisre uire atributes,proce ures
an proceses obe ap le ,tog th rw ith th re uireme t forth au itof uch sysems
Manageme t f ramew ork
Chapter 1 to7ofth C d aresructure alon th ln sof h san ardize sructureofISO
Manag me tSysemStan ards,such thatit impleme tationc n besy chronise with oth r
manag me t ys emssuch asBSISO/IEC2 0 1:2 13In ormation tech olo y—S curitytech iq es—
In ormation securityma ageme ts ystem—Req ireme ts,w hereap ro riate
Trang 15T hispar ofth C d cov er proce uresan proces esrelev anttoth f olow in elect onicinf ormation
auth ntic tionprinciples:
• electonicid ntityv erif ic tion –prov in th g n in n s ofth in iv id al/organiz tion that
prod ce ,t ansf er e an /orsore th electonicdocume t;
• electonicsig ature–th ap lc tion ofth le al e uiv ale tofa ‘pe an in ’sig atureon a
paperdocume t;
• electonicco yrig t–th ap lc tion ofa co yrig tmarktoan electonicinf ormation; an
• ln in th electonicid ntityan /orelectonicsig aturean /orelectonicco yrig t oth
paricularelectonicinf ormation ( an prev entin compromisetoit inte rity)
T heid ntityofth originatoror e d rofelect onicinf ormation mayn e tobed monsrate ,
paricularlyw herepro lemsoffalseid ntityhav ebe n d tecte ,oraresuspecte T hisre uireme tis
paricularlyap lc ble w hereintern tcommu ic tionsareinv olv ed.T pic ly,ro us an tus w or h
electonicv erif ic tionofid ntityisap le usin cryptographictech iq es, byth is u an useof
cerif ic tesinv olv in Priv atean P blcK eytech ologies
W hereelect onicsig aturesareuse ,th C d prov id sg id ln sf ore surin thatsuch sig atures
w il repla eore hancean ex isin w rit e sig ature.Such sig aturesn e tobeselecte an uti ze
w ithoutu ex pecte compromisetoth par iesinv olv edin th ex chan eofsig e inf ormation an it
v erific tion an v aldation.Electonicsig atureswi , n al c ses,n e tobesup or e byan electonic
id ntity
W hereelect onicco yrig tprotection sysemsareuse ,th C d prov id sg id ln sf orth iruse n
th contex tofth C d ,co yrig tdoesnotinclu ecolectionoflce ce f ees,purelyth protection an
ln in ofco yrig tholdin byan e titytoa docume t
INFORMATION –Dig italrig ht manag eme t
Digitalrig t manag me t( DRM)isan umbrela termf orle alybin in tech ic l protection
measuresthatalowow ner ofco yrig te digital conte ttocont oldigitalconte taf teran
ordinarycont a tles saleofth conte t
DRM p seson of h greates chale g sf orconte tcommu itiesin thisdigital ag Traditional
rig t manag me tofph sic l material be ef ite f rom th materialsph sic ltyasthisprov id d
somebar ier tou authorize ex ploitationofconte t.Today, howev er,w e alread se serious
brea h sofco yrig tlawbec useofth easew ithwhich digitalfiesc nbeco ie an
tansmit e
Fir t-g n ration DRM sysemsf ocuse on securityan e cryptionasa meansof olv in th is u
ofu authorize co yin ;thatis, ockth conte tan lmitit disribution toonlythosewhopay
Aw el u d r to d ex ampleofthisisth sup lyofa on -timek ytocompleteinsalation of
dow nload d sof tw arean e force w ebbase re is ration toe sureth sof tw areisnot
repetitiv elyinsale in cont av ention of h lce ce
T hisap roa h was ubsantialynarow erthan th broad rc pabi tiesofsecon -g n ration DRM
sysems.T hesecon g n ration ofDRM cov er th d scription, d ntif ic tion, tadin ,protection,
monitorin an ta kin ofal f ormsofrig t usag sov erb thtan iblean intan ibleas et,
inclu in manag me tofrig t hold r ’relationships.Ad itionaly, tisimp ranttonotethat
DRM isth ‘digital manag me tofrig t ’an notth ‘manag me tofdigitalrig t’ T hatis,
DRM manag sal rig t,notonlyth rig t ap lc bletopermis ionsov erdigitalconte t
Trang 16DRM sy stems esrictth useofdigitalf ilesinord r oprotect h interes sofco yrig thold r.
DRM tech ologiesc ncontolf ilea ces (n mberofv iewsan /orle gth ofv iew s),alterin ,
sharin ,co yin , printin an sav in T hesetech ologiesmaybecontain d within th o eratin
sys em orprogram sof tware, orin th a tualhardwareofa d v ice
DRM sy stems ak tw oap roa h stosecurin conte t T hef ir tis‘containme t’ an ap roa h
w hereth conte tise crypte in ash l sothatitc n onlybea ces e byauthorize user T he
secon is‘markin ’ th pra ticeofpla in a w atermark, f lag orX ML tag
( BSISO/IEC210 0-5:2 0 ,In ormation tech olo y—Multimediaframework(MP G-21)—Par 5:
RightsExpression La g age)onconte tasa sig altoa d v icethatth me ia isco yprotecte
Information rig t manag me t( IRM),sometimesalsoc le E terpriseDigitalRig t
Manag me t, sa subsetofDRM RM isuse protect e sitiv einf ormation f romu authorize
a ces typic lyin a busin s -to-busin s mod l( e.g f inancialdata, ntelectualpro ery,
ex ecutiv ecommu ic tions) RM alow sf orinf ormation ( moslyin th f ormofdocume t an
emais)tobe‘remotecontole ’ T hismeansthatinf ormationan it contolc n nowbe
separatelycreate , v iew ed,e ite an dis ribute
W his notn ces ariyev id ntial w eig tan le aladmis ibi tyis u s,an bec usesimiarcryptographic
tech iq esareof e use ,th C d alsoprov id sg idanceforprov ision ofconf id ntialtyis u s, by
e surin that h inf ormation c n otbese n byu authorize in iv id als C nfid ntialtyof
inf ormation istypic lyhan le byap lyin cryptographice codin toth inf ormation,sothatitc n
onlybea ces e bysomeon hav in th ap ro riated codin procesesan k ys
COMMENT
Emai hasbecomean es e tialbusin s to l butitmus beuse w ith c reifth se d ror
recipie tistorelyup n emai in th ev entofa dispute tisnottech ic lydiff iculttomak
an emai ap eartocomef omsomeon oth rthanth realse d r.T hisID‘sp o n ’ suse
ex te siv elybyspammer tomaskth irid ntities
Man secureemai serv icesuse’Secure/Multipurp seIntern tMai Ex te sions’ (S/MIME),
w hichprov id a consis e twaytose d an receiv esecureMIMEdata Se th Intern t
E gin erin TaskForce’s(IET F’s)RFC3 51 ( toberepla e by5 51).Base onth w id ly
ado te intern tMIMEsan ard,S/MIMEprov id s h folow in cryptographicsecurity
serv icesf orelectonicmesagin ap lc tions:
• auth ntic tion;
• mesag inte rityan non-repu iation oforigin(usin digitalsig atures);an
• data conf id ntialty(usin e cryption)
Anoteofc ution: toe ableth intern tmai inf rasructuretorouteconfid ntial mes ag s
thatinclu eS/MIME, th rearepar sof h mes ag thatc n otbee crypte ,f orinsance,
th recipie tan se d rid ntityd tais
A ppl cabi ty
T hispar of h C d isap lc bletoelect onicid ntitymanag me tsys emsan c nbeap le to
an f orm ofelect onicid ntitymanag me tsysem, respectiv eof h tech olog use
Trang 17T he users
T heC d isinte d d for:
• e duserorganiz tionsthatwishtoe surethatelectonicid ntitymanag me tsysemsmaybe
use w ith confid nceasev id nceinan dispute,within orout id a cour oflaw ; an
• inte rator an d v elo er ofelectonicid ntitymanag me t ys emsthatprov id f aci ties o
• max imizeth ev id ntialw eig tthata cour oroth rb d mayas ig toprese te information;
• prov id conf id ncein inter -organiz tion tadin ;an
• prov id conf id ncetoex ternal nspector (f orex ample,re ulator an au itor)an sak hold r
thatth organiz tion’select onicid ntitypra ticesarero us an relable
T heC d maybeuse asa commonref ere cesan ard f orbusin s a tiv itiesw ithin an betw ee
organiz tionsan f orsubcont a tin orprocureme tofITserv icesorprod ct
Compl ance
Ea h chapterofth C d containsa g n rald scription of h isu sbein ad rese ,f olow ed bya
ls of‘k yis u s’ T hesek yisu sin ic teth critic l complancep int thatn e tobetak n into
consid ration, an a te up nwh reap ro riate, bef orecomplancew ith th recomme dationsof h
C d c n beclaime C mplanceisclaime ona v olu tarybasis,byself -cerific tion
Acomplanceworkb ok( BIP0 0 ( 2014),Evide tialweighta dlegaladmissibi tyofelec ronic
in ormation —Compla cework o kforusewithBS10 0 08) hasbe n publsh dtoe ablean
ases me tofcomplancewith BS10 0 tobecomplete W herecritic lcomplancep int f rom th
C d arenotspecific lyinclu e inth British Stan ard,th sep int areinclu e asan o tional
comp n ntin th complancew orkb ok
T pic lcomplance sateme t areshownin 6.7.2.Se also6.7 f orinformation on complanceau it
K ey requireme ts
Inclu e in th contolsf orth C d area n mberofu d rlyin criteria that, w he comple w ith,
prov id asurancesthatelect onicid ntitymanag me tsysemshav ebe n use in a cont ole an
u d r tan ableman er.A ssuch,th yareap lc bletob thth se d ran th recipie tofelectonic
commu ic tions
Trang 18To ic Re uireme t
Pro fofid ntity E surin thatk ysan cerif ic tesaread e byth ap ro riate
in iv id alan /ororganiz tion
Securityofk ysan cer if ic tes E surin thatk ysarenotcompromise priortoan af ter h y
hav ebe n ad e toelectonicinf ormation
Relableco yrig tprotection
sys ems
E surin thatco yrig tisnotcompromise
Datean timeofatribution Id ntif yin th timeofad in inf ormation at ributes
Usera ceptance E surin thatauthorize recipie t c n relablyinterpretk ys
an cer if ic tes
T ble1 –K eyreq ireme tsf ormax imizin th ev id ntial w eig tofelect ronicid ntit yma a eme t
sy stems
Trang 191.1 Gener al
Thiss ecion ofth CoderelatestoClause4ofBS10 0 0 8, ‘Conte tofth orga iz tion’
W ith th mov ef rom paperoriginals oelectonicoriginaldocume t,th useofth elect onic
e uiv ale tofanin sig aturebecomesan imp r antpar ofa docume tauthoriz tion proces.A
sig aturec n alsobeuse asa method f orauth ntic tin th conte t ofa docume t
T ch ologiesc n beimpleme te thatap lyelectonicsig aturesofv ariousf ormstoelect onic
docume t ,with v ariousd gre sofconf id ncean inte rity.Somesys emsalsoalowf orth
v erific tion ofan elect onicsig aturebyanoth rin iv id alororganiz tion (a T T P)
A sw ithman typesofelect onicsysem, how ev er,simplyimpleme tin tech olog maynotprov id
th w eig tofev id ncen ces aryshould an electonicid ntitybechale g d T heimpleme tation of
ap ro riatep lciesan proce uresisn ces aryinord r ocreatesecure, sructure an au itable
electonicid ntitymanag me t ys ems
1.2 Is ues
T heorganiz tion n e s od termin th ex ternalan internal s u s hatarerelev anttoit purp se
an thatmayaff ectth auth nticityan inte rityofth information manag d byth id ntity
manag me t ys ems
T here uireme ttoauth ntic teelect onicinf ormationaset thathav eev id ntialsig if ic ncetoan
organiz tionmaybev ital tocontin e o erations.Such auth ntic tionsys emsarebecomin more
w id spread,an v ariousfeatureshav ebe n esablsh d byorganiz tionsinv olv ed w ith th sesysems
A uth ntic tion in th C d d alsw ith pro fofid ntityin relation todocume tsig atories,an to
co yrig tis u s
INFORMATION –Electonicanddig itals ig natu res
T hetermelectonicsig aturean digitalsig atureareof e use interchan eably–th yarenot
th samean th law, nmos jurisdictions, goes osomele gthtoclearlydis in uish betwe n
th m
Elect ronicsig aturemeansa computerdata compiation ofan symb l or eriesof ymb ls
ex ecute ,ado te , orauthorize byanin iv id altobeth le alybin in e uiv ale tofth
in iv id alshan write sig ature
T hereareman f ormsofelect onicsig ature, man ofw hicharenotpar icularlyresisantto
f rau (butitmus beremembere thatf rau isalsoprev ale tw ithhan w rite ’w et’sig atures)
Electonicsig atureshav eman ofth samepro lemsashan w rite sig aturesbutalsohav e
someoth r toconsid r
Digitalsig ature meansan elect onicsig aturebase up n cryptographicmethodsoforiginator
auth ntic tion,compute byusin a setofrulesan a setofparameter such thatth id ntityof
th sig eran th inte rityof h data c n bev erifie
T hedigital sig atureusesa pairofcryptographick ys; on ofth sek ysisPriv atean th oth r
isP blc.T heP blcKe isshare butth Priv ateKe mus beretain d securely
Trang 20Ifsomeon elsehasa ces toanin iv id al’sPriv ateKe th nth yc n fau ule tlydigitalysig
f orthatin iv id alasanimp ser.T hisisw hysecurityof h Priv ateKe iscritic l toth
ro us n s an tusw orhin s ofsomethin digitalysig e
T hetw oimp rantatributesofdigitalysig e inf ormationare:
-• th sig eristh per on with th Priv ateKe ;an
• w hatw as ig e hasnotbe n chan e sinceth a tofsig in
Itisese tialatth plan in s ag toconsultw ith ap ro riatethird paries hatw il n e touseor
inspectth result f om auth ntic tion sysemsasd taie inth C d Ex amplesofsuchthird par ies
are:
• receiv in par ies;
• au itor;
• le al ex pers; an
• tech ic lan o erationals aff
T here uireme t ov erif ydigitalorelect onicsig aturesoroth rid ntif ic tionsys emsofelectonic
inf ormation bythirdparies,w ith f ul le al sig if ic nce, sf ar -rea hin Suchv erif ic tion sys emsbase
on digitalcerif ic tesarebecomin moref re u ntlyre uire ,asan in epe d ntch ckon elect onic
inf ormation inte rity, origination,authorityan auth nticity
Simiarly,th suc es f uluseofco yrig tprotection sys emsmaybecritic ltoth suc es ofan
organiz tion
T hus,wh n d sig in an impleme tin proce uresf orth v erific tion ofsuch sys emsinth ev entof
a chale g fom anoth rorganiz tion, tisese tialtoconsultw ith organiz tionsthatprov id
in epe d ntv erif ic tionserv ices( T T Ps)
Diff ere torganiz tionsmaynotbeusin th sameT T P.W herethissituation oc ur, th proce uresfor
th v ariousT T Psmaybediffere t, asmig tth serv icesoff ere ,th rigourofch cksper orme an
labi tiesa cepte St ictcontol w il ben e e u d r h secircumsances
T heuserofa specificT T Pn e stobeaw areofth ‘n tw orkof rus ’thatth irT T Pisa par o an
should e surethatit labi tyf orcer if ic tev erif ic tion ishan le byit T T P( an not‘pas e on’
alon th chaintoales tus w or h organiz tion)
INFOR MATION–Encry tion keys
Sof tware, usualyona user’scomputer,g n ratesth pairofe cryption k ys hatw il beuse in
secure ap lc tions–a P blcan a Priv ateKe
T hePriv ateKe isn v erdisribute or ev eale ;conv erely, th P blcKe isf re lydisribute to
an par ythatn gotiatesa securetansf er
Durin th re isration ore rolme tproces ,th user’sP blcK eyis e tina cerif ic tere u s
toth cer if ic tion authority( CA )orit authorize ag nt,a re isration authority
W he th CAap rov esth re u s, tg n ratesth user’sdigitalcer if ic te.T heuser’scer if ic te
w il hav ebe n digitalysig e byth CA.A f ter h user eceiv eshisorh rcerif ic tean ins als
iton th computer,h orsh c n par icipatein th secure ap lc tion
Trang 21T heuser’sdigitalcerif ic te( anX 5 9cer if ic te)containsth user’sP blcKe an hasbe n
digitalysig e byth CAaferch ckin thatth userrealyiswhoth ypurp r tobe(thismay
betodiff ere tlev elsofconf id nced pe din onhowth ch cksarecon ucte ).T hedigital
cer if ic teisth n use eith rf ore cryption ordigitalysig in (f re u ntlyth rew il betw oset
ofk ysan tw ocer ific tes;on f ore cryption an a separateon f ordigitalsig in ) T he
digitalcer if ic te,containin th user’sP blcKe , suse bysomeon w ishin toe cryptdata
f orthatuser;th userd crypt thatdata usin th irPriv ateKe Fordigital sig in ,th user’s
Priv ateKe isuse an th P blcKe (in th cer if ic te) isth n abletoconf irmth inte rityof
th sig e conte tan thatitwas ig e byth user(w hoseid ntityw asconf irme byth CA
bef oreth ysig e th user’scerif ic te
INFORMATION –Hierarchyoft u s t
T hereisa conceptofhierarch oftus ;thisis implythatth remus bea CAthatev eryon
agre sist usworh T hisultimateauthorityisc le th ro tCA.T hero tauthorityc n th n
cer if yoth rCA s belowit,w hich c nth n cerif yCA sbelowth m, etc T hisisi usrate in th
diagram ov erleaf
W he a cer if ic teisreceiv ed thathasbe n is u dbya f irtorsecon lev el CA , th userc n
v erif ythat h CAthatsig e th cerif ic tehasbe n cer if ie bya CAatth lev elab v eitan ,
inturn, thatCAhasbe n cerif ie byth on ab v ethat,an soon u ti a chain oftus ex is s
betw ee th low erlev elCA(ora usercer if ic te)an th ro tCA Forex ample, n th diagram,
itc n bev erif ie thatCANo 3wascer if ie byCANo.1,an thatCANo.1 w ascer ifie byth
R otCA
W he a cer if ic tef oma low erlev el CAispas e alon w ith ane crypte mes ag ,al ofth
cer if ic tesin it chain oftus uptoth ro tshould bepase alon with it
Trang 22T heorganiz tion,th ref ore,n e stoe surethatth agre me t betw ee th member ofth
n tw orkofT T Psaread q atetod lv erth re uire v erif ic tion serv icean that h fisc lg arante s
in th ev entoff aiurearesufficie ttome tit re uireme t
1.3 Requirements
W he esablshin orrev iew in th sysemsan /orproces esthatmanag th ev id ntialw eig tofth
id ntitymanag me tsysem,th organiz tion n e stod termin :
a) s ak hold r thatarerelev anttoth auth nticityan inte rityofinformation;
b) th re uireme t ofth ses ak hold r relev ant othatinf ormation;an
c) th re uireme t f orinf ormation sewardshipwithin th organiz tion
NOT E:T here uireme t of ta e old r ma inclu ele ala dre ulatoryre uireme t a dcont actu l o lg tions
T pic ls ak hold r mayinclu e:
• own r,manag r an saffof h organiz tion;
• third par iesw ith cont a t orsimiaragre me t w ith th organiz tion;
• cle t an cus omer in receiptofserv icesprov id d byth organiz tion;
• th publcw herepublcserv icesareinv olv ed;
Inf ormation sewardshipshould bemanag d byth id ntif ic tion ofinf ormation as etow ner ( IAO’s)
w how il typic lybethoseresp nsiblef orth proces esthatg n rateth inf ormation as etin
q es ion
Trang 231.4 Boundar ies and appl cabi it y
T heorganiz tion n e s od termin th b u dariesan ap lc bi tyof h auth nticityan inte rity
ofth inf ormation manag d byth id ntitymanag me tsys emsin ord rtoesablsh it sco e
W he d terminin thissco e, th organiz tionn e stoconsid r:
a) th ex ternal an internal su srefere toin 1.2;
b) th re uireme t refer e toin1.3;an
c) intera esan d pe d nciesbetw ee a tiv itiesperorme byth organiz tion an thosethatare
perf orme byoth rorganiz tions
T hesco en e stobeav aiableaspar ofth p lcydocume t
Trang 242.1 L eadership and commit ment
Thiss ec ionofth CoderelatestoClause 5ofBS10 0 0 8, ‘Le ders hip’
To manag me tn e s od monsratelead r hipan commitme tw ith respecttoth manag me t
of h auth nticityan inte rityofinformation manag dbyth id ntitymanag me tsysemby:
a) e surin that h id ntitymanag me tp lciesan o jectiv esarees ablsh d an arecompatible
w ithth srate icdirection ofth organiz tion;
b) e surin th inte ration ofth id ntitymanag me t ysem re uireme t intoth organiz tion’s
proceses;
c) e surin that h resourcesn e e f or h id ntitymanag me t ys em areav aiable;
d) commu ic tin th imp ranceofeffectiv eid ntitymanag me tan ofconf ormin toth
id ntitymanag me tsysemre uireme t;
e) e surin that h id ntitymanag me tsys em a hiev esit inte d d outcome(s);
f ) directin an sup orin peronstocontibutetoth eff ectiv en s ofth id ntitymanag me t
sys em;
g) promotin contin al mprov eme t; an
h) sup orin oth rrelev antmanag me trolestod monsrateth irlead rhipasitap lestoth ir
areasofresp nsibi ty
2.2 Pol cy statement s
2.2.1 Ge eral
Diff ere t ypesofdocume tmaybeelect onic lysig e byan organiz tion orbya w ork ron be alf
ofan organiz tion T hereceiv in organiz tion n e s obeabletov erif yth sesig atures.Toe able
th impleme tation of uch sysems,th organiz tion n e sa p lcys ateme tthatc n beuse to
g id impleme ter ,an tod monsratetooth rpariesthatsysemsuse w erein ln withp lcy
W herean organiz tionusesT T Ps uch asCA s,th p lcysateme tshouldinclu eth p lcyf or h ir
use
2.2.2 Electronic identity pol cy stateme t
2.2.2.1 Stucture
Toimpleme t h C d ,th p lcysateme tprod ce in complancew ithBIP0 0 -1 should be
ex te d d toinclu ep lcyonelectonicid ntitymanag me t
T hep lcys ateme t hould beap rov edbyth to manag me tofth organiz tion an rev iew ed
f orrelev ancean conte tatre ularinterv als.T hef e u ncyof ev iewshould beap ro riatetoth
ap lc tion.T hisperiod wi typic lybeth sameasth normalproce uralau itcyclewithin th
organiz tion, f orex amplean ualorin th ev entofmajorchan es oth sysem
T herew il f re u ntlybemorethan on typeofelectonicid ntitymanag me tsys em inusew ithin
an organiz tion.T he id ntityre uireme t f orea h docume ttypen e toberev iew ed,base on
timeln s an serv icelev els C s mayalsobea consid ration
Trang 25Inord r oalg electonicid ntityre uireme t with specif icelect onicdocume t, a docume t‘type’
d sig ation should bealoc te T hesetypesmaybed scribe byap lc tion ( e.g f inancialrep r sor
sockls s)orbyinformationconte t(e.g an inv oiceoran ord r)
T hep lcysateme tshouldsetoutg id ln sf orth ap ro riateap lc tion ofan electonicid ntity
f orea h docume ttype.T hiss ateme tshould inclu eth organiz tionalre uireme t f orid ntity,
authorityan co yrig tprotection
T hep lcysateme tshoulddocume tth lev el an rigourofprotection re uire ,d tai n th
re uireme t f orea h docume t ype
W hereth reisa re uireme t,th p lcys ateme tshould d scribeth d gre ofsecurityre uire ,for
ex amplesomedocume t arenotassig if ic ntasoth r an pro fofth sig atory’sid ntityisofles
imp r ance–f orinsance, an internalmemoaso p se toaconta tualcommitme t
T heu d rlyin is u w ith th seitemsis:w how il bere uire tou d r tan th sig if ic nceofan
electonicid ntityat a h d toa docume t? Ifitisalw ays omeon within th sameorganiz tion, tis
sig ific ntlyles comple than betw ee organiz tionsbec useth organiz tion c n setit ow n rules
Foral inter -organiz tionaldocume t contole with electonicsig aturesorco yrig tprotection, t
isimperativ ethatth recipie torganiz tion isc pableofu d r tan in th sig ific nceofw hatis
commu ic te toit,recog izin , mpleme tin an uti zin th relev antcont ols
A nn xAinclu esan ex ampleelect onicid ntitymanag me tp lcysateme t, w hich maybeuse
d rin th draf tin ofan organiz tion’sp lcysateme t tcontainssome‘typic l sateme t that
maybeap ro riatein man p lcysateme t
EX A MPL E
Forsomeelectonicdocume t , tisimp r antthatth id ntityof h sig atoryisrelable
an c n betus e Foroth relect onicdocume t,th a tual d ntityofth authormaynot
beimp r ant
Forex ample,anelectonicord rf orgo dsofhig v alu mayn e tobesig e byan
authorize memberofs aff T hereceiv in organiz tion w ould hav eals ofap rov ed
sig atories.T heord rwould n e tohav ea v erif iablesig atureat a h d
Anord rf orat ain tick tov erth intern tdoesnot,how ev er,n e tobesig e T he
raiwaycompan ishap ytoreceiv eth v alu ofth tick tbyth e t yofv aldate cre it
c rdd tais.T heid ntityofth t av elerisnotimp ranttoth t ansa tion
2.2.2.2 Co te t
T heuseofth term‘k ysan cer ific tes’ sap le toan ap ro riatean a ceptablecryptographic
tech olog thatc n beuse tov erif y:
Trang 26INFOR MATION–Biomet ics
Biomet icsaremethodsbyw hich th id ntityofan in iv id al c n beconfirme T he areuse by
comparin a n wlyc pture biomet icatributewith th biometicthatw asc pture d rin a
contole re isration proces ,w he th ln betw ee th biometican th ph sic l d ntity
couldbev erif ie T heatributesaregath re bymeasurin a peron’sap ro riateph siologic l
orbe av ioural f eatures
T heterm ‘biometic’ sd riv ed f rom th ancie tGre kw ords‘bios’f orlfean ‘meton’for
measure
In IT,biometicsusualyref er toth tech ologiesformeasurin an analysin h man
ph siologic lchara terisicssuch asf in erprint,e eretinasan irises,v oicepat erns,f acial
pat ernsan han measureme t ,especialyf orauth ntic tion purp ses.Ex amplesofbe av ioural
chara terisicsthatc nbemeasure inclu esig aturerecog ition,gait ecog itionan typin
recog ition
T hep lcys ateme t hould inclu eth organiz tion’sp lcy( forea h docume ttype)on:
• ap lc bleprotection tech iq esthatmaybeuse ;
• resp nsibi tiesf orth contolan manag me tofth setech iq es;an
• th cont olan manag me tofk ysan cer ific tes( ifuse )
W herethird pariesareinv olv ed,th resp nsibi tiesan labi tiesofthosethird paries hould be
clearlyid ntif ie
T hep lcys ateme t hould alsoinclu eth organiz tion’sp lcyon:
• th v erif ic tionof h v aldityofcer if ic tesan sig atures;
• rea tin tochale g stocer if ic tesan sig atures;
• w hereap ro riate, th selection criteria f orT T Ps;
• arbit ation routesasan in epe d ntmechanism f ore abln th resolutionofdispute
In somejurisdictions, res rictionsap lyastoth typesan complex ityofcryptographick ysthatmay
beuse f ore cryptionan electonicsig aturepurp ses T heseresrictionsshould beev aluate an
comple w ith asap ro riate
In somejurisdictions, e cryptionmaynotbealowe , ormayonlybealow ed toa cer ain lev el
Elect onicsig aturesmay, how ev er,bealow ed nthisev ent, tisimp ranttov erifythatth
tech iq esemploy d c n onlybeuse f or h prov ision ofelectonicsig atures
Ifth reisdoubtab utloc l e islation,th useofa T T Pshouldbeconsid re ,paricularlyw hereitis
abletome tloc l e islativ epra tices
Trang 27AT T Pn e s obeabletod mons rate it aw are es ofth v alu of h serv icethatitprov id s,w hich
n e stobeex ecute u d rit resp nsibi tiesu d rth d tyofc reprinciple
Tof ulfi thiso jectiv e, th organiz tionshould e surethatth T T Pc n d monsrateit aw are es o
• le islation an re ulatoryb diesperin nttoth T T Pan th organiz tion’sin usry;
• le islation per in nttocou ties( oroth rg ographic lareas)w hereit serv icesared lv ere ;
• th a cou tabi tyan resp nsibi tyre uireme t f ora tiv itiesinv olv in v erif ic tion serv icesatal
lev els; an
• d v elo me t, byk epin in conta tw ith th ap ro riateb diesan organiz tions
KEY ISSUE
> W heree cryption isuse ,an loc l e alresrictionsshould beid ntif ie an comple w ith
> T heuseofloc l T T Psmayas is in thisproces
2.2.2.4 Rolesandrespo sibi ties
T hep lcysateme tshouldinclu ea sateme t,forea hdocume t ype,ofth in iv id alresp nsible
f or h manag me tofth elect onicid ntitymanag me tsysems
T hep lcysateme tshouldinclu ea sateme tofth resp nsibi tyf orth isu ofv erif ic tion
re u ss Suchauthoritymaybev es e inan in iv id al ora groupofin iv id als,specif ie bynameor
byrole.T heorganiz tionshould e surethatth T T Pisaw areofth seresp nsibi ties,an onlya cept
v erific tion re u s s rom authorize in iv id als
KEY ISSUE
> In iv id al resp nsibi tiesf orth elect onicid ntitymanag me tsysems hould bespecif ie
> Resp nsibi tiesfor h isu ofv erif ic tion re u s sshould bespecif ie
2.2.2.5Assignme tofright
T hep lcysateme tshouldinclu ea sateme t,forea hdocume t ypebein sore ,ofhowth
asig me tofrig t toa docume tisv ese in specif icperonsorisgrante tosuch
KEY ISSUE
> In iv id al resp nsibi tiesf orth asig me tofdocume trig t should bespecif ie
2.2.2.6Procedures
T hep lcysateme tshouldprov id g id ln son th re uireme tf orap ro riateproce urestobe
f olowe w he electonicid ntitymanag me tisbein u d rak n.Detaisof h seproce uresc n be
f ou d in Chapter5 T heseproce uresmayn e toln toth organiz tion’sinf ormationsecurityp lcy
asd taie in 2.2.3
KEY ISSUE
> T hep lcydocume tshouldgiv eg id ln son th proce uresn ces arytouseth
organiz tion’select onicid ntitymanag me tsysems
Trang 282.2.3 Inf ormation securit y manageme t
2.2.3.1 Manageme to erview
T heorganiz tion should beawareof h v alu ofit elect onicid ntitymanag me tsys ems, an
ex ecuteit resp nsibi tiestothosesysemsu d rth d tyofc reprinciple
W his th organiz tionmayuti zeon orsev eraltuse third-par yserv iceprov id r ,th
organiz tion c n otout ourceit d tyofc reresp nsibi ties
Tof ulfi it d tyofc reo lgations,th organiz tion should:
• beaw areofan d monsrablycomplyw ithle islation an re ulatoryb diesper in nttoit
in usry;
• beaw areofan d monsrablycomplyw ithle islation an re ulatoryb diesper in nttoit
cou t y( oroth rrelev antg ographic larea)oforigin,routin an /orreceiptofelect onicid ntity
docume tatributes;
• esablsh a chain ofa cou tabi tyan as ig resp nsibi tyf oral relev anta tiv ities;an
• k epabreas ofd v elo me t byk epin in conta tw ithth ap ro riateb diesan
organiz tions
2.2.3.2S curitymanageme tg idance
P blc tionsareav aiablethatprov id adv icein d v isin compre e siv eset ofinf ormationsecurity
g id ln s ome tth organiz tion’sn e s.T hesemaybeinclu e in th organiz tion’srev iew
proces.Forsome ap lc tions,th ado tion ofex ternalya cre ite securitysch mesasad itional
confirmation ofcomplancetoth irsecurityp lcymaybeap ro riate
T herearea n mberofnationalan international san ardsthat, fimpleme te , should sup or th
organiz tion’sd mons rationofd tyofc re Stan ardsthatcov erinf ormation securityan serv ice
q altyis u sarepar icularlyap ro riate
COMMENT
T heinternationalya cepte information securitymanag me tsan ardsare:
BSISO/IEC2 0 1:2 13,In ormation tech olo y—S curitytech iq es—In ormations ecurity
ma ageme tsys tems—Req ireme ts ;
BSISO/IEC2 0 2:2 13,In ormation tech olo y—S curitytech iq es—Codeofpracicefor
in ormations ecuritycontols
Informationisth lf eblo d ofal organiz tionsan c nex is in man f orms tc n besore
elect onic lyan t ansmite bymai orbyelect onicmeans n th competitiv ebusin s
e v ironme t,such information isconsantlyu d rthreatf rom man sources.T hesec n be
internal ex ternal a cid ntalormalcious
T heseinf ormation securitys an ardsad res th seisu san hav eth sbe n impleme te in
man majororganiz tions.T he arerefere ce in man pla esan arebecomin th
commonbe chmarkagains w hichinf ormation securityismeasure
W ithin th UK,th reisa formalcer ific tion sch meagains th re uireme t of
BSISO/IEC2 0 1.An mberofUKan ov er easorganiz tionshav ese nth be ef itof
complance, par icularlywh reth yofferITserv icestooth rorganiz tions.Oth r
organiz tionshav euse th twodocume t toas es th irinf ormation securitymanag me t
sys ems,aspar ofth irriskasesme tproceses
Trang 29Itisimp r antthatan d cisionsmad concernin cer if ic tion orcomplancewith th
san ardsarerecord dbyth organiz tion
KEY ISSUE
> W herean ap ro riatenationalorinternational san ardisimpleme te ,electonicid ntity
manag me tsys emsshouldbe inclu e w ithin th sco eofcomplancew ithth san ard
2.2.3.3 Sco e
Tof ulfi th d tyofc reo jectiv e,th organiz tion n e stoa tion th f olowin
Information security
p lcy
Impleme tan informatio securityp l cy 2.2.3.4
Riskas es me t Car yo ta risk as es me t an impleme t ap ro riate
recomme datio s
Dev elo , mpleme t an tes a b sin s co tin ity plan 5.13
Co t act Ensurean ap ro riatecont act is in placew ith third
par ies
2.2.5
T ble2–A ctionsreq ired t of ulf ilt hecareofd t yo jectiv e
2.2.3.4 Information securityp lcy
A llelect onicid ntitymanag me tsys emsarev uln rabletocompromiseorchan e,w heth r
a cid ntalormalcious Toprotectth sesys ems, ap ro riatesecuritymeasuresn e tobe
impleme te tore uceth riskofsucha compromiseorchan ean th sa suc esfulchale g to
th ireff ectiv en s
Securitymeasuresn e tobeimpleme te w hich e surethatth ap lc tion ofelect onicid ntityis
cont ole , relablean au itable
Simiarly,securitymeasuresn e tobeimpleme te toprotectth inf ormation thatisbein secure
usin k ysan /orcerif ic tes Suchsecuritymeasuresareimp r ant,b th f orth organiz tion an f or
a T T P
Inf ormation security,w heth rinth area ofconf id ntialty, nte rityorav aiabi ty( CIA ), snotsimplya
cons raint obepla e up n computersysems.Securityan a ces toth ph sic l e v ironme t, for
ex amplebuidin san n tw orks,an th impleme tationofp lciesan proce uresbyal saffare
k yeleme t
Trang 30T heorganiz tion should ado tan information securityp lcyin relation toelectonicid ntity
manag me tsysems.W herean information securityp lcyex is sf oroth rproceses( f orex ample,
sorag ),th useofelectonicid ntityan auth ntic tion tech iq esshould beincorp rate w ithin it
sco e
T heorganiz tion should conf irmthatan T T Psthatituseshav eado te th irow n information
securityp lcies
W heredocume tv erific tion k ys,cer if ic tesan oth rinformation arearchiv ed bya T T P, th yshould
besore incomplancew ith thatT T P’sinf ormation securityp lcy
COMMENT
C mplancewith th recomme dationsofBS ISO/IEC2 0 2isw id lyrecomme d d;
cerif ic tionagains BSISO/IEC2 0 1 isa wayofd mons ratin tooth rorganiz tionsthat
th ab v ere uireme t arebein met
Such in epe d nta cre itation iscommonlyre ard dbyT T Psasa meansofprov in th ir
cre e tialstoth ircusomer.T heref ore,th tS h mepublc tion,Guida ceforAssess me ts ,
ref ere cescomplancew ith inf ormation securitymanag me tan formala cre itation
agains BSISO/IEC17 9 ( nowBS ISO/IEC2 0 1) T hiscer if ic tion isnotman ate ; tisa
busin s d cision ofth T T P
T hetS h meGuida ceforAss essme ts( tSi0 5 )c n befou d in th tS h meLibrary:
htp:/ww w.t ch me.org/lbrary/in ex html# uid ln s
T heinf ormationsecurityp lcyshould contain (f orth electonicid ntityan auth ntic tion
tech iq es),asaminimum:
• a sco e;
• manag me to jectiv es e ardin th useofelectonicid ntityan auth ntic tion tech iq es;
• manag me to jectiv es e ardin inf ormation securityf orth useofk ysan cerif ic tes;
• specif icp lcysateme t ;
• th aloc tionofinf ormation securityresp nsibi ties;
• a d f inition ofelectonicid ntityan auth ntic tion tech iq esan resp nsibi ties;
• a d f inition ofresp nsibi ties ork ysan cerif ic tes;
• tainin in,an aware es o th useofelectonicid ntityan auth ntic tion tech iq es;
• k yan cerif ic tet ainin an aw are es ;
• a p lcyf ord aln w ithp te tialora tualcompromisesofelectonicid ntityan auth ntic tion
tech iq es;
• a p lcyf ord aln w ithp te tialora tualcompromisesofk ysan cer if ic tes;
• a p lcyre ardin complancew ith ap ro riates an ards;an
• an ap rov al an rev iewproces
Diff ere t ypesofinf ormation mayre uirediff ere telectonicid ntityan auth ntic tion tech iq es
T heseshouldbeid ntif ie in th p lcys ateme t(se 2.2.3.4)
W heresecurityre uireme t v aryf ordiff ere tdocume ttypes,th inf ormation securityp lcyshould
id ntifyap ro riaten e s.T hesemeasuresn e tobeconsid re inth lg tofuti zin a T T P
T heorganiz tion should e surethatit ow n inf ormation securityre uireme t aremetbyth chose
T T P T heT T Pmaynotw ish topublcizea tualsecurityproce ures,butn e stobeabletod mons rate
toth organiz tionthatitiscomplantwith thispar ofth C d
Diff ere t ypesofk ysan cer if ic tesmayn e diff ere tsecuritymeasures.T hesen e tobe
Trang 31KEY ISSUE
> Dev elo , authorizean impleme tan inf ormation securityp lcy
> E surethatth p lcy’ssco einclu esth elect onicid ntitymanag me tsysems
2.2.3.5Riskassessme t
Inf ormation securitymeasuresareof e ap le piecemeal rea tin tosecurityincid nt ortoav aiable
computersof twareto ls.T histypeofap roa h c n f ai torecog izeth v alu ofth information as et
an th risks oth organiz tion f omsecuritycompromise ofelect onicid ntityan auth ntic tion
tech iq es.T hismayleav egapsin security,w hich mayonlybef ile atsomelaterdate,af tera security
brea h
Amoresructure ap roa h istorev iewth inf ormation aset an asig riskf actor ( base on as et
v alu ,sysemv uln rabi tyan lk lho dofata k).T heinf ormation securityp lcyc nth n be
prod ce an ap rov ed agains th v alu mod l
Ex isin securitymeasures hould th nberev iew ed foreff ectiv en s F ctor such asth balance
betw ee th cos ofimpleme tation an th securitya hiev ed should betak nintoconsid ration
d rin th rev iewproces
W herediff ere ttypesofelectonicid ntityan auth ntic tion tech iq esc n beuse ,th irin iv id al
impa ton th riskanalysisresult shouldberev iew ed
Recomme dationsid ntif ie byth riskanalysisshouldbeimpleme te
T heorganiz tion shouldalsou d rak a riskasesme tofth serv icesprov id dbyT T Ps
BS ISO310 0:2 0 ,Riskma ageme t—Principlesa dg ideln sprov id sprinciplesan g n ric
g id ln son riskmanag me t tc n beuse byan publc,priv ateorcommu itye terprise,
asociation,grouporin iv id al Itc n beap le throu hout h lfeofan organiz tion,an toa
w id ran eofa tiv ities, nclu in s rate iesan d cisions,o erations, proceses,f unctions,project,
prod ct ,serv icesan as et tc n beap le toan typeofrisk, w hatev erit nature,wh th rhav in
p sitiv eorn gativ econse u nces
KEY ISSUE
> Useriskasesme t ech iq estoe surethatex is in informationsecuritymeasuresare
ap ro riate,ortoid ntif yan measuresthatn e tobetak n toimprov esecurity
2.2.3.6Information securityinfrastructure
Inord r ocontolan manag information securityisu sw ith k ysan cerific tesf orelectonic
id ntityan auth ntic tion, an inf rasructuren e stobeimpleme te , nclu in relev antsysems
w ithin it sco e
Amanag me tinf ras ructure,orf ramew ork, asd f in d inBIP0 0 -1 shouldinclu ew ithinit sco e
electonicid ntityan auth ntic tion tech iq es
KEY ISSUE
> Planan impleme tan inf ormation securityf ramew ork
Trang 322.2.4 Choosing a T T P
A norganiz tionusin ,an h nced pe din up n,a T T Pf or h in epe d ntv erif ic tion ofdigital
sig aturesan /orco yrig tprotection sysemsn e s ou d rtan an a ceptth f ul d taisofit
serv ices
T heorganiz tion should rev iewth proce uresan procesesimpleme te bya p te tialT T P,usin
th recomme dationsofal thre parsofth C d asa be chmarkf or uitabi ty.How ev er,
complancew ith th serecomme dationsmaynotn e tobea n cesarycomp n ntofa conta t
betw ee th organiz tion an a T T P( se 2.2.5)
Trus e thirdparies hould beabletod monsratethatth ya tin an ap ro riateman erbearin in
min th loc tion (e.g.cou ty)an le al sysemin w hichth yan /or h ircle t (an /orth
chale g r)o erate
Durin th initialdiscusionsprior oconta tagre me t,th T T Pshoulddisclosean d tyor
o lgation itisu d rtomak information relatin toit serv icesav aiabletoan oth rpar y, nclu in
gov ernme tan re ulatoryag ncies
T heT T Pshould beabletod mons ratethatproce uresf ordiffere torganiz tionsareap le as
ap ro riate, an thatan information, k ysan cerif ic tesitholdsarese re ate f romthoseofoth r
organiz tionsforw hich itprov id s erv ices
AT T Pw il normalyhav eamon s it san ard docume tation settw ok yf ormaldocume t :a
cerif ic tep lcyan aCPS.Both form par ofit o lgationstoth cusomer,th user T heusershould
notas umethateith r h offerd taie inth cer if ic tep lcyorth CPS oroth r tan ard
docume t me t it re uireme t orthat h CAw il perf ormtoth lev elssate in th morit
conta t T heusershouldconf irm thatit n e sarereflecte an thatsuitableperf ormancecriteria
areprese t, especialyinbusin s-to-busin s situations
T heCPS,an al oth rdocume t concernin th agre me twith th T T P,should beteate as
busin s critic ldocume t ofth organiz tionan beretain d in a cordancew ith BIP0 0 -1
KEYIS UE
> Trus e third paries hould bechose w ith c re,toe surethat h irserv icesareap ro riate
toth re uireme t ofth organiz tion
2.2.5 Contr acts
W herea T T Pisuse aspar ofth proces f orelect onicid ntitymanag me t, an ap ro riately
w ord d cont a tshould beagre d betw ee th organiz tion an th T T P T hiscont a tshould inclu e
d taisofth serv ices hataretobeuse
T heconta t hould beretain d securelybyth organiz tionin complancewithBIP0 0 -1 W his itis
an adv antag forth conta ttoinclu eth re uireme tf orcomplancebyth T T Pw ith al relev ant
recomme dationsofth C d , tisnotes e tial W here th cont a tdoesnotspecif ycomplancew ith
th C d ,serv iceinspection proce uresshould beimpleme te ,toe surethat h complete es,
q altyan a cura yof h serv icesprov id d areas ure
T heorganiz tion n e stoinclu einit agre me twith th T T Pit rig t toal relev antinf ormation
h ld an proce uresuse inth ev entof h T T Pceasin totad , orth cont a tcomin toane d
T hisistoe ableth organiz tion tocontin etod monsratecomplanceov erth lf etimeofth
inf ormation,ev en wh rea chan eofT T Phasoc ure
Trang 33W hereth T T Pisabletod monsratecomplancew ith th C d , th organiz tionshould hold a co y
orhav esuitablycontole a ces ,wh n re uire ,toth T T P’scomplancedocume tation.T heT T P
shouldalsobeabletod mons ratetoth organiz tion thatitdoes, n f act, o eratein complancew ith
th C d
W his itisnormal f oran organiz tion tod al w ith a sin leT T Pf ora specif icdocume ttype, tshould
berecog ize thatth T T Pmayn e torelyup n a hierarch orn tworkofT T Pstov erif ya cerific te
( se 1.2) W his th organiz tion n e stobeaw areof his, t cont a tualagre me tw ith th T T P
shouldinsulateitf rom an n gativ eimpa t( e.g.compromiseofa k y), wh rep s ible,an id ntif y
w hereth rehasbe n such an impa t
COMMENT
Ifa T T Pcompromisesa Priv ateKe , th nanoth rT T Pmayhav ea claim agains th f ir tT T P
Inthisc se,th secon T T P’scle tn e s obeprotecte f rom this, n ln w ithth third
pary’sagre d conta tual iabi ty T hisimplc tion ofth useofa hierarch orn tw orkof
T T Psn e s obeclearlyu d rto dan a cepte byth organiz tion
KEY ISSUE
> W hereT T Psareuse , cont a t shouldbesig e ,an should inclu eap ro riateC d
complance sateme t ( se 6.7.2)
Trang 343.1 A ctions to addres r isk s and oppor t unities
3.1.1 Ge eral
Thiss ec ionofth CoderelatestoClause 6ofBS10 0 0 8, ‘Pla ning’
W he plan in f or h auth nticityan inte rityofinf ormation manag d byan id ntitymanag me t
sys em, th organiz tionn e stoconsid r h isu sref er e toin 1.2an th re uireme t ref ere
toin 1.3an d termin th risksan o p r u ities hatn e tobead rese to:
a) e sureth id ntitymanag me tsysemc na hiev eit inte d d outcome( s);
b) prev ent,or e uce,u d sire eff ect; an
c) a hiev econtin al mprov eme t
T heorganiz tion alson e stoplan:
a) a tionstoad res th serisksan o p ru ities;an
b) howto:
1) inte ratean impleme t h a tionsintoit id ntitymanag me tsysem proces es; an
2) ev aluateth eff ectiv en s of h sea tions
3.1.2 Riskas es me t
Id ntitymanag me tproce uresareofe d v elo e inan u s ructure w ay, byrea tin touser
re uireme t, securityincid nt an /ortoav aiablecomputersof tw areto ls.T hisap roa h on it ow n
c n easiyleav egapsin id ntitymanag me t,whichareonlyf ile at omelaterdate,typic lyafera
securitybrea h.Amores ructure ap roa h is orev iewth id ntitymanag me tsysemso erate by
th organiz tion an as ig riskfa tor (base onasetv alu ,p te tial threat ,sysemv uln rabi ty
an lk lho dofata k),on th basisofw hich ap ro riate, cos-eff ectiv einf ormation tans er
proce uresc n beid ntif ie A nese tialpar ofid ntitymanag me tisth impleme tation ofan
ap ro riatesecurityp lcy,w hich shouldbeprod ce an ap rov ed, base on th riskasesme t,an
agains which securitymeasuresc n bed v elo e an impleme te
NOT E:Arev iewof his ypeg n ralyre uires ecurityex perisea dara g ofap ro riatetech ical ski s
T heorganiz tion should u d r ak an inf ormation securityriskasesme talon th seln s,an
docume tth result o tain d.Ofparicularimp ranceareth securitymeasuresimpleme te toth
manag me tofid ntity T heriskanalysisn e stoinclu ev uln rabi tyriskf actor consis e tw ith th
typeofid ntitysysemuse
On th basisofth result ofth riskasesme t, ex isin securitymeasuresshouldberev iew ed f or
eff ectiv en s.F ctor such as h balancebetw ee th cos ofimpleme tation an th security
a hiev edn e tobetak n intoconsid ration d rin th rev iewproces W hereth rev iewin ic tes
thatchan estosecuritymeasuresareap ro riate, an a tionplanshould bedraw n upwith n wor
ame d d securitymeasuresprioritize forimpleme tation
KEYIS UE
> P rf orm a riskas es me tofex is in securitymeasures,an impleme tcos-effectiv e
tech olog an /orproce urestofi an gapsf ou d
Trang 35T heriskas es me tw il lead toth a q isition ofinf ormation an th creation ofriskrep r s.T hese
rep r s,ba k d upbyth informationuse tod v elo th conclusionsan recomme dationsinth
rep r s,mayprov id usef ulev id nceinrelation toth manag me tofid ntityd cisionsmad byth
busin s
Itisth simp rant oretaininf ormationrelate toriskasesme t in ln w ith an inf ormation
rete tion sch d le
KEY ISSUE
> Retain recordsofriskasesme tmethodsan result inln w ith th rete tion sch d le
3.1.3 Risk t reatme t
T heresult ofth riskasesme tshould beuse tog id an d termin th ap ro riatemanag me t
a tionan prioritiesf ormanagin inf ormation riskan impleme tin contolsselecte toprotect
agains thoserisks
BSISO/IEC2 0 5:2 1 , In ormation tech olo y—S curitytech iq es—In ormation securityrisk
ma ageme tprov id sinf ormation securityriskmanag me tg idance, nclu in adv iceon risk
ases me t,riskt eatme t,riska ceptance,riskcommu ic tion,riskmonitorin an riskrev iew
BSISO/IEC2 0 5d scribes h inputtoa riskt eatme tproces asa ls ofid ntif ie risks,prioritise
a cordin toth organiz tion’sriskev aluation criteria.Riskteatme tinclu esth id ntif ic tion an
impleme tation ofcontolstore uce,retain, av oid orshareth id ntif ie risks
Riskt eatme tc n beimpleme te byon ormoreof h folow in non-ex clusiv eproces es:
• riskmodif ic tion;
• riskrete tion;
• riskav oidance;
• risksharin
Riskmodif ic tion inv olv es h ad ition,remov al ormodif ic tion ofex is in contolssuch thatth
resid alrisksc n bere-ev aluate
Riskrete tion is h proces ofretainin an id ntif ie riskw ithoutf ur h ra tion.T hisisa ceptable
w hereth id ntif ie riskiswithin th agre d riskcriteria
Riskav oidanceinv olv esth remov alofprocesesrelate toth risk,such that h riskisnolon er
prese t.T hismaybeuse w hereth cos ofoth rf ormsof iskt eatme tareto coslytoimpleme t
Risksharin inv olv esth sharin ofth id ntif ie riskswith oth rpar ies, such asbyinsuranceorby
subcont a tin paricularproces es
3.2 Objectives and achiev ement s
T heorganiz tion n e s oesablshid ntitymanag me to jectiv esatrelev antf unctionsan lev els
T heid ntitymanag me to jectiv esn e to:
a) beconsise tw ithth id ntitymanag me tp lcy;
b) bemeasurable( ifpra tic ble);
c) tak intoa cou tap lc bleid ntitymanag me t e uireme t,an result f rom riskasesme t
an riskteatme t;
d) becommu ic te ;an
e) beupdate asap ro riate
Trang 36T heorganiz tion shal retaininf ormation onth id ntitymanag me to jectiv es.
W he plan in howtoa hiev eit id ntitymanag me to jectiv es,th organiz tion n e s o
Trang 374.1 Resources
Thiss ecion ofth CoderelatestoClause7ofBS10 0 0 8, ‘Su p r’
T heorganiz tion n e s od termin an prov id th resourcesn e e f orth esablshme t,
impleme tation,mainte ancean contin al mprov eme tof h id ntitymanag me t ys em
4.2 Compet ence
T heorganiz tion n e s o:
a) d termin th n ces arycompete ce of h peron( s)doin w orku d rit cont olthataff ect it
id ntitymanag me tperf ormance;
b) e surethatth seperonsarecompete ton th basisofap ro riatee uc tion,t ainin or
ex perie ce;
c) w hereap lc ble, tak a tionstoa q ireth n ces arycompete ce,an ev aluateth effectiv en s
ofth a tionstak n;an
d) retain ap ro riatedocume te inf ormation asev id nceofcompete ce
NOT E: A pplcableactionsma inclu e,forex ample:th prov isionof rainin to,th me torin ofor h
re sig me tofcure twork r ;or h hirin orcontactin ofcompete tperons
Work r doin worku d rth organiz tion’scontol shal beawareo
a) th id ntitymanag me tp lcy;
b) th ircontibutiontoth eff ectiv en s ofth id ntitymanag me tsysem, nclu in th be ef it
ofimprov edid ntitymanag me tperf ormance;an
c) th implc tionsofnotconf ormin w ithth id ntitymanag me t ys em re uireme t
4.4 Repor t ing and communicat ions
Itisimp r antw he d v elo in p lciesan proce urestoe surethat:
• inf ormation relate toth p lciesan proce uresismad av aiabletothosew hoare, ormaybe,
aff ecte byth m;
• th reisa mechanismforf ee ba kf rom th impleme ter ofth p lciesan proce ures;
• th reisa mechanismforrev iew in risksrelate toth p lciesan proce ures;
• d taisofan chale g stoth auth nticityan /orinte rityofinformationisf edba ktothose
resp nsiblef orcomplancew ithth C d ;an
• k yin iv id alsresp nsibleformanagin commu ic tionsareid ntif ie
KEY ISSUE
> E surethata rep r in an commu ic tionsmechanism isin pla e, toe surethatn wor
update p lciesan proce uresareimpleme te byal ap ro riates aff
Trang 384.5 Document at ion and records
4.5.1 Ge eral
Docume te information (alsok ow nasrecords)relate toth proces ofmanagin information
sore elect onic lyn e s obecreate an retain df oraslon asisn ces ary Section 4.5.2d tais
proce uraldocume tation thatn e stobecreate an retain d T hissectionalsoinclu esinf ormation
relate toth manag me tofthisinf ormation, nclu in th re uireme tforv er ioncontolan
ap ro riaterete tionperiods
4.5.2 Proce ural docume tation
4.5.2.1 Ge eral
C mplancewithth C d re uiresth av aiabi tyan useofspecif ie docume tation.T his
docume tation consissofth f olowin :
• elect onicid ntityp lcysateme t(se 2.2.2);
• inf ormation securityp lcydocume t( se 2.2.3);
• proce uresman al(se 4.5.2.3);
• sys em d scription man al ( se 4.5.2.4)
T heav aiabi tyofth sedocume t ,an d monsrablead ere cetoth proce uresd scribe th rein,
should, feff ectiv elyconsructe ,prov id th au it rai thatmaybeuse tod monsrateth
auth nticityofth electonicid ntitymanag me t ys ems, an th se hanceth ev id ntialw eig tof
inf ormation contain d th rein
Notethatea h ofth docume t me tion d in th ls maya tualybemaintain d asmultiple
docume t, orth sedocume t maybecombin d.T hek yrecomme dationisthatth docume tation
ex is s, smaintain dan isreadiya ces ibletothoseauthorize w ithin th organiz tiontoa ces it
an toan authorize thirdpar yw homayre uirea ces tmayalsobeap ro riatetocombin this
docume tation w iththatd v elo e f orcomplancew ithth oth rpar sofBIP0 0
A lldocume tation n e s obemaintain d inln w ith ex isin w orkin pra tices,an th sshould be
maintain d u d ra v erion contol sys em (se 5.1 )
A dditional docume tation maybere uire tosup or th daiyo erationof h sysem,f orex ample:
• a sys em mainte ancelog ( se 5.14);
• an au itt ai ( se 4.5.3);
• complances ateme t ( se 6.7.2)
T heconte tof hisdocume tation c neasiybecomeu relablew hereth rearenoproce uresin
pla etoe surethatitk epspa ew ith b th organiz tional an sysemchan es.Unrelable
docume tation mayadv er elyaff ectle alarg me t relatin toth corecto eration ofan electonic
id ntitymanag me tsysem tis,th ref ore, mp r anttoe surethatth d f initiv ev er ionsofsys em
docume t arebrou htu d rconfig ration manag me tcontol an aref irmlyln e toth
organiz tion’schan emanag me tproce ures
W herecomplance w ithth C d isclaime ov era period oftimed rin w hich diff ere te itionsof
th prev iouslylse docume tation w ereap ro riate,th n al e itionsofthisdocume tation should
bek pt, n conf ormancetoth p lcydocume t.T hisistoe surethat, wh reinf ormation re ardin
th sysemata p intin th pas isre uire , tc n beo tain d f romthisdocume t tore
Trang 394.5.2.2 Updatingandre iews
Itisimp r anttoe surethatth proce uresimpleme te atan timed rin th sorag lf eofan
specif icelectonicdocume twith an asociate electonicid ntityc nbed termin d.T hisisa hiev ed
bye surin that h proce uresman al sk ptuptodate, an thatal prev iousv erionsarek ptin
complancewith th p lcys ateme t( se 2.2.2)
KEY ISSUE
> A ll chan estoo erationalproce uresshouldbe manag d bya chan econt olproce ure,
inclu in updatin ofth proce uresman al
> Supere e v er ionsofth proce uresman alshould bek ptin complancew ithBIP0 0 -1
> T heproce uresman alshould bere ularlyrev iewe ,toe surethatitisuptodate
> A ll chan esshouldberev iewe toe surethatcomplancew ithth C d isnotcompromise
4.5.2.3 Ide titymanageme tprocedures
T heorganiz tion shouldmaintain a proce uresman al w hichshould docume t(or ef ere ce)
proce uresuse f oro eratin th electonicid ntitymanag me t ys ems,toe sureth irconf ormity
toth contolsd taie in th C d
T hep lcydocume tshould,f orea h docume ttype,d scribeth to lstobeuse f orth asociation
ofea h ofth f olowin atributes,asap lc ble:
• electonicid ntity;
• electonicsig ature;
• electonicco yrig t;
• conf id ntialty
T heseproce uresshould specif yatw hatp intin th inf ormation lf ecycleth seatributesaretobe
ap le an how
Asin ledocume tordata f ilemayhav emorethanon such at ributeap le ,an notn cesariy
contemp ran ously
Asin ledocume tordata f ilemayhav ediff ere tat ributesap le bydiff ere te tities
W herean organiz tion o eratesa q altymanag me t ys em,such asBSENISO9 0 :2 0 ,Qualty
ma ageme tsystems—Fundame talsa dvocab lary,th proce uresman al should beinclu e
w ithin th q altysys em
KEY ISSUE
> Aproce uresman alshould bemad av aiable,containin d taisof( or efere ceto)oth r
relev antdocume tation concernin al proce uresrelev anttoth electonicid ntity
manag me tsys ems
T heproce uresman alshould inclu eth folow in to ics:
Keys an cer ificates Is uance, ac e tance, manag me t, rev ocatio ,
ch ckin , s oragean rete tio , compromisean k y
recov ery is u s
5.3
Trang 40To ic A ction S c ion
Co yrig t is u s Informatio ow ner hip, protection an managin
chang ofow ner hip ofco yright d cume t
5.4
Is uin auth rity Manag me t ofth auth rityto is u an at rib te
elect onic informatio
5.5
A pplyin
informatio
at rib tes
Is uing proce ures for at rib te elect onicinformatio 5.6
T TPs Dealn w ith T T Ps, nclu ing proce ures,
commu icatio s, v erificatio s, co s raint , Trus e Time,
resp nses, ap eals and s orag is u s
5.15
Ver io co t ol Manag me t ofmultiple v er io s ofd cume t or data
fies
5.1
T ble3–To ic t obeinclu e in t heproce uresma u l
4.5.2.4Ke tech ologycomp n nt
Ad scription ofhardw are, sof twarean n tw orkeleme t thatcompriseanelect onicid ntity
manag me tsysemisre uire T hisshouldinclu ed taisofsys em conf ig ration.T he
docume tation should bes ructure sothatd taisof h sysematan timed rin th period ofit
usemaybereadiya cese T hismaybea hiev edbycreatin a n wv erion ofth man alev erytime
th reisa chan e,orbyinclu in a ‘chan econtol section inth man al W hatisimp rantis hat
th reisa cleard scription ofth sys emasitw asata par iculartimeinth pas
Forsys emsalread ino eration, an elect onicid ntityes ablsh d priortoth int od ctionof h
C d c n otbeconsid re asme tin it prov isionsu les th contolsan proce uresd scribe in
th C d hav ebe n inpla efomth timeofesablshin th id ntity
W hereth elect onicid ntityp lcysateme t( se 2.2.2)re uirescomplancew ith par icularnational
an /orinternationalsan ards,th sys em d scription man alshould inclu ea section d monsratin
complancew ith thosesan ards.T hise ables ys em au itor toch ckth perf ormancean relabi ty
of h sysemagains th sesan ards
KEYIS UE
> Asysem d scription man alshould bemad av aiable,containin d taisof( or ef ere ceto
oth r elev antdocume tationcontainin d taisof )al tech olog -relate isu srelev anttoan
elect onicid ntitymanag me tsysematan p intin time