Skip to content

Commit f8b33cc

Browse files
authored
CSC-26 final adjustments (#40)
* CSC-26 final adjustments * Fix links
1 parent 7e67cfd commit f8b33cc

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

docs/CSBR.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates
33

4-
subtitle: Version 3.8.0
4+
subtitle: Version 3.9.0
55

66
author:
77
- CA/Browser Forum
@@ -60,6 +60,7 @@ The following Certificate Policy Identifier is reserved for use by CAs as a requ
6060
| 3.6 | CSC-21 | Improved signing services requirements | 28 February 2024 |
6161
| 3.7 | CSC-22 | High risk changes | 28 February 2024 |
6262
| 3.8 | CSC-25 | Import EV Guidelines into the Code Signing Baseline Requirements | 1 August 2024 |
63+
| 3.9 | CSC-26 | Timestamping Private Key Protection | 1 August 2024 |
6364

6465
### 1.2.2 Relevant Dates
6566

@@ -78,6 +79,7 @@ The following Certificate Policy Identifier is reserved for use by CAs as a requ
7879
| 2024-04-15 | 4.9.1 | This ballot updates the "Circumstances for revocation" in order to align it with the TLS and S/MIME BRs and set stricter requirements for revocation due to Private Key Compromise and use in Suspect Code. |
7980
| 2024-06-15 | 8.4.2 | For Audit Periods starting after June 30, 2024, the Signing Service MUST undergo a conformity assessment audit for compliance with these Requirements performed in accordance with one of the schemes specified in Section 8.4.2. |
8081
| 2025-03-15 | 3.2.10 | Prior to the use of an Incorporating Agency or Registration Agency to fulfill these verification requirements, the CA MUST publicly disclose Agency Information about the Incorporating Agency or Registration Agency. |
82+
| 2025-04-15 | 6.2.7.2 | Effective April 15, 2025, a Timestamp Authority MUST protect Private Keys associated with its Root CA certificates and Subordinate CA certificates containing the "Time Stamping" EKU in offline Hardware Crypto Module. |
8183

8284
## 1.3 PKI participants
8385

@@ -1955,9 +1957,9 @@ The CA SHALL protect its Private Key in a system or device that has been validat
19551957

19561958
#### 6.2.7.2 Private key storage for Timestamp Authorities
19571959

1958-
Effective April 15, 2025, a Timestamp Authority MUST generate and protect Private Keys associated with its Root CA certificates and new Subordinate CA certificates with a validity period of greater than 72 months containing the `id-kp-timeStamping` KeyPurposeId in the `extKeyUsage` extension (per section 7.1.2.2 g), in a Hardware Crypto Module conforming to the requirements specified in [Section 6.2.7.1](#6271-private-key-storage-for-CA-keys), maintained in a High Security Zone and in an offline state or air-gapped from all other networks.
1960+
Effective April 15, 2025, a Timestamp Authority MUST generate and protect Private Keys associated with its Root CA certificates and new Subordinate CA certificates with a validity period of greater than 72 months containing the `id-kp-timeStamping` KeyPurposeId in the `extKeyUsage` extension (per section 7.1.2.2 g), in a Hardware Crypto Module conforming to the requirements specified in [Section 6.2.7.1](#6271-private-key-storage-for-ca-keys), maintained in a High Security Zone and in an offline state or air-gapped from all other networks.
19591961

1960-
Timestamp Certificates issued on or after April 15, 2025, issued by a Timestamp Authority Subordinate CA with a validity period greater than 72 months, MUST be signed by a Private Key generated and protected in a Hardware Crypto Module conforming to the requirements specified in [Section 6.2.7.1](#6271-private-key-storage-for-CA-keys), maintained in a High Security Zone and in an offline state or air-gapped from all other networks.
1962+
Timestamp Certificates issued on or after April 15, 2025, issued by a Timestamp Authority Subordinate CA with a validity period greater than 72 months, MUST be signed by a Private Key generated and protected in a Hardware Crypto Module conforming to the requirements specified in [Section 6.2.7.1](#6271-private-key-storage-for-ca-keys), maintained in a High Security Zone and in an offline state or air-gapped from all other networks.
19611963

19621964
#### 6.2.7.3 Private key storage for Signing Services
19631965

0 commit comments

Comments
 (0)