Rights Management Services Certification
Hierarchy
Certification Practice Statement
Version 1.1
Effective Date: March
31, 2005
Table of Contents
1.1.1 Certificate
Practice Statement
1.3 Community
and Applicability
1.3.1 Certification
Authorities
2.1.1 RMS Certification
Hierarchy Committee Obligations
2.1.2 Certification
Authority obligations
2.1.3 Registration
Authority obligations
2.1.5 Relying
Party obligations
2.2.1 Warranties
and limitations on warranties
2.3.1 Indemnification
by Relying Parties and Subscribers
2.3.3 Administrative
processes
2.4 Interpretation
and Enforcement
2.4.2 Severability,
survival, merger and notice
2.4.3 Dispute
resolution procedures
2.6 Publication
and Repository
2.6.1 Publication
of CA information
2.6.2 Frequency
of publication
2.7.1 Frequency
of entity compliance audit
2.7.2 Identity/qualifications
of auditor
2.7.3 Auditor's
relationship to audited party
2.7.5 Actions
taken as a result of deficiency
2.7.6 Communication
of results
2.8 Confidentiality
and Privacy
2.8.1 Types
of information to be kept confidential
2.8.2 Types
of information not considered confidential
2.8.3 Disclosure
of certificate revocation information.
2.8.4 Release
to law enforcement officials
2.8.5 Release
as part of civil discovery
2.8.6 Disclosure
upon owner's request
2.8.7 Other
information release circumstances
2.9 Intellectual
Property Rights
3 Identification
and Authentication
3.1.2 Need
for names to be meaningful
3.1.3 Rules
for interpreting various name forms
3.1.4 Name
claim dispute resolution procedure
3.1.5 Recognition,
authentication and role of trademarks.
3.1.6 Method
to prove possession of private key
3.1.7 Authentication
of organization (machine) identity
3.1.8 Authentication
of individual identity
3.7 Request
to Release Suspension
4.4 Certificate
Suspension and Revocation
4.4.1 Circumstances
for revocation
4.4.2 Who
can request revocation
4.4.3 Procedure
for revocation request or suspension request
4.4.4 Revocation
request grace period
4.4.5 Circumstances
for suspension
4.4.6 Who
can request suspension
4.4.7 Procedure
for suspension request
4.4.8 Limits
on suspension period
4.4.10 CRL
checking requirements
4.4.11 On-line
revocation/status checking availability
4.4.12 On-line
revocation checking requirements
4.4.13 Other
forms of revocation advertisements available
4.4.14 Checking
requirements for other forms of revocation advertisements
4.4.15 Special
requirements for key compromise
4.5 Security
Audit Procedures (Logical and Physical)
4.5.1 Types
of events recorded
4.5.2 Frequency
of processing log
4.5.3 Retention
period for audit log
4.5.5 Audit
log backup procedures
4.5.6 Audit
collection system (internal vs. external)
4.5.7 Notification
to event-causing subject
4.5.8 Vulnerability
assessments
4.6.2 Retention
period for archive
4.6.4 Archive
backup procedures
4.6.5 Requirements
for time-stamping of records
4.6.6 Archive
collection system (internal or external)
4.6.7 Procedures
to obtain and verify archive information
4.8 Disaster
Recovery and Business Resumption
5 Physical,
Procedural and Personnel Security Controls
5.1.1 Site
location and construction
5.1.3 Power
and air conditioning
5.1.5 Fire
prevention and protection
5.2.2 Number
of persons required per task
5.2.3 Identification
and authentication for each role
5.3.1 Background,
qualifications, experience, and clearance requirements
5.3.2 Background
check procedures
5.3.4 Retraining
frequency and requirements
5.3.5 Job
rotation frequency and sequence
5.3.6 Sanctions
for unauthorized actions
5.3.7 Contracting
personnel requirements
5.3.8 Documentation
supplied to personnel
6.1.2 Private
Key delivery to entity
6.1.3 Public
key delivery to certificate issuer
6.1.4 CA
public key delivery to users
6.1.6 Public
key parameters generation and quality checking
6.1.7 Hardware/software
key generation
6.2.1 Standards
for cryptographic module
6.2.2 Private
Key multi-person control
6.2.4 Private
Key backup and archival
6.2.5 Private
Key entry into cryptographic module
6.2.6 Method
of activating private key
6.2.7 Method
of deactivating private key
6.2.8 Method
of destroying private key
6.3 Other
Aspects of Key Pair Management
6.3.2 Usage
periods for the public and private keys
6.5 Computer
Security Controls
6.6 Life
Cycle Technical Controls
6.8 Cryptographic
Module Engineering Controls
7 Certificate
and CRL Profiles
8 Specification
Administration
8.1 Specification
change procedures
8.2 Publication
and notification policies
8.3 Microsoft
Certificate Policies
The Rights Management Public Key
Infrastructure (RMS Certification Hierarchy), operated by Microsoft
Corporation, is used to provide certificates and licenses to the general public
engaged in the use of Rights Management in Microsoft products.
This Certification Practice Statement (CPS) follows the topics and outline specified by the Internet Engineering Task Force (IETF) in RFC 2527 entitled "Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework." This document assumes the reader is familiar with the general concepts applicable to a certificate practice statement, certificates, and public key infrastructures. All topics in RFC 2527 are identified to facilitate comparison and policy mapping. However, certain components are identified as "no stipulation" to indicate to the reader that a conscious decision was made to exclude that particular topic and protect against inadvertent omission of a topic.
The CPS describes the minimum mandatory practices of the RMS Certification Hierarchy and applies to all Certification Authorities (CAs) within the Rights Management System certificate hierarchy. This document defines the standards by which internal and external entities should assess Microsoft's RMS certificate hierarchy implementation. This CPS is applicable to all entities with relationships with the RMS Certification Hierarchy, including Certification Authorities (CAs), Subscribers, and Relying Parties.
A CA issues a signed certificate to bind a public key to a particular entity, machine or person. According to X.509, a CP is "a named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with a common security requirement." A CP may be used by a certificate user or Relying Party to help in deciding whether a certificate and the binding therein is sufficiently trustworthy for a particular application or purpose.
This document is formally referred to as the Rights Management Services Certification Hierarchy Practice Statement (RMS-CPS). Rights Management System Subordinate CAs (Sub-CAs) issue certificates in accordance with Microsoft Certificate Policies (CPs). Microsoft has designed its practices such that Microsoft CPs will be supported by the RMS-CPS.
The RMS Certification Hierarchy has been established to provide certificate services to the general public. Certificate Policies (CPs) define in greater detail the specific communities for which a specific class or type of certificate is applicable, and the intended purposes and uses of such certificates. The minimum practices in this CPS shall not be violated or diminished by any associated Certificate Policy (CP).
Certification Authorities (CAs) are entities authorized to perform the following general functions:
Within the RMS Certification Hierarchy, there are three general types of CAs: a Root CA, Intermediate (Policy) CAs, and Issuing CAs.
CA
Name |
Description
of Function |
Microsoft RMS Production Root |
|
Microsoft RMS ISV Root |
|
CA
Name |
Description
of Function |
Microsoft RMS Production CA |
Subordinate CA which sits at the top of the Production RMS Certification Hierarchy. |
Microsoft RMS Production Application Signing Server CA |
Subordinate CA which issues only to the RMS Production Application Signing CA. |
Microsoft RMS Production Account Certification CA |
Subordinate CA which issues only to the RMS Production Account Certification Service. |
Microsoft RMS Production Machine Activation CA |
Subordinate CA which issues to the RMS Production Machine Activation Service and the Desktop Security Processor CA |
Microsoft RMS Production Machine Activation 2 CA |
Subordinate
CA which issues only to the RMS Production - Mobile Security Processor Ca and
the Server Security Processor CA |
Microsoft RMS Production Server Enrollment CA |
Subordinate CA which issues only to the RMS Production Server Enrollment Service. |
Microsoft RMS ISV CA |
Subordinate CA which sits at the top of the Pre-Production RMS Certification Hierarchy. |
Microsoft RMS ISV Application Signing Server CA |
Subordinate CA which issues only to the RMS ISV Application Signing CA. |
Microsoft RMS ISV Account Certification CA |
Subordinate CA which issues only to the RMS ISV Account Certification Service. |
Microsoft RMS ISV Machine Activation CA |
Subordinate CA which issue to the RMS ISV Machine Activation Service and the Desktop Security Processor CA |
Microsoft RMS ISV Machine Activation 2 CA |
Subordinate CA which issues only to the RMS ISV - Mobile Security Processor Ca and the Server Security Processor CA |
Microsoft RMS ISV Server Enrollment CA |
Subordinate CA which issues only to the RMS ISV Server Enrollment Service. |
The function of each Issuing Sub-CA within the Intranet sub-hierarchy is described in the table below.
CA
Name |
Description
of Function |
Microsoft RMS Production Application Signing CA |
Issues certificates to individuals with a valid Authenticode signing certificate and have signed the Production Agreement with Microsoft for:
|
Microsoft RMS ISV Application Signing CA |
Issues certificates to individuals with a valid Authenticode signing certificate and have signed the Development Agreement with Microsoft for:
|
Microsoft RMS Production / ISV Account Certification Service |
Issue certificates to individuals for: ˇ Passport user identity associated with a valid Passport ID |
Microsoft RMS Production / ISV Machine Certificate Service |
Issue certificates to individuals for: ˇ RMS client application security |
Microsoft RMS Production / ISV Server Enrollment Service |
Issues certificates to individuals for: ˇ RMS Server licenses |
Microsoft RMS Production / ISV Desktop Security Processor Machine Activation CA |
Issues certificates for a class of lockbox be used for Machine Certification |
Microsoft RMS Production / ISV Mobile Security Processor Machine Activation CA |
Issues certificates for a class of lockbox be used for Machine Certification |
Microsoft RMS Production / ISV Server Security Processor Machine Activation CA |
Issues certificates for a class of lockbox be used for Machine Certification |
Issuing CAs perform most typical certificate registration functions, e.g. evaluate and either approve or reject Subscriber certificate management transactions (including certificate requests, renewal and rekey requests, and revocation requests). Depending on the applicable CP, the RA may collect and verify a Subscriber's information (such as a Subscriber's identity, position, or role) that is to be entered into the Subscriber's certificate. The RA may be designated for specific operations, applications, or domains. The RMS Certification Hierarchy supports both automated and manual registration functions.
Where an automated registration function is implemented, business rules are defined and used to automatically approve or reject Subscriber certificate management transactions (e.g., certificate requests) in accordance with the applicable Microsoft CP.
Where non-automated registration functionality is required, Microsoft manually approves or rejects Subscriber certificate management transactions in accordance with the applicable Microsoft CP.
For RMS Certification Hierarchy Root and Intermediate CAs, the Subscribers are Subordinate CAs which are under the control of the RMS Certification Hierarchy. Accordingly, the registration function for these CAs is performed manually by authorized RMS Certification Hierarchy personnel.
An automated registration function is currently used for the following Issuing CAs within the Microsoft RMS PCA sub-hierarchy:
ˇ Microsoft RMS Production Account Certification Service
ˇ Microsoft RMS Production Machine Certificate Service
ˇ Microsoft RMS Production Server Enrollment Service
ˇ Microsoft RMS ISV Account Certification Service
ˇ Microsoft RMS ISV Machine Certificate Service
ˇ Microsoft RMS ISV Server Enrollment Service
ˇ
The registration function for each Issuing CA within Microsoft RMS PCA sub-hierarchy is performed as described in the table below.
CA
Name |
Description
of Registration Function |
Microsoft RMS Production Application Signing CA |
A manual CA function based on presentation of a valid high-assurance certificate from a CA that performs appropriate Subscriber identification and authentication (I&A), e.g. Verisign Class 3 Code Signing or equivalent I&A classification from another CA. Issues certificates to ISVs to sign applications into the Production RMS Certification Hierarchy hierarchy. |
Microsoft RMS Production Account Certification Service |
An automated Registration function based on authentication of the users Passport ID. Issues Rights Management Account Certificates (RAC) which are used for identity purposes. |
Microsoft RMS Production Machine Certificate Service |
An automated service that generates both a unique software lockbox as well as a certificate based on presentation of the hash of a machines hardware information. |
Microsoft RMS Production Server Enrollment Service |
A registration function based on presentation of a valid high-assurance certificate from a CA that performs appropriate Subscriber identification and authentication (I&A), e.g. VeriSign Class 3 or equivalent I&A classification from another CA. Issues RMS Server Licensor Certificates to customers to operate Windows Right Management Services. |
Microsoft RMS Production Desktop Security Processor Machine Activation CA |
Registration function that issues machine certificates for a class of lockbox. |
Microsoft
RMS Production |
Registration function that issues machine certificates for a class of lockbox. |
Microsoft RMS Production Server Security Processor Machine Activation CA |
Registration function that issues machine certificates for a class of lockbox. |
Microsoft RMS ISV Account Certification Service |
An automated registration function based on authentication of the users Passport ID. Issues Rights Management Account Certificates (RAC) which are used for identity purposes and Client Licensor Certificates (CLC) which are used to create RMS protected content during application development. |
Microsoft RMS ISV Machine Certificate Service |
An automated service that generates both a unique software lockbox as well as a certificate based on presentation of the hash of a machines hardware information. |
Microsoft RMS ISV Server Enrollment Service |
A registration function based on presentation of a valid high-assurance certificate from a CA that performs appropriate Subscriber identification and authentication (I&A), e.g. VeriSign Class 3 or equivalent I&A classification from another CA. Issues RMS Server Licensor Certificates to customers to operate Windows Right Management Services for application development. |
Microsoft RMS ISV Desktop Security Processor Machine Activation CA |
Registration function that issues machine certificates for a class of lockbox. |
Microsoft RMS ISV Mobile Security Processor Machine Activation CA |
Registration function that issues machine certificates for a class of lockbox. |
Microsoft RMS ISV Server Security Processor Machine Activation CA |
Registration function that issues machine certificates for a class of lockbox. |
End Entities include Subscribers and Relying Parties. A Subscriber is the entity whose name or identifier appears as the subject in a certificate, and who asserts that it uses its key and certificate in accordance with this CPS (and related CPs). Subscribers typically include members of the general public who are licensees of Microsoft products incorporating Rights Management.
A Relying Party is the entity who relies on the validity and binding of the Subscriber with the public key associated with the certificate. Relying Parties include any entity that may rely upon a Subscriber certificate for purposes of verifying a Subscribers digital signature, for applying rights management to content.
This CPS is applicable to all certificates issued by Microsoft RMS CAs within the RMS Certification Hierarchy. Microsoft RMS Certificate Policies (CPs) define the specific communities for which a specific class or type of certificate is applicable, specific RMS Certification Hierarchy practices and requirements for the issuance and management of such certificates, and the intended purposes and uses of such certificates.
This
CPS is administered by Microsoft Corporation.
Contact information is listed below:
Microsoft Corporation
Law & Corporate Affairs
Regulatory Affairs and Public Policy Group
Phone: 425-882-8080
Fax: 425-936-7329
Microsoft Certificate Policies are reviewed by the Microsoft RMS Certification Hierarchy Committee, which serves as the Policy Authority for the RMS Certification Hierarchy and ensures that the practices specified in the Microsoft RMS CPS do not conflict with CP requirements.
The RMS Certification Hierarchy Committee consists of representatives from the Microsoft Law & Corporate Affairs Department and Security Business Technology Unit.
Obligations of the RMS Certification Hierarchy Committee in its role as Policy Authority (PA) include:
Obligations of the CAs within the Microsoft RMS Certification Hierarchy include:
Obligations of the Registration Authorities (RAs) within the Microsoft RMS Certification Hierarchy include:
ˇ Verifying that identifying data provided by the Subscriber is valid. Identifying data may, but does not necessarily, include information about the identity of a Subscriber depending on the applicable CP.
ˇ Verifying that the identifying data pertains to the Subscriber
ˇ Verifying that the Subscriber is entitled to obtain a public-key certificate under the relevant Certificate Policy
ˇ Verifying that the Subscriber possesses the asymmetric private key corresponding to the public-key submitted for certification
ˇ Managing the submission of certificate request transactions binding the Subscribers identification data to the Subscribers public key.
Obligations of Subscribers within the Microsoft RMS Certification Hierarchy include:
Obligations of Relying Parties within the Microsoft RMS Certification Hierarchy include:
The foregoing obligations are not an exhaustive or finite list of steps that a Relying Party should undertake to determine whether to rely upon a certificate. Each Relying Party is responsible for determining, in accordance with its policies and procedures, when and to what extent it should rely on a certificate in view of the particular set of facts and circumstances. The RMS Certification Hierarchy and any CA provide the certificate and related procedures under this CPS to assist a Relying Party in evaluating a trust relationship. Without limiting the foregoing, the RMS Certification Hierarchy and any CA shall have no liability arising out of or relating to a certificate if a Relying Party fails to adhere to its obligations under this CPS or CP.
The RMS Certification Hierarchy and CAs shall provide repository services. In providing repository services, obligations of the RMS Certification Hierarchy include:
This Section 2.2 states the sole and exclusive liability of the Microsoft RMS Certification Hierarchy, any CA or RA, and any affiliate or subsidiary and any of their respective directors, employees, agents or subcontractors arising under or related to this CPS and any certificate issued by the Microsoft RMS Certification Hierarchy and any CA, including but not limited to, any claims, expenses, losses or damages in connection with a certificate whether arising out of contract, tort (including negligence), or other theories of law or any act or omission of the Microsoft RMS Certification Hierarchy or its issuing CAs. Each Subscriber and Relying Party expressly acknowledges that the allocation of risk and the limitations of liability in this CPS constitute an essential part of this CPS and any agreement with a Subscriber or Relying Party. The limitations in this Section 2.2 shall apply notwithstanding the failure of essential purpose of any remedy state regardless of whether a party has been advised of the possibility of damages.
The limitations in this Section 2.2 may be modified pursuant to a CP adopted and approved by the Microsoft RMS Certification Hierarchy. In the event of any conflict or inconsistency between this CPS and a CP with respect to the obligations set forth in this Section 2.2, the terms of the CP shall control.
Except as expressly otherwise provided in this CPS, a CP or applicable agreement with a Subscriber or Relying Party, the RMS Certification Hierarchy warrants that it will use commercially reasonable efforts to provide certification authority services substantially in compliance with this CPS and the relevant Microsoft CPs. The RMS Certification Hierarchy makes no other warranties or promises and has no further obligations to Subscribers or Relying Parties.
In no event shall the RMS Certification Hierarchy and any affiliate or subsidiary and any of their respective directors, employees, agents or subcontractors be liable for any indirect, consequential, incidental, special or punitive damages, or for any loss of profits, loss of data, or other indirect or consequential damages (whether arising in contract, tort (including negligence) or other legal theory) arising from or in connection with the use, delivery, license, availability or non-availability, performance or nonperformance of certificates, digital signatures, the repository, or any other transactions or services offered or contemplated by this CPS, even if the RMS Certification Hierarchy or an issuing CA has been advised of the possibility of such damages.
The RMS Certification Hierarchy is not liable or loss associated with any of the following even if it has been advised of the possibility thereof:
No stipulation.
Except as otherwise provided in a customer agreement, each Subscriber and Relying Party indemnify and hold harmless the RMS Certification Hierarchy and any affiliate or subsidiary and any of their respective directors, employees, agents or subcontractors from and against any claims, actions, suits, damages, losses, liabilities and expenses (including reasonable attorneys' fees) arising out of or related to (a) its unauthorized or illegal use of a certificate, digital signature, public or private key issued by the RMS Certification Hierarchy or CA, and (b) any false, inaccurate, misleading, or fraudulent information provided by it to the RMS Certification Hierarchy or CA.
.
The RMS Certification Hierarchy, CA and RA are not the agent, fiduciary, trustee, or other representative of Subscribers or any relying parties.
No stipulation.
This
CPS is governed by the laws in force in the State of
In the event of any dispute involving the services or provisions covered by this CPS, the aggrieved party shall notify a member of RMS Certification Hierarchy management regarding the dispute. RMS Certification Hierarchy management will involve the appropriate Microsoft personnel to resolve the dispute.
No stipulation.
The RMS-CPS and Microsoft Certificate Policies are published on the Microsoft Corporation Internet website at http://www.microsoft.com/pki/rms/cps/, in accordance with RMS-CPS §8.3 and the provisions of the relevant CP. Applicable CPs will be provided to Subscribers and Relying Parties as appropriate in view of the certificates being issued or used.
The MSC-CPS and Microsoft Certificate Policies are published in accordance with RMS-CPS §2.6.1. CRLs are published in accordance with RMS-CPS §4.4.9.
Read access to the Microsoft Corporation Internet website repository for published CA information is available to all parties worldwide. Appropriate logical access controls are used to restrict access to authorized RMS Certification Hierarchy personnel the ability to write to or modify repository content.
The RMS Certification Hierarchy repository consists of Microsoft Corporation Internet website and the RMS Certification Hierarchy directory.
For Certification Authority activities deemed
business critical by Microsoft management, an annual compliance review may be
performed by an internal or external auditor to assess the effectiveness of the
controls over the RMS Certification Hierarchy.
The internal or external personnel who perform the annual audit should demonstrate proficiency in public key infrastructure technology, information security tools and techniques, security auditing, and the internal audit or third-party attestation function.
The entity that performs the annual audit should be
organizationally independent of the RMS Certification Hierarchy Committee.
The scope of the annual audit should include the
requirements of this CPS and Microsoft Certificate Policies as they relate to
CA environmental controls, key management, and certificate life cycle
management.
Significant deficiencies identified during the compliance audit will result in a determination of actions to be taken. This determination is made by the RMS Certification Hierarchy Committee with input from the auditor. RMS Certification Hierarchy Management is responsible for ensuring that corrective action plans are promptly developed and corrective action is taken within a period of time commensurate with the significance of such matters identified.
Should a severe deficiency be identified that might compromise the integrity of the RMS Certification Hierarchy, RMS Certification Hierarchy Management will consider, with input from the auditor, whether suspension of the RMS Certification Hierarchys operation is warranted. Should a severe deficiency be identified that might compromise the integrity of a particular CA, RMS Certification Hierarchy Management will assess whether suspension of the particular CAs operation is warranted.
Compliance audit results are communicated to the RMS
Certification Hierarchy Committee and others deemed appropriate by Microsoft
Management.
Sensitive RMS Certification Hierarchy information must remain confidential to Microsoft. The following information is considered confidential to Microsoft and may not be disclosed:
- Certificate applications, whether approved or rejected
- Proof of identification documentation and details
- Certificate information collected as part of the registration records, beyond that which is required to be included in Subscriber certificates
- The compromise of its corresponding private key, in which case a disclosure must be made to relevant Relying Parties that the private key has been compromised or
- The termination of a CA, in which case prior disclosure of the termination must be given to affected entities.
The RMS Certification Hierarchy may publish Certificate information (including information within a certificate) and CRLs relating to RMS Certification Hierarchy CAs with external Relying Parties (e.g., Root RMS CA certificate, Intermediate CA certificate(s), Issuing CA certificates, and CRLs issued by these CAs) to an RMS Certification Hierarchy repository which provides read only access to authorized external parties or the public if required by the applicable Microsoft CP. Certificates and CRLs published in such a repository are not considered confidential.
In addition, the following types of information shall not be deemed to be confidential:
ˇ
information
disclosed to the receiving party that was already known to the receiving party,
without obligation to keep it confidential;
ˇ
the
receiving party received the information in good faith from a third party
lawfully in possession thereof without obligation to keep such information
confidential;
ˇ
the
information was publicly known at the time of its receipt by the receiving
party or has become publicly known other than by a breach of this CPS or any
applicable agreement; or
ˇ
the
information is independently developed by the receiving party without use of
the other party's confidential information
The fact that a particular RMS Certification Hierarchy Subscriber certificate is revoked is not confidential to Microsoft. The transactional records and other information leading up to such a revocation are considered confidential information of Microsoft. Subscriber certificate status information is provided to Relying Parties through the use of CRLs.
As a general principle, no document or record (including registration records) belonging to or controlled by the RMS Certification Hierarchy is released to law enforcement agencies or officials except where the law enforcement official is properly identified and where the release of specific information is:
As a general principal, no document or record belonging to or controlled by the RMS Certification Hierarchy is released to any person except where:
No stipulation.
The following are the property of Microsoft:
The
Issuer Name for all RMS Certification Hierarchy
Certificates and the Subject Name for all RMS Certification Hierarchy CA
Certificates is populated as follows:
Names generally are represented by a single string and
do not contain multiple attributes.
For SLC, the URL of the server is stored.
For Application Signing certificates, the
name of the ISV is stored without location.
Distinguished Names shall be meaningful, [except for certificates issued by the Microsoft Machine Certificate CA, which uses a GUID for the Distinguished Name.]
Name forms are interpreted in accordance with CPS §3.1.1 and 3.1.2.
No stipulation.
No stipulation.
Where the Subscriber generates his/her own key pair(s), the Subscribers certificate request must contain the public key to be certified and be digitally signed with the corresponding private key. Where a Microsoft Issuing CA generates Subscriber key pairs, the Issuing CA must create and submit a certificate request which contains the public key to be certified and is digitally signed with the corresponding private key.
The RMS Certification Hierarchy authenticates machine identities in accordance with the applicable Microsoft CP.
Individual Subscribers are authenticated by Issuing CAs in accordance with the applicable Microsoft CP.
Routine
rekey of the RMS
Routine rekey of Subscribers may be required in accordance with the applicable Microsoft CP. Rekey requests are approved by the applicable Microsoft Issuing CA using an automated or manual process in accordance with the applicable Microsoft CP.
In the event that an RMS CA certificate must be revoked, the CA will be re-keyed in accordance with CPS §4.8 or terminated in accordance with CPS §4.9.
The process for re-key after revocation or expiration of a Subscriber certificate is complete re-enrollment, which requires the generation of a new Subscriber key pair and the performance of the initial registration identification and authentication procedures specified in CPS §3.1 and the applicable Microsoft CP.
CA certificate renewal, defined as the process whereby a new certificate with an extended validity period is created for an existing key pair, is supported.
Subscriber certificate renewal is supported for RMS Certification Hierarchy Subscribers if required by a Microsoft CP. Where certificate renewal is not supported, prior to the expiration or following the revocation or expiration of the Subscribers certificate, the Subscriber is required to generate a new key pair and request a new certificate (i.e., rekey) in accordance with CPS §3.2 and 3.3.
A Subscriber certificate revocation request is valid if it complies with CPS §4.4 and meets one of the following requirements:
For individual certificates, where a revocation request is initiated by someone other than the Subscriber, approval from Microsoft RMS Certification Hierarchy Committee is required before the request can be processed by the RMS Certification Hierarchy.
See CPS §4.4.
See CPS §4.4.
Prior to a certificate being issued by the Microsoft CA, the Subscriber must submit a certificate application. The required certificate application information and form are specified in the applicable Microsoft CP.
Certificates are generated, issued and published only after the Issuing CA performs the required authentication and validation steps in accordance with the applicable Microsoft CP. The Issuing CA function may be manual or automated as discussed in CPS §1.3.2.
Certificate acceptance states the requirements regarding acceptance of an issued certificate by a Subscriber and for subsequent publication and use of the certificate. A Subscribers receipt of a certificate and subsequent use of its keys and certificates constitute certificate acceptance. By accepting a certificate, the Subscriber:
Upon receipt of a certificate, the Subscriber is responsible for verifying that the information contained within the certificate is accurate and complete and that the certificate is not damaged or otherwise corrupted. In the event the certificate is inaccurate, damaged or corrupted, the Subscriber shall contact the issuing RMS Certification Hierarchy CA to have the certificate updated, repaired or replaced as determined by the CA.
The RMS Certification Hierarchy supports certificate revocation for RMS Certification Hierarchy CAs if required by a specific Microsoft CP. The RMS Certification Hierarchy supports certificate suspension if required by a specific Microsoft CP. Where certificate suspension services are provided, such services are provided in accordance with the requirements of the applicable Microsoft CP.
Revocation may take place at the discretion of the RMS Certification Hierarchy CAs in the event that the security or integrity of the certificate (or information contained within it), a Subscriber or an RA is compromised or threatened. Without limiting the foregoing, under the following circumstances a certificate will be revoked:
Subscriber certificate revocation can be initiated by the
Subscriber, an authorized
When revocation requests are initiated by a Subscriber, the Issuing CA is responsible for:
To process a revocation request initiated by an Issuing CA or Subscriber, the RMS Certification Hierarchy:
For individual certificates, where a revocation request is initiated by someone other than the Subscriber, approval from the Microsoft RMS Certification Hierarchy Committee is required before the request can be processed by the RMS Certification Hierarchy.
For suspension requests, see CPS §4.4.
The Issuing CA is required to verify and process revocation requests on receipt for automated requests and within two (2) business days for manual requests. The RMS Certification Hierarchy is required to process approved evocation requests on receipt. A certificates revoked status must be reflected on a CRL published at the next scheduled update according to the applicable Microsoft CP.
See CPS §4.4.
CRLs for Microsoft CAs are issued as necessary in accordance with the following table.
CA Type |
CRL Publication Frequency |
Root RMS CA |
No Stipulation |
Intermediate (Policy) CA(s) |
No Stipulation |
Issuing CA(s) |
No Stipulation |
Relying Parties are required to check certificate status using the applicable CRL before relying upon a certificate. Under no circumstances will the RMS Certification Hierarchy or its CAs and their respective directors, officers, employees, agents and subcontractors be liable for any damages whatsoever due to a Relying Party's (a) failure to check for revocation or expiration of a certificate, or (b) reliance on a revoked or expired certificate.
No stipulation.
No stipulation.
No stipulation.
There is no deviation from the certificate revocation procedures specified above when the revocation of a Subscriber certificate is due to private key compromise. In addition to the procedures specified above, if deemed necessary, the RMS Certification Hierarchy uses commercially reasonable efforts to notify potential Relying Parties if the RMS Certification Hierarchy discovers, or has reason to believe, that there has been a compromise of a RMS Certification Hierarchy CA private key.
The RMS Certification Hierarchy logs the following significant events:
- Requests for certificates, renewal, rekey, and revocation
- Successful or unsuccessful processing of requests
- Generation and issuance of certificates
- Revocation of certificates
- Issuance of CRLs
- System crashes, hardware failures and other anomalies
- Account and service logon
- Object access
- Policy changes
- Account management
- CA facility visitor entry/exit
- Retrieval of administrator smart cards from off-site secure storage facility
Audit logs (including system logs and physical entry logs)
are reviewed on an as-needed basis.
System audit logs are maintained until overwritten by the system (when a specific log size limit has been reached for the particular log). Video records of RMS Certification Hierarchy facility entry are kept for 18 days. Card reader access logs are kept for a minimum of six months.
Production and archived logical and physical audit logs are protected using a combination of physical and logical access controls.
Production and archived logical and physical audit logs are backed up regularly. Card reader access logs are backed up regularly as well. System audit logs are not backed up.
Automated audit data is generated and recorded at the application, network, and operating system level. Manually generated audit data is recorded by the RMS Certification Hierarchy employees.
The RMS Certification Hierarchy team will notify the Microsoft corporate incident response team should a critical security event occur.
Microsofts corporate security group must notify the RMS Certification Hierarchy team when an alarm occurs at the RMS Certification Hierarchy facility. If a forced entry has occurred, the corporate security manager and the information security director are to be contacted.
No
stipulation.
The RMS Certification
Hierarchy maintains an archive of relevant records for each CA.
The RMS Certification Hierarchy
archives CA key generation records and CA certificates for each CA.
No stipulation.
No stipulation.
No stipulation.
RMS Certification
Hierarchy system clocks are synchronized with Microsoft corporate domain
controllers. Automated journal entries
include a system generated date and time field.
Manual journal entries include a manually entered date and time field.
No stipulation.
No stipulation.
Microsoft CAs will stop issuing certificates and will be rekeyed or terminated before the maximum key usage period for certificate signing is reached in accordance with CPS §6.3.2. The CA will continue to sign and publish CRLs until the end of the CA certificate lifetime. Key changeover or CA termination process will be performed such that it causes minimal disruption to Subscribers and Relying Parties.
The RMS Certification Hierarchy maintains offsite backups of CA systems, data, and CA private keys for purposes of routine or disaster recovery. Smart cards required for CA activation are also maintained at locations separate from the CA data center.
In the event of a disaster or key compromise, RMS Certification Hierarchy management will assess the situation and determine the appropriate course of action.
In the event that it is necessary to terminate the operation of a RMS Certification Hierarchy CA, RMS Certification Hierarchy management will plan and coordinate the termination process with its Subscribers and relying parties such that the impact of the termination is minimized. The RMS Certification Hierarchy should provide as much prior notice as is practicable and reasonable to Subscribers and Relying Parties and preserve relevant records for a period of time deemed fit for functional and legal purposes. Relevant certificates will be revoked no later than the time of the termination.
RMS Certification Hierarchy systems are hosted and managed
using secure facilities in the
Production RMS Certification Hierarchy systems are housed in a secure facility requiring three factor authentication and dual control. Physical access to the facility is automatically logged and video recorded on a 24x7 basis. Within the facility, motion sensors provide an additional level of security.
The current facilitys power circuit is supported by a backup generator. An air conditioning unit and heat sensor have been implemented ensure that the data center temperature is maintained within reasonable operating limits.
No stipulation.
The RMS Certification Hierarchy site is equipped with
water-based sprinklers.
Media containing production software, production data, and system audit information is stored within RMS Certification Hierarchy facilities with appropriate physical and logical access controls designed to limit access to authorized personnel. Backup information is stored in a secure offsite storage facility.
Offsite backup media are stored in a physically secure manner using both Microsoft-owned and bonded third party storage facilities.
Sensitive documents and
materials are shredded before disposal.
Media used to collect or transmit sensitive information are rendered
unreadable before disposal. Other waste
is disposed of in accordance with Microsofts normal waste disposal
requirements.
Cryptographic
devices, smart cards, and other devices that may contain private keys or keying
material are physically destroyed or zeroized in accordance the manufacturers
guidance prior to disposal.
All Microsoft personnel involved in the operation of RMS Certification Hierarchy systems are considered to serve in trusted roles. Within the RMS Certification Hierarchy organization, the following trusted roles exist:
In addition, the RMS Certification Hierarchy operation is supported by Microsoft Corporate organizations including the following, each of which is considered a trusted role:
Cryptographically sensitive operations within the RMS Certification Hierarchy such as CA key generation, CA key recovery, CA key activation and CA system configuration require the participation of multiple trusted individuals in accordance with CPS §6.2.2. Other operations may require only one trusted individual.
Each person performing a trusted role within the RMS Certification Hierarchy must be authorized to perform such functions and must satisfy the personnel requirements specified in CPS §5.3.
The RMS Certification Hierarchy operation relies on Microsoft corporate policies for personnel management to ensure the trustworthiness of its staff.
The recruitment and selection practices for RMS Certification Hierarchy personnel take into account the background, qualifications, experience, and clearance requirements of each position, which are compared against the profiles of potential candidates.
For RMS
Certification Hierarchy employees, background checks are performed prior to
their commencement of employment. Such
checks include:
RMS Certification
Hierarchy employees are required to sign a nondisclosure agreement and are
required to adhere to RMS Certification Hierarchy policies and procedures.
All RMS Certification Hierarchy personnel receive on the job training covering:
RMS Certification
Hierarchy personnel receive formal or informal training on the use of deployed
PKI products and RMS Certification Hierarchy policies and procedures, upon hire
and as necessary. Security awareness
campaigns are ongoing.
No stipulation.
In accordance with corporate polices, appropriate disciplinary actions will be taken for unauthorized actions or other violations of RMS Certification Hierarchy policies and procedures.
RMS
Certification Hierarchy may employ contractors as necessary. Where contractors are used by the RMS
Certification Hierarchy, they are subject to background check procedures
comparable to those specified in CPS §5.3.1 and 5.3.2.
RMS Certification
Hierarchy personnel are required to read this CPS. They are also provided with RMS Certification
Hierarchy policies, procedures, and other documentation relevant to their job
functions.
CA key pair generation uses cryptographic modules that meet the requirements of CPS §6.2.1 and requires the participation of trusted employees including members of the Microsoft RMS Certification Hierarchy team and the Microsoft Law and Corporate Affairs Group.
Enrollment Agent key generation is performed in software by
an authorized RMS Certification Hierarchy Issuing
Subscriber key pair generation may be performed by the RMS Certification Hierarchy or by the Subscriber, depending on the application, in accordance with the applicable Microsoft CP.
Where Subscriber key pairs are generated by the RMS Certification Hierarchy, the Subscribers private key is securely delivered to the Subscriber in accordance with the applicable Microsoft CP.
Where Subscriber key pairs are generated by the Subscriber, there is no private key transportation requirement.
CA certificate requests are generated and processed by RMS Certification Hierarchy employees using a controlled process that requires the participation of multiple trusted individuals. CA certificate requests are PKCS #10 requests and accordingly contain the requesting CAs public key and are digitally signed by the requesting CAs private key.
Where Subscriber key pairs are generated by an RMS
Certification Hierarchy Issuing
ˇ the public key has not been modified during transit and
ˇ the sender possess the private key corresponding to the transferred public key.
Where an automated registration process is used, the Subscribers public key is automatically submitted to the CA as part of the enrollment process. Where a manual registration process is used, the MCS-PKI Issuing CA submits the Subscribers public key to the CA for certification.
Unless otherwise specified in an applicable CP,
The Microsoft RMS
Subscriber key pairs are generated in hardware or software, depending on the sensitivity of applications, in accordance with the applicable Microsoft CP.
Keys and certificates may be used for the purposes specified in the relevant Microsoft CP. For all RMS CAs, the key usage extension is set in accordance with the Microsoft certificate profile requirements specified in CPS §7.1.2.1.
The RMS Certification Hierarchy uses cryptographic modules that meet industry standards for random number and prime number generation and the following requirements:
CA Type |
Requirements |
|
Certified to at least FIPS 140-1 Level 3 |
Intermediate and Issuing CAs |
Certified to at least FIPS 140-1 Level 2 |
Subscriber key pairs are stored in hardware or software, depending on the sensitivity of applications, in accordance with the applicable Microsoft CP.
The participation of multiple trusted employees is required to perform sensitive CA private key operations (e.g., signing operations, CA key backup, CA key recovery, etc.) for the RMS Root CA and Intermediate (Policy) CAs. This is enforced through the RMS Certification Hierarchys allocation among persons or groups with trusted roles of the Administrator and Operator Card Sets which are required for CA key activation.
The participation of at least two trusted employees is required to perform sensitive CA private key operations (e.g., signing operations, CA key backup, CA key recovery, etc.) for the Issuing CAs. This is enforced by the physical access controls specified in CPS §5.1.2 and physical access controls over the related Administrator Cards and Operator Cards.
No Stipulation. The
escrow of CA and Subscriber private keys, for purposes of access by law enforcement,
is not supported by the RMS Certification Hierarchy.
Backup copies of CA private keys and Issuing CA private signing keys are stored in encrypted form using cryptographic modules that meet the requirements specified in CPS §6.2.1.
Where Subscriber private key backup and recovery are required by a Microsoft CP, such functions are performed in accordance with the CP. Unless required by a Microsoft CP, Subscriber private keys are not backed up or archived by the RMS Certification Hierarchy.
Where copies of Subscriber private keys are stored by the RMS Certification Hierarchy, such keys are stored in encrypted form with physical and logical access restricted to authorized individuals.
CA private keys are generated and used only within hardware cryptographic modules meeting the requirements of CPS §6.2.1. The private key exists outside hardware cryptographic modules only in encrypted form.
Hardware modules used for CA private key protection utilize a smart card based activation mechanism (Operator Card) as described in CPS §6.2.2.
Enrollment Agent private keys are stored on smart cards and protected by a pass phrase.
Smart card based Subscriber private keys are activated with a pass phrase in accordance with the applicable Microsoft CP. Software-based Subscriber private keys are activated by the Subscriber in accordance with the applicable CP, typically through the use of a pass phrase.
CA private keys are de-activated by removing the corresponding Operator Card from the card reader.
Enrollment Agent keys are de-activated upon logout from the Issuing CA application or removal of their smart card from the reader.
Subscriber private keys are deactivated after each usage if the High Security Option is set or otherwise upon operating system log off.
CA private key destruction requires the participation of multiple trusted RMS Certification Hierarchy employees and approval from the RMS Certification Hierarchy Committee and management. When CA key destruction is required, private keys stored in cryptographic modules (if applicable) may be completely destroyed through zeroization and/or physical destruction of the device in accordance with manufacturers guidance. Where CA private keys are stored on other media, such keys are stored in encrypted form. Where destruction of such encrypted private keys is required, the encrypted private keys should be securely overwritten or the storage medium physically destroyed.
Copies of CA and Subscriber certificates are archived in accordance with CPS §4.6.
For RMS Certification Hierarchy CAs and Subscribers, key and certificate usage periods meet the following requirements.
Entity |
Maximum Key
Usage Period (for certificate signing) |
Maximum Key
Usage Period (for CRL signing) |
Maximum
Certificate Validity Period |
Microsoft RMS Production / ISV Root |
11 years |
13 years |
13 years |
|
|||
Microsoft RMS Production / ISV CA |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Application Signing Server
CA |
11 years |
13 years |
13 years |
|
|||
Microsoft RMS Production / ISV Machine Activation Server
CA |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Server Enrollment CA |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Licensing Server CA |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Account Certification Server CA |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Manifest Signing |
11 years |
13 years |
13 years |
|
|||
Microsoft RMS Production / ISV Machine Activation Service |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Server Enrollment Service |
11 years |
13 years |
13 years |
Microsoft RMS Production Licensing Service |
11 years |
13 years |
13 years |
Microsoft RMS Production / ISV Account Certification Service |
11 years |
13 years |
13 years |
Hardware modules used for CA private key protection utilize a smart card based activation mechanism (Operator Card) as described in CPS §6.2.2. These cards are used only when needed and stored in a secure site when not in use.
The RMS Certification Hierarchy uses industry standard CA software, PKI applications, cryptographic modules, and smart cards. The Microsoft corporate network as a whole is protected by industry standard intrusion detection systems and firewalls.
The Administrator account is not used for routine system operations. Each user requiring access to RMS Certification Hierarchy systems is set up as a domain administrator. Accounts are not shared.
No stipulation.
The Microsoft corporate network as a whole is protected by industry standard intrusion detection systems (IDS) and firewalls. A corporate IDS team monitors Microsofts global operations.
The RMS Certification Hierarchy uses cryptographic modules that meet the requirements of CPS §6.2.1.
The RMS Certification
Hierarchy uses certificates according to the certificate profile described in
the XrML 1.2.1 specification. The XrML
1.2.1 specification can be found at http://www.xrml.org/XrML_12.asp.
Registration is required.
The RMS Certification Hierarchy issues certificates according to the XrML 1.2.1 specification.
No stipulation.
Modifications to this CPS are approved by the RMS Certification Hierarchy Committee and become effective upon publication in the RMS Certification Hierarchy repository.
This CPS and subsequent
revisions are published in the RMS Certification Hierarchy repository in
accordance with CPS §2.6.1.
Microsoft CPs are specified and approved by the RMS Certification Hierarchy Committee which is also responsible for disseminating Microsoft Certificate Policies and subsequent revisions to the appropriate Subscribers and Relying Parties.