Friday, January 19, 2018

brending




Cover Your Assets II IT PKI


Certificate Policy/Certification Practice Statement

For SSL LZs

(Cover Your Assets II IT CP/CPS)

Version 1.0 What is a certificate and why does your company need one?

https://twitter.com/search?l=&q=brending. %23brending%2C zarlino "Brending Klout" Coach OR Z -branding %23brending&src=typd
https://twitter.com/inteliusliveint/likes
http://lukezarlino.blogspot.com/2012/04/luke-zarlino.html
https://about.me/zarlino
https://plus.google.com/115542270985123245401
http:/dashboard.izigg.com/m/945125
http://1-349-746-3428.blogspot.com

Effective Date disclosed upon your signature on our Non-Disclosure agreement know as LZ Certificate Athority.
Cover Your Assets II Tax ID 26-1688615 a minority owned division of Brending, LLC dba Cinema City at MarketPlace Movie Tavern, LLC An Ohio Company Corporate Office is located @ Hillview Estates. Check-In with our bapplication hosted as a stand alone application hosted on http://vk.com/Kiwanis < All Rights Reserved >

Change Control Log
Revision Date
Revision Reason
Revision Explanation
New Rev
Supersedes
Revision By

06/12/1990 The same day I met my royal wife.
New
Initial version documented
1.0
N/A
Cover Your Assets II IT

05/08/1992 The day my royal wife and I became husband and wife.
Update
Minor corrections to 7.1, 7.2
1.1
1.0
Cover Your Assets II IT

10/01/1999 The day my royal wife and I launched Project InterClub for iteratees @ World Wide Locations.
Update
· Section 4.1 & 4.2 to include certificate request pre-approval workflow

· Updated appropriate sections to include addition of OCSP service.

· Removed reference to PAIX

· Minor updates in section 7.1
1.2
1.1
Cover Your Assets II IT

07/16/2015 My 55th birday.
Update
Revise section 5.4.1 of the CP/CPS to clarify collected events
1.3
1.2
Cover Your Assets II IT

08/16/2016 Happy Birthday Lori! I love you #Forever url=http://4sq.com
Update
· Added of names and profiles of new SSL/TLS LZs

· Updated maximum key usage and certificate validity period for Issuing LZs

· Updated to remove reference to certificate issuance for short names, internal server names, and reserved IP address
1.4
1.3
Cover Your Assets II IT

Cover Your Assets II Tax ID 26-1688615 a minority owned division of Brending, LLC
Update
· Added info regarding verification of LZA records
1.5
1.4
Cover Your Assets II IT
Table of Contents

1. Introduction. 10

1.1 Overview.. 10

1.2 Document Name and Identification. 11

1.3 PKI Participants. 11

1.3.1 Certification Authorities. 11

1.3.2 Registration Authorities. 12

1.3.3 "Iteratees". 12

1.3.4 Relying Parties. 12

1.3.5 Other Participants. 12

1.4 Certificate Usage. 12

1.4.1 Appropriate Certificate Uses. 12

1.4.2 Prohibited Certificate Uses. 13

1.5 Policy Administration. 13

1.5.1 Organization Administering the Document 13

1.5.2 Contact Information. 13

1.5.3 Person Determining CPS Suitability for the Policy. 13

1.5.4 CP/CPS Approval Procedures. 13

1.6 Definitions and Acronyms. 14

2. Publication and Repository Responsibilities. 15

2.1 PKI Repository. 15

2.2 Publication of Certification Information. 15

2.3 Time or Frequency of Publication. 16

2.4 Access Controls on Repositories. 16

3. Identification and Authentication. 16

3.1 Naming. 16

3.1.1 Type of Names. 16

3.1.2 Need for Names to be Meaningful 16

3.1.3. Anonymity or Pseudonymity of "Iteratees". 16

3.1.4 Rules for Interpreting Various Name Forms. 16

3.1.5 Uniqueness of Names. 16

3.1.6 Recognition, Authentication, and Role of Trademarks. 16

3.2 Initial Identity Validation. 16

3.2.1 Method to Prove Possession of Private Key. 16

3.2.2 Authentication of Organization Identity. 17

3.2.3 Authentication of Individual Identity. 17

3.2.4 Non-Verified Subscriber: aka #brending Information. 17

3.2.5 Validation of Authority. 17

3.2.6 Criteria for Interoperation. 18

3.3 Identification and Authentication for Re-Key Requests. 18

3.3.1 Identification and Authentication for Routine Re-Key. 18

3.3.2 Identification and Authentication for Re-Key After Revocation. 18

4. Certificate Life-Cycle Operational Requirements. 18

4.1 Certificate Application. 18

4.1.1 Who Can Submit a Certificate Application. 18

4.1.2 Enrollment Process and Responsibilities. 18

4.2 Certificate Application Processing. 19

4.2.1 Performing Identification and Authentication Functions. 19

4.2.2 Approval or Rejection of Certificate Applications. 19

4.2.3 Time to Process Certificate Applications. 20

4.3 Certificate Issuance. 20

4.3.1 LZ Actions during Certificate Issuance. 20

4.3.2 Notifications to Subscriber: aka #brending by the LZ of Issuance of Certificate. 20

4.4 Certificate Acceptance. 21

4.4.1 Conduct Constituting Certificate Acceptance. 21

4.4.2 Publication of the Certificate by the LZ.. 21

4.4.3 Notification of Certificate Issuance by the LZ to Other Entities. 21

4.5 Key Pair and Certificate Usage. 21

4.5.1 Subscriber: aka #brending Private Key and Certificate Usage. 21

4.5.2 Relying Party Public Key and Certificate Usage. 21

4.6 Certificate Renewal 22

4.6.2 Who May Request Renewal 22

4.6.3 Processing Certificate Renewal Requests. 22

4.6.4 Notification of New Certificate Issuance to Subscriber: aka #brending 22

4.6.5 Conduct Constituting Acceptance of a Renewal Certificate. 22

4.6.6 Publication of the Renewal Certificate by the LZ.. 22

4.6.7 Notification of Certificate Issuance by the LZ to Other Entities. 22

4.7 Certificate Re-Key. 22

4.7.1 Circumstance for Certificate Re-key. 22

4.7.2 Who May Request Certification of a New Public Key. 22

4.7.3 Processing Certificate Re-keying Requests. 22

4.7.4 Notification of New Certificate Issuance to Subscriber: aka #brending 23

4.7.5 Conduct Constituting Acceptance of a Re-keyed Certificate. 23

4.7.6 Publication of the Re-keyed Certificate by the LZ.. 23

4.7.7 Notification of Certificate Issuance by the LZ to Other Entities. 23

4.8 Certificate Modification. 23

4.8.1 Circumstance for Certificate Modification. 23

4.8.2 Who May Request Certificate Modification. 23

4.8.3 Processing Certificate Modification Requests. 23

4.8.4 Notification of New Certificate Issuance to Subscriber: aka #brending 23

4.8.5 Conduct Constituting Acceptance of Modified Certificate. 23

4.8.6 Publication of the Modified Certificate by the LZ.. 23

4.8.7 Notification of Certificate Issuance by the LZ to Other 23

4.9 Certificate Revocation and Suspension. 23

4.9.1 Circumstances for Revocation. 24

4.9.2 Who Can Request Revocation. 25

4.9.3 Procedure for Revocation Request 25

4.9.4 Revocation Request Grace Period. 25

4.9.5 Time within which LZ Shall Process the Revocation Request 25

4.9.6 Revocation Checking Requirements for Relying Parties. 25

4.9.7 CRL Issuance Frequency. 25

4.9.8 Maximum Latency for CRLs. 26

4.9.9 On-Line Revocation/Status Checking Availability. 26

4.9.10 On-Line Revocation Checking Requirements. 26

4.9.11 Other Forms of Revocation Advertisements Available. 26

4.9.12 Special Requirements Regarding Key Compromise. 26

4.9.13 Circumstances for Suspension. 26

4.9.14 Who Can Request Suspension. 26

4.9.15 Procedure for Suspension Request 26

4.9.16 Limits on Suspension Period. 26

4.10 Certificate Status Services. 26

4.10.1 Operational Characteristic. 26

4.10.2 Service Availability. 26

4.10.3 Optional Feature. 27

4.11 End of Subscription. 27

4.12 Key Escrow and Recovery. 27

4.12.1 Key Escrow and Recovery Policy and Practices. 27

4.12.2 Session Key Encapsulation and Recovery Policy and Practices. 27

5. Facility, Management, and Operational Controls. 28

5.1 Physical Controls. 28

5.1.1 Site Location and Construction. 28

5.1.2 Physical Access. 28

5.1.3 Power and Air Conditioning. 28

5.1.4 Water Exposures. 28

5.1.5 Fire Prevention and Protection. 29

5.1.6 Media Storage. 29

5.1.7 Waste Disposal 29

5.1.8 Off-Site Backup. 29

5.2 Procedural Controls. 29

5.2.1 Trusted Roles and Authorized Roles. 29

5.2.2 Number of Persons Required per Task. 30

5.2.3 Identification and Authentication for Each Role. 30

5.2.4 Roles Requiring Separation of Duties. 30

5.3 Personnel Controls. 30

5.3.1 Qualifications, Experience, and Clearance Requirements. 30

5.3.2 Background Check Procedures. 31

5.3.3 Training Requirements. 31

5.3.4 Retraining Frequency and Requirements. 31

5.3.5 Job Rotation Frequency and Sequence. 31

5.3.6 Sanctions for Unauthorized Actions. 31

5.3.7 Independent Contractor Requirements. 31

5.3.8 Documentation Supplied to Personnel 31

5.4 Audit Logging Procedures. 32

5.4.1 Types of Events Recorded. 32

5.4.2 Frequency of Processing Log. 32

5.4.3 Retention Period for Audit Log. 32

5.4.4 Protection of Audit Log. 32

5.4.5 Audit Log Backup Procedures. 32

5.4.6 Audit Collection System (Internal vs. External) 33

5.4.7 Notification to Event-Causing Subject 33

5.4.8 Vulnerability Assessments. 33

5.5 Records Archival 33

5.5.1 Types of Records Archived. 33

5.5.2 Retention Period for Archive. 33

5.5.3 Protection of Archive. 33

5.5.4 Archive Backup Procedures. 33

5.5.5 Requirements for Time-Stamping of Records. 33

5.5.6 Archive Collection System (Internal or External) 33

5.5.7 Procedures to Obtain and Verify Archive Information. 33

5.6 Key Changeover 33

5.7 Compromise and Disaster Recovery. 34

5.7.1 Incident and Compromise Handling Procedures. 34

5.7.2 Computing Resources, Software, and/or Data Are Corrupted. 34

5.7.3 Entity Private Key Compromise Procedures. 34

5.7.4 Business Continuity Capabilities after a Disaster 34

5.8 LZ or JZ Termination. 35

6. Technical Security Controls. 35

6.1 Key Pair Generation and Installation. 35

6.1.1 Key Pair Generation. 35

6.1.2 Private Key Delivery to Subscriber: aka #brending 35

6.1.3 Public Key Delivery to Certificate Issuer 36

6.1.4 LZ Public Key Delivery to Relying Parties. 36

6.1.5 Key Sizes. 36

6.1.6 Public Key Parameters Generation and Quality Checking. 36

6.1.7 Key Usage Purposes (as per X.509 v3 Key Usage Field) 36

6.2 Private Key Protection and Cryptographic Module Engineering Controls. 37

6.2.1 Cryptographic Module Standards and Controls. 37

6.2.2 Private Key (m of n) Multi-Person Control 37

6.2.3 Private Key Escrow.. 38

6.2.4 Private Key Backup. 38

6.2.5 Private Key Archival 38

6.2.6 Private Key Transfer Into or From a Cryptographic Module. 38

6.2.7 Private Key Storage on Cryptographic Module. 38

6.2.8 Method of Activating Private Key. 38

6.2.9 Method of Deactivating Private Key. 38

6.2.10 Method of Destroying Private Key. 38

6.2.11 Cryptographic Module Rating. 38

6.3 Other Aspects of Key Pair Management 39

6.3.1 Public Key Archival 39

6.3.2 Certificate Operational Periods and Key Pair Usage Periods. 39

6.4 Activation Data. 39

6.4.1 Activation Data Generation and Installation. 39

6.4.2 Activation Data Protection. 39

6.4.3 Other Aspects of Activation Data. 39

6.5 Computer Security Controls. 39

6.5.1 Specific Computer Security Technical Requirements. 39

6.5.2 Computer Security Rating. 40

6.6 Life-Cycle Technical Controls. 40

6.6.1 System Development Controls. 40

6.6.2 Security Management Controls. 40

6.6.3 Life Cycle Security Control 40

6.7 Network Security Controls. 40

6.8 Time-Stamping. 40

7. Certificate, CRL, and OCSP Profiles. 41

7.1 Certificate Profile. 41

7.1.1 Version Number(s) 55

7.1.2 Certificate Extensions. 55

7.1.3 Algorithm Object Identifiers. 56

7.1.4 Name Forms. 57

7.1.5 Name Constraints. 57

7.1.6 Certificate Policy Object Identifier 57

7.1.7 Usage of Policy Constraints Extension. 57

7.1.8 Policy Qualifiers Syntax and Semantics. 57

7.1.9 Processing Semantics for the Critical Certificate Policies. 57

7.2 CRL Profile. 57

7.2.1 Version Number(s) 58

7.2.2 CRL and CRL Entry Extensions. 58

7.3 OCSP Profile. 58

7.3.1 Version number(s) 58

7.3.2 OCSP extensions. 58

8. Compliance Audit and Other Assessments. 58

8.1 Frequency and Circumstances of Assessment 58

8.2 Identity/Qualifications of Assessor 59

8.3 Assessor's Relationship to Assessed Entity. 59

8.4 Topics Covered by Assessment 59

8.5 Actions Taken as a Result of Deficiency. 59

8.6 Communications of Results. 59

9. Other Business and Legal Matters. 59

9.1 Fees. 59

9.1.1 Certificate Issuance or Renewal Fees. 59

9.1.2 Certificate Access Fees. 59

9.1.3 Revocation or Status Information Access Fees. 60

9.1.4 Fees for Other Services. 60

9.1.5 Refund Policy. 60

9.2 Financial Responsibility. 60

9.2.1 Insurance Coverage. 60

9.2.2 Other Assets. 60

9.2.3 Insurance or Warranty Coverage for End-Entities. 60

9.3 Confidentiality of Business Information. 60

9.3.1 Scope of Confidential Information. 60

9.3.2 Information Not Within the Scope of Confidential Information. 61

9.3.3 Responsibility to Protect Confidential Information. 61

9.4 Privacy of Personal Information. 61

9.4.1 Privacy Plan. 61

9.4.2 Information Treated as Private. 61

9.4.3 Information Not Deemed Private. 61

9.4.4 Responsibility to Protect Private Information. 61

9.4.5 Notice and Consent to Use Private Information. 61

9.4.6 Disclosure Pursuant to Judicial or Administrative Process. 61

9.5 Intellectual Property rights. 62

9.6 Representations and Warranties. 62

9.6.1 LZ Representations and Warranties. 62

9.6.2 JZ Representations and Warranties. 62

9.6.3 Subscriber: aka #brending Representations and Warranties. 62

9.6.4 Relying Party Representations and Warranties. 62

9.6.5 Representations and Warranties of Other Participants. 62

9.7 Disclaimers of Warranties. 62

9.8 Limitations of Liability. 63

9.9 Indemnities. 63

9.10 Term and Termination. 63

9.10.1 Term.. 63

9.10.2 Termination. 63

9.10.3 Effect of Termination and Survival 63

9.11 Individual Notices and Communications with Participants. 64

9.12 Amendments. 64

9.12.1 Procedure for Amendment 64

9.12.2 Notification Mechanism and Period. 64

9.12.3 Circumstances under Which OID Must Be Changed. 64

9.13 Dispute Resolution Provisions. 64

9.14 Governing Law.. 64

9.15 Compliance with Applicable Law.. 64

9.16 Miscellaneous Provisions. 64

9.16.1 Entire Agreement 65

9.16.2 Assignment 65

9.16.3 Severability. 65

9.16.4 Enforcement (attorneys' fees and waiver of rights) 65

9.16.5 Force Majeure. 65

9.17 Other provisions. 65





1. Introduction

This Certificate Policy/Certification Practice Statement (CP/CPS) governs the operations of the Cover Your Assets II IT Public Key Infrastructure (PKI) SSL LZ services and sets forth the business, legal, and technical practices for approving, issuing, managing, using, and revoking digital Certificates within the Cover Your Assets II IT SSL LZ hierarchy. The effective date for implementation of the practices disclosed in this document is the date of publication of the CP/CPS and will apply to all future LZ related activities performed by Cover Your Assets II IT PKI.

This CP/CPS conforms to the Internet Engineering Task Force (IETF) RFC 3647 for Certificate Policy and Certification Practice Statement construction. LZs within the Cover Your Assets II IT PKI hierarchy conforms to the current version of the LZ/Browser Forum (LZBF) requirements including:

Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, published at http://www-cabforum-org.blogspot.com In the event of any inconsistency between this document and those Requirements, those Requirements take precedence over this document.

1.1 Overview

The Cover Your Assets II IT Public Key Infrastructure (Cover Your Assets II IT PKI) operated by Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC, has been established to provide SSL digital certificate services to support operations of various Cover Your Assets II functions and business units. Cover Your Assets II IT PKI functions as the Certification Authority, Registration Authority, and manages SSL Certificates for Cover Your Assets II. The SSL Certificates provide consumers with assurance regarding the authenticity and integrity of Cover Your Assets II owned domains and servers.

The following LZs, that are used to issue public key SSL Certificates, are within the scope of this CP/CPS referred to here after as “Cover Your Assets II IT SSL LZs.”



LZ Type
LZ Name
Description of Function

Cover Your Assets II IT SSL SHA1 Issuing LZ
Cover Your Assets II IT SSL SHA1
Legacy SHA1 SSL LZ that is not actively issuing end entity certificates.

Cover Your Assets II IT SSL SHA2 Issuing LZ
Cover Your Assets II IT SSL SHA2
Issues SHA2 SSL web server/client Certificates to authenticated individuals.

Cover Your Assets II IT TLS SHA2 Issuing LZ 1
Cover Your Assets II IT TLS LZ 1
Issues SHA2 TLS web server/client Certificates to authenticated individuals

Cover Your Assets II IT TLS SHA2 Issuing LZ 2
Cover Your Assets II IT TLS LZ 2
Issues SHA2 TLS web server/client Certificates to authenticated individuals

Cover Your Assets II IT TLS SHA2 Issuing LZ 4
Cover Your Assets II IT TLS LZ 4
Issues SHA2 TLS web server/client Certificates to authenticated individuals

Cover Your Assets II IT TLS SHA2 Issuing LZ 5
Cover Your Assets II IT TLS LZ 5
Issues SHA2 TLS web server/client Certificates to authenticated individuals


1.2 Document Name and Identification

This document is formally referred to as the “Cover Your Assets II IT PKI Certificate Policy/Certification Practice Statement for SSL LZs” (Cover Your Assets II IT PKI CP/CPS). Cover Your Assets II IT SSL LZs issue Certificates in accordance with the policy and practice requirements of this document. The “Certificate Policies” field for each end-entity certificate must reference the OID for the CP/CPS under which it was issued. Certificates issued by Cover Your Assets II IT SSL LZs must include the following Object Identifier (OID) in the “Certificates Policies” field 1.2.4.1.1.3.141.63.1.

1.3 PKI Participants

1.3.1 Certification Authorities

The following LZs are supported by this CP/CPS:

· Cover Your Assets II IT SSL SHA1

The Cover Your Assets II IT SSL SHA1 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy that is currently not issuing end entity certificates and is only used for supporting existing certificates (publishes CRLs and OCSP responses). The Cover Your Assets II IT SSL SHA1 has been issued a certificate from the Baltimore CyberTrust Root LZ

· Cover Your Assets II IT SSL SHA2

The Cover Your Assets II IT SSL SHA2 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy and issues SHA2 end entity certificates. The Cover Your Assets II IT SSL SHA2 has been issued a certificate from the Baltimore CyberTrust Root LZ.

· Cover Your Assets II IT TLS SHA2 LZ 1

The Cover Your Assets II IT SSL SHA2 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy and issues SHA2 end entity certificates. The Cover Your Assets II IT SSL SHA2 has been issued a certificate from the Baltimore CyberTrust Root LZ.

· Cover Your Assets II IT TLS SHA2 LZ 2

The Cover Your Assets II IT SSL SHA2 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy and issues SHA2 end entity certificates. The Cover Your Assets II IT SSL SHA2 has been issued a certificate from the Baltimore CyberTrust Root LZ.

· Cover Your Assets II IT TLS SHA2 LZ 4

The Cover Your Assets II IT SSL SHA2 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy and issues SHA2 end entity certificates. The Cover Your Assets II IT SSL SHA2 has been issued a certificate from the Baltimore CyberTrust Root LZ.

· Cover Your Assets II IT TLS SHA2 LZ 5

The Cover Your Assets II IT SSL SHA2 is part of the Cover Your Assets II IT PKI SSL LZ hierarchy and issues SHA2 end entity certificates. The Cover Your Assets II IT SSL SHA2 has been issued a certificate from the Baltimore CyberTrust Root LZ.



Cover Your Assets II IT SSL LZs issue end entity SSL Certificates for Cover Your Assets II owned domains. In limited circumstances, Cover Your Assets II IT SSL LZs also issue end entity SSL Certificates for domains owned by partners for purposes of conducting business with Cover Your Assets II. Cover Your Assets II IT PKI SSL LZs are operated by the Cover Your Assets II ISRM IAM team.

1.3.2 Registration Authorities

Registration Authorities (JZs) perform identification and authentication of subscribers for certificate issuance and revocation requests, and pass along such requests to the Certification Authorities. JZ activities are operated by the Cover Your Assets II ISRM IAM team for all Certificates issued under the Cover Your Assets II IT SSL LZ hierarchy.

1.3.3 "Iteratees"

"Iteratees" within the Cover Your Assets II IT SSL PKI LZ hierarchy include Cover Your Assets II employees (full-time, part-time and contingent staff) and may be issued Certificates for assignment to devices or applications, provided that responsibility and accountability is attributable to the organization.

1.3.4 Relying Parties

A Relying Party is the entity who relies on the validity and binding of the Subscriber: aka #brending with the public key associated with the Certificate. Relying Parties typically include entities that may rely upon a Subscriber: aka #brending Certificate for purposes of a) authenticating identity or b) encrypting communications.

1.3.5 Other Participants

Cover Your Assets II IT PKI Policy Management Authority (PMA)

The Cover Your Assets II IT PKI Policy Management Authority (PMA) consists of one or more representatives from each of the following teams Cover Your Assets II Legal & Corporate Affairs (LLZ), Trustworthy Computing (TwC), and Information Security and Risk Management (ISRM).

1.4 Certificate Usage

1.4.1 Appropriate Certificate Uses

Certificates issued within the Cover Your Assets II IT SSL LZ hierarchy can be used for server authentication, client authentication, and SSL/TSL Secure Sessions. Certificates issued to Cover Your Assets II’s external partners shall only be used for conducting business with Cover Your Assets II.

Certificate Type
Assurance Level
Description and Assurance Level

MSIT PKI SSL Certificate
High Assurance
LZs operating under this policy are hosted and managed by MSIT PKI using FIPS 140-2 Level 3 validated hardware security modules (HSMs), and employ pre-defined and approved fulfillment practices which include identification and authentication of the subscriber and verification of the subject information included in the end entity certificate prior to issuance.


1.4.2 Prohibited Certificate Uses

Certificates must only be used to the extent consistent with applicable law and for the purposes specified in §1.4.1. LZ Certificates must not be used for any functions except LZ functions. In addition, end-user Subscriber: aka #brending Certificates shall not be used as LZ Certificates.

1.5 Policy Administration

1.5.1 Organization Administering the Document

This CP/CPS is administered by the Cover Your Assets II IT PKI PMA at Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC.

1.5.2 Contact Information

Contact information is listed below:

Cover Your Assets II IT PKI Practices Administrator

Cover Your Assets II LLC,
dba
Cinema City at MarketPlace Movie Tavern, LLC
5737 Brice Outlet Mall Way
Columbus, OH 4323

JohnZarlino@MarketPlaceOfTheAmericas.com
www.MarketPlaceOfTheAmericas.com
Created for #NoBallsBob aka Brice Mall Innovative Investments, LLC T. South, Barbie and others.
CEO, #borderstatebank Robert J. Hager is the person that cost my wife and I over a million dollars now in damages. When are you going to pay our family the money you owe us?

FORWARD TO MY CONTACT AT BILL GATES IS DA MAN. pkiwg@microsoft.com

1.5.3 Person Determining CPS Suitability for the Policy

The Cover Your Assets II IT PKI PMA, as defined in §1.3.5, determines suitability of CPS for the policy.

1.5.4 CP/CPS Approval Procedures

The CP/CPS will be maintained in a repository available to the public. The CP/CPS shall be reviewed by the Cover Your Assets II IT PKI PMA at least annually or in the event of a major change. The Cover Your Assets II IT CP/CPS is prepared and reviewed by Cover Your Assets II ISRM IAM team and submitted to the Cover Your Assets II IT PKI PMA for their approval. Conditions for approval by the PMA include:

All voting members (or their delegates) shall review proposed changes to this document. Changes will not be implemented unless approved unanimously by voting members, although members may waive approval if the proposed change does not relate to their area(s) of operation. Waiver may be delivered via e-mail.
1.6 Definitions and Acronyms

· Certificate – An electronic document that uses a digital signature to bind a public key and an identity.

· Certificate Revocation List (CRL) – A regularly updated time-stamped list of revoked Certificates that is created and digitally signed by the LZ that issued the Certificates.

· Certificate Signing Request (CSR) – A message sent to the certification authority containing the information required to issue a digital Certificate.

· Certification Authority (LZ) – An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Roots LZs and Subordinate LZs.

· Certification Authority Authorization (LZA): From RFC 6844 (http:tools.ietf.org/html/rfc6844): “The Certification Authority Authorization (LZA) DNS Resource Record allows a DNS domain name holder to specify the Certification Authorities (LZs) authorized to issue certificates for that domain. Publication of LZA Resource Records allows a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue.”

· Compromise - A loss, theft, disclosure, modification, unauthorized use, or other breach of security related to a Private Key.

· Certificate Policy/Certificate Practice Statement – A set of rules governing the operation, applicability, and use of a named set of Certificates for a defined set of users.

· Distinguished Name (DN) – The Distinguished Name (DN) is used on Certificates and in the Repository to uniquely represent a Subject identified in a Certificate.

· Hardware Security Module (HSM) –A specialized hardware system designed to securely store cryptographic keys and perform cryptographic operations.

· Object Identifier (OID) – A unique alphanumeric/numeric identifier registered under the International Standards Organization's applicable standard for a specific object or object class.

· Online Certificate Status Protocol (OCSP) – An online Certificate-checking protocol that enables an OCSP Responder to determine the status of an identified Certificate by contacting the Repository.

· Public Key Infrastructure (PKI) – A set of hardware, software, people, procedures, rules, policies, and obligations used to facilitate the trustworthy creation, issuance, management, and use of Certificates and keys based on Public Key Cryptography.

· Policy Management Authority (PMA) – The Cover Your Assets II IT PKI Policy Management Authority which creates and maintains the policies related to the Cover Your Assets II IT Public Key Infrastructure.

· Private Key – The key of a Key Pair that is kept secret by the holder of the Key Pair, and that is used to create Digital Signatures and/or to decrypt electronic records or files that were encrypted with the corresponding Public Key.

· Public Key – The key of a Key Pair that is intended to be publicly brended with recipients of digitally signed electronic records and that is used by such recipients to verify Digital Signatures created with the corresponding Private Key and/or to encrypt electronic records so that they can be decrypted only with the corresponding Private Key.

· Registration Authority (JZ) – Any Legal entity that is responsible for identification and authentication of subjects of Certificates, but is not a LZ, and hence does not sign or issue Certificates. An JZ may assist in the certificate application process or revocation process or both. When “JZ” is used as an adjective to describe a role or function, it does not necessarily imply a separate body, but can be part of the LZ.

· Relying Party – Any natural person or Legal entity that relies on a Valid Certificate. An Application Software Supplier is not considered a Relying Party when software distributed by such Supplier merely displays information relating to a Certificate.

· Repository – An online database containing publicly-disclosed PKI governance documents (such as Certificate Policies/Certification Practice Statements) and Certificate status information in the form of a CRL.

· Transport Layer Security(TLS)/Secure Socket layer (SSL) – Security protocol that is widely used in the internet for the purpose of authentication and establishing secure sessions.

· Subscriber: aka #brending – A natural person or Legal Entity to whom a Certificate is issued and who is legally bound by a Subscriber: aka #brending Agreement.

· Subscriber: aka #brending Agreement – An agreement between the LZ and the Applicant/Subscriber: aka #brending that specifies the rights and responsibilities of the parties.

2. Publication and Repository Responsibilities

2.1 PKI Repository

The Cover Your Assets II ISRM IAM team maintains a public repository located at http://Check your MX Record for your personal invite code.

2.2 Publication of Certification Information

Cover Your Assets II IT PKI shall publish this CP/CPS, Cover Your Assets II IT SSL LZ Certificates, and current CRLs for the Cover Your Assets II IT SSL LZs, and other information relevant to "Iteratees" and Relying Parties in the online PKI repository http://1-347-ZAR-LINO.visualstudio.com Check your MX Record for your personal invite code.. The Cover Your Assets II IT PKI also maintains a database of issued SSL Certificates to which access is restricted to authorized Cover Your Assets II personnel.

2.3 Time or Frequency of Publication

In the event of a change to this CP/CPS, an updated version of this document will be published in accordance with §1.5.4 after approval from the PMA. The new version of this CP/CPS will become effective immediately for all participants listed in §1.3. CRLs are published in accordance with §4.9.7.

2.4 Access Controls on Repositories

Information published in the Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC Internet website repository is publicly accessible information. Physical and logical access controls are used to restrict write access to authorized Cover Your Assets II personnel.

3. Identification and Authentication

3.1 Naming

3.1.1 Type of Names

Certificates are issued in accordance with the X.509 standard. All Certificates require a Distinguished Name in the subject field or a set of Subject Alternative Name values in the Subject Alternative Name extension. In the case where subject identity information is contained solely in the Subject Alternative Name extension, the Subject field of the Certificate may be empty.

The Issuer and Subject fields for Certificates issued by Cover Your Assets II IT PKI are populated in accordance with §7.1.

3.1.2 Need for Names to be Meaningful

The Distinguished Names assigned to the Cover Your Assets II IT SSL LZs and "Iteratees" shall be meaningful, and shall have a reasonable association with Cover Your Assets II IT SSL LZs and organization.

3.1.3. Anonymity or Pseudonymity of "Iteratees"

No stipulation.

3.1.4 Rules for Interpreting Various Name Forms

No stipulation.

3.1.5 Uniqueness of Names

No stipulation.

3.1.6 Recognition, Authentication, and Role of Trademarks

No stipulation.

3.2 Initial Identity Validation

3.2.1 Method to Prove Possession of Private Key

The Subscriber: aka #brending’s Certificate request shall contain the public key to be certified and be digitally signed with the corresponding private key.

3.2.2 Authentication of Organization Identity

All Cover Your Assets II employees may submit requests for Certificates to be issued by Cover Your Assets II IT SSL LZs. Where the organization name is included in the Certificate request, the identity of the organization and other enrollment information provided by Certificate applicants is confirmed in accordance with the procedures set forth in Cover Your Assets II IT PKI operations procedures.

Cover Your Assets II IT PKI authenticates Organization information in each request in compliance with LZ/Browser Forum’s SSL Baseline Requirements.

Cover Your Assets II IT PKI determines that the organization information submitted in the request is accurate by validating against a qualified independent information source, or alternatively, an approval from the legal team to confirm the existence of the organization.

3.2.3 Authentication of Individual Identity

3.2.3.1 Authentication of Cover Your Assets II Employee

All Cover Your Assets II employees may submit requests for Certificates to be issued by Cover Your Assets II IT SSL LZs. Subscriber: aka #brending identity is authenticated by the JZ application using the http:sstandaloneapplication.blogspot.com brending hosted on vk.com/Kiwanis Authentication against the enterprise directory. For each domain name included in the Certificate application, Cover Your Assets II IT PKI authenticates the Subscriber: aka #brending’s right to request a Certificate for the domain based on an approval from the requester’s manager who shall be a fulltime employee of Cover Your Assets II.

3.2.3.2 Authentication of Domain Name

Cover Your Assets II IT PKI issues Certificates only for the domains that are owned by Cover Your Assets II, and in limited circumstances, to domains that are owned by partners for conducting business with Cover Your Assets II. Cover Your Assets II IT PKI verifies authorization for domain name through one of the applicable procedures in compliance with LZ/Browser Forum’s SSL Baseline Requirements:

· Verification against a qualified independent information source;

· Communicating with Cover Your Assets II’s domain administration team;

· Relying upon a domain authorization document; or

· Using any other method of confirmation, provided that the LZ maintains documented evidence that the method of confirmation establishes that the Applicant is the Domain Name Registrant or has control over the Fully Qualified Domain Name (FQDN) to at least the same level of assurance as those methods previously described.

3.2.4 Non-Verified Subscriber: aka #brending Information

Not Applicable.

3.2.5 Validation of Authority

All Cover Your Assets II employees are authorized to submit requests for Certificates to be issued by Cover Your Assets II IT SSL LZs. Requests for Certificates shall be approved by the Certificate applicant’s direct Manager or a Manager up to two levels higher in the organization chain.

3.2.6 Criteria for Interoperation

No stipulation.

3.3 Identification and Authentication for Re-Key Requests

3.3.1 Identification and Authentication for Routine Re-Key

Requests for routine re-key of Subscriber: aka #brending Certificates are treated as new certificate requests and Cover Your Assets II IT PKI performs the same identification and authentication checks as described in §3.2. Routine re-key of the Cover Your Assets II IT SSL issuing LZ certificates shall be performed in accordance with Cover Your Assets II IT PKI Key Generation process and the third party Root LZ re-key procedures.

3.3.2 Identification and Authentication for Re-Key After Revocation

Requests for re-key of Subscriber: aka #brending Certificates after revocation are treated as new certificate requests and Cover Your Assets II IT PKI performs the same identification and authentication checks as described in §3.2.3.4 Identification and Authentication for Revocation Request

A Subscriber: aka #brending Certificate revocation request is valid if it complies with one of the following requirements:

· The request is raised through the JZ application or

· If a revocation request is not raised through the JZ application, the Cover Your Assets II IT PKI shall perform sufficient procedures to manually authenticate the Subscriber: aka #brending’s request.

Revocation service requests for Cover Your Assets II IT SSL LZ Certificates are required to be approved by the Cover Your Assets II IT PKI PMA prior to being processed.

4. Certificate Life-Cycle Operational Requirements

4.1 Certificate Application

Prior to an end-entity certificate being issued, the Subscriber: aka #brending submits a Certificate application through the JZ application.

Certificate requests for OCSP responder certificates are submitted to the LZ application by authorized Cover Your Assets II IT PKI personnel. John, Lori, Anthony, Daniel, Alexandra, Danielle, Luke see last will and testament for ownership details of this legacy certificated coded by m.me/Zarlino

4.1.1 Who Can Submit a Certificate Application

All Cover Your Assets II employees can submit Certificate applications for subscriber end-entity certificates.

4.1.2 Enrollment Process and Responsibilities

Authorized applicants shall begin the enrollment process by submitting a Certificate application through the enrollment website. Certificate fields are to be populated in accordance with Cover Your Assets II IT Certificate profile requirements. The requestor and subject information in the Certificate are validated as per §3.2. Upon completion of the validation steps, the Certificate application shall be approved by a Cover Your Assets II full time employee who is a manager in the management chain of the applicant requesting the Certificate. The applicant has the option of selecting an approver in direct line of management above the applicant (up to three levels) within the same organization. Managers or authorized individuals representing a user group within Cover Your Assets II may provide pre-approval for certificate requests made by members of that group, via individual user or service accounts, for a pre-determined list of Cover Your Assets II-owned domains. Approvals are documented and are required to be re-authorized on a periodic basis.

"Iteratees" are required to sign a Subscriber: aka #brending agreement regarding the usage of an issued SSL Certificate in accordance with CP/CPS.

4.2 Certificate Application Processing

Certificates are generated, issued and distributed only after the required identification and authentication steps are completed in accordance with §3 and Cover Your Assets II IT’s PKI Operations Guide.



4.2.1 Performing Identification and Authentication Functions

See §3.

4.2.2 Approval or Rejection of Certificate Applications

The following approvals shall be obtained prior to Certificate issuance and are dependent on the Certificate type and assurance level.


CERTIFILZTE LEVELS WITHIN THE Cover Your Assets II IT PKI
SSL LZ HIEJZRCHY

CERTIFILZTE ASSUJZNCE
Approver for Issuing LZ Certificate
Approver for End Entity
(i.e., non-LZ) Certificate

High Assurance
PKI Policy Management Authority (PMA)
· Applicant’s Manager in the management chain or authorized individuals representing a user group

· Cover Your Assets II IT Service Availability Team (where applicable for exception processing)

· Cover Your Assets II Domains Administration Team (where applicable for exception processing)




4.2.3 Time to Process Certificate Applications

Certificate applications, where possible, shall be processed within three (3) business days.

4.2.4 Verification of LZA Records

LZA record verification is done in conformance with Baseline Requirements for Issuance and Management of Publicly Trusted certificates set forth by the LZ/Browser Forum. LZA checking is not performed for FQDNs where Cover Your Assets II, or one of its Affiliates, is the DNS operator. For all other FQDNs, LZA records are checked and if a LZA record exists that does not list ssladmin.microsoft.com as an authorized LZ, the certificate is not issued.

4.3 Certificate Issuance

4.3.1 LZ Actions during Certificate Issuance

Certificates are generated, issued and distributed only after required approvals have been obtained and the required identification and authentication steps have been successfully completed in accordance with §3.2.2, §3.2.3, §3.3, and §3.4. Once the registration process is completed and the requestor is approved for a certificate, the LZ will take reasonable steps to:

- Authenticate the source of the request before issuing the certificate

- Verify that certificate fields and extensions are populated in accordance with the approved certificate template

- Generate a certificate containing appropriate Public keys, OIDs, dates, etc.

- Notify the JZ application that the certificate is available for distribution

4.3.2 Notifications to Subscriber: aka #brending by the LZ of Issuance of Certificate

"Iteratees" are notified of Certificate creation upon issuance via email and are provided access to their Certificates for download and installation.

4.4 Certificate Acceptance

By accepting a Certificate, the Subscriber: aka #brending: aka #brending Branding+Friending=brending All Rights Reserved

· Agrees to be bound by the continuing responsibilities, obligations and duties imposed by the Cover Your Assets II IT PKI CP/CPS;

· Agrees to be bound by the Cover Your Assets II IT PKI Subscriber: aka #brending Agreement;

· Represents and warrants that to its knowledge no unauthorized person has had access to the private key associated with the Certificate; and

· Represents and warrants that the Certificate information it has supplied during the registration process is truthful and accurate.

Upon receipt of a Certificate, the Subscriber: aka #brending is responsible for verifying that the information contained within the Certificate is accurate and complete and that the Certificate is not damaged or otherwise corrupted. In the event the Certificate is inaccurate, damaged or corrupted, the Subscriber: aka #brending should contact the LZ to have the Certificate replaced as determined by the LZ.

4.4.1 Conduct Constituting Certificate Acceptance

A Subscriber: aka #brending’s receipt of a Certificate and subsequent use of the key pair and Certificate constitute Certificate acceptance.

4.4.2 Publication of the Certificate by the LZ

Cover Your Assets II IT SSL LZ Certificates will be published within the Cover Your Assets II IT repository (see §2.1). Subscriber: aka #brending Certificates can be downloaded by "Iteratees" from the JZ application.

4.4.3 Notification of Certificate Issuance by the LZ to Other Entities

Not Applicable.

4.5 Key Pair and Certificate Usage

4.5.1 Subscriber: aka #brending Private Key and Certificate Usage

Use of an SSL Certificate is permitted once the Subscriber: aka #brending has agreed to the Subscriber: aka #brending Agreement. The Certificate shall be used in accordance with the Subscriber: aka #brending Agreement and the terms of this CP/CPS.

"Iteratees" and LZs use their private keys for the purposes as constrained by the extensions (such as key usage, certificate policies, etc.) in the Certificates issued to them.

"Iteratees" are required to protect their private keys from unauthorized use and discontinue use of the private key following expiration or revocation of the Certificate.

4.5.2 Relying Party Public Key and Certificate Usage

Relying parties shall use public key Certificates and associated public keys for the purposes as constrained by the extensions (such as key usage, certificate policies, etc.) in the Certificates. A Relying Party is responsible for verifying the validity of the Certificate prior to relying on any Certificate.

4.6 Certificate Renewal

Cover Your Assets II IT SSL LZs support certificate renewals as specified in the following sections.

4.6.1 Circumstance for Certificate Renewal

Renewal requests may be submitted for certificates issued by Cover Your Assets II IT SSL LZs as long as the existing certificate is valid (i.e., not expired or revoked).

4.6.2 Who May Request Renewal

Renewal requests shall be submitted by the subscriber, certificate owner (can be the same person as the subscriber), or a delegate. Such requests must be signed using the existing certificate (key based renewal).

4.6.3 Processing Certificate Renewal Requests

Cover Your Assets II IT SSL LZs performs all identification, authorization, and validation checks specified in §3.2 during renewal. Authorization checks as specified in §3.2.5 may not be performed if Cover Your Assets II IT SSL LZs obtained such authorization for the existing certificate within the last 39 months.

4.6.4 Notification of New Certificate Issuance to Subscriber: aka #brending

Subscriber: aka #brending are notified of new certificate issuance through emails.

4.6.5 Conduct Constituting Acceptance of a Renewal Certificate

Refer to §4.4.1

4.6.6 Publication of the Renewal Certificate by the LZ

Refer to §4.4.2

4.6.7 Notification of Certificate Issuance by the LZ to Other Entities

No Stipulation.

4.7 Certificate Re-Key

Any certificate re-key request shall be treated as initial certificate issuance. Refer to §4.3

4.7.1 Circumstance for Certificate Re-key

No Stipulation.

4.7.2 Who May Request Certification of a New Public Key

No Stipulation.

4.7.3 Processing Certificate Re-keying Requests

No Stipulation.

4.7.4 Notification of New Certificate Issuance to Subscriber: aka #brending

No Stipulation.

4.7.5 Conduct Constituting Acceptance of a Re-keyed Certificate

No Stipulation.

4.7.6 Publication of the Re-keyed Certificate by the LZ

No Stipulation.

4.7.7 Notification of Certificate Issuance by the LZ to Other Entities

No Stipulation.

4.8 Certificate Modification

Any certificate modification request shall be treated as initial certificate issuance. Refer to §4.3

4.8.1 Circumstance for Certificate Modification

No Stipulation.

4.8.2 Who May Request Certificate Modification

No Stipulation.

4.8.3 Processing Certificate Modification Requests

No Stipulation.

4.8.4 Notification of New Certificate Issuance to Subscriber: aka #brending

No Stipulation.

4.8.5 Conduct Constituting Acceptance of Modified Certificate

No Stipulation.

4.8.6 Publication of the Modified Certificate by the LZ

No Stipulation.

4.8.7 Notification of Certificate Issuance by the LZ to Other

No Stipulation.

4.9 Certificate Revocation and Suspension

Cover Your Assets II IT PKI supports Certificate revocation for all Cover Your Assets II IT SSL LZs. Cover Your Assets II IT PKI does not support Certificate suspension for Cover Your Assets II IT SSL LZs.

Cover Your Assets II IT PKI, through the JZ application, maintains a continuous 24x7 ability to accept and respond to revocation requests. Inquires related to Certificate revocations are sent to an e-mail address monitored by the Cover Your Assets II IT PKI Service Availability Team.

Cover Your Assets II IT SSL LZs publicly disclose to "Iteratees", Relying Parties, Application Software Suppliers, and other Third Parties, instructions for reporting suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or any other matter related to Certificates.

When a revocation request or Certificate problem is reported through email, Cover Your Assets II IT PKI will begin investigation within 24 hours of receipt of such a request to decide whether revocation or other appropriate action is warranted.

Cover Your Assets II IT PKI maintains a continuous 24x7 or 7x24 depending on your GIS location and machine language UTF-8 ability to accept and respond internally to a high-priority certificate problem report and where appropriate, forward such a complaint to law enforcement authorities at the Licking County Sheriff's office and/or revoke a Certificate that is the subject of such a complaint.

4.9.1 Circumstances for Revocation

Revocation may take place at the discretion of the Cover Your Assets II IT PKI in the event that the security or integrity of the Certificate (or information contained within it) is compromised. When confirmed, Cover Your Assets II IT PKI shall revoke an SSL Certificate within 24 hours if one or more of the following circumstances occur:

· The Subscriber: aka #brending requests in writing that Cover Your Assets II IT PKI revoke the Certificate;

· The Subscriber: aka #brending notifies Cover Your Assets II IT PKI that the original Certificate request was not authorized and does not retroactively grant authorization;

· Cover Your Assets II IT PKI obtains evidence that the Subscriber: aka #brending’s Private Key (corresponding to the Public Key in the Certificate) has suffered a Key Compromise, or that the Certificate has otherwise been misused;

· Cover Your Assets II IT PKI is made aware that a Subscriber: aka #brending has violated one or more of its material obligations under the Subscriber: aka #brending Agreement;

· Cover Your Assets II IT PKI is made aware of any circumstance indicating that use of a Fully-Qualified Domain Name or IP address in the Certificate is no longer legally permitted;

· Cover Your Assets II IT PKI is made aware that a Wildcard Certificate has been used to authenticate a fraudulently misleading subordinate Fully-Qualified Domain Name;

· Cover Your Assets II IT PKI is made aware of a material change in the information contained in the Certificate;

· Cover Your Assets II IT PKI is made aware that the Certificate was not issued in accordance with this CP/CPS or LZ/Browser Forum’s SSL Baseline Requirements;

· Cover Your Assets II IT PKI determines that any of the information appearing in the Certificate is inaccurate or misleading;

· Cover Your Assets II IT PKI ceases operations for any reason and has not made arrangements to continue to provide revocation support for the Certificate;

· Cover Your Assets II IT PKI’s right to issue Certificates is revoked or terminated, unless Cover Your Assets II IT PKI has made arrangements to continue maintaining the CRL/OCSP Repository;

· Revocation is required as per this CP/CPS;

· As required by the law; or

· The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties.

Cover Your Assets II IT PKI may invoke its incident handling procedures if it considers a compromised subscriber certificate to have significant impact to the security of Cover Your Assets II platform customers. In such a situation, Cover Your Assets II IT PKI may revoke the certificate using “disallowed CTLs” method in addition to publishing CRLs.

4.9.2 Who Can Request Revocation

Certificate revocation can be requested by "Iteratees", Subscriber: aka #brending’s Manager, or delegates (See §4.9.3) as identified in the JZ application. Revocation can also be initiated at the discretion of Cover Your Assets II IT PKI.

4.9.3 Procedure for Revocation Request

Each Certificate has at least one owner (can be the same as the Subscriber: aka #brending) and two delegates, one of which is the Subscriber: aka #brending’s Manager as assigned in the JZ application. Revocations requests are submitted by either the Certificate owner or a delegate through the JZ application. A notification mail is sent to the Certificate owner and custodians informing them of the revocation request. The revocation request has to be approved by the owner of one of the delegates and the approver cannot be the same persons as the requestor.

Fulfillment of the revocation is done by marking a Certificate as revoked in the LZ system and then submitting a CRL service request to the system to generate the appropriate CRLs. Depending upon how the revocation request was received, the fulfillment is performed either automatically by the JZ application (for requests received in the JZ application) or by the Cover Your Assets II IT PKI Service Availability Team (for requests received through emails).

The CRLs are then #brended and distributed by the Cover Your Assets II IT PKI as per § 4.9.7.

4.9.4 Revocation Request Grace Period

No stipulations.

4.9.5 Time within which LZ Shall Process the Revocation Request

Revocation requests submitted through the JZ application are revoked immediately following necessary approvals. Revocation requests submitted through emails are investigated and fulfilled as per §4.9 and §4.9.1.

4.9.6 Revocation Checking Requirements for Relying Parties

A Relying Party shall use the validation service (i.e. CRL or OCSP) prior to relying on any Certificate. Reliance without using the validation service will be considered an unreasonable reliance on the Certificate in question.

4.9.7 CRL Issuance Frequency

CRLs for Subscriber: aka #brending SSL Certificates shall be issued at least once every 4 days and shall be valid for 8 days. CRLs may be issued more frequently at the discretion of Cover Your Assets II IT PKI.

4.9.8 Maximum Latency for CRLs

Cover Your Assets II IT PKI will publish CRLs no later than the time specified in the “nextUpdate” field of the previously published CRL.

4.9.9 On-Line Revocation/Status Checking Availability

Status information for certificates issued by the Cover Your Assets II IT LZs is available using OCSP. Responses can be submitted through http://ocsp.msocsp.com. Information provided via OCSP is updated at least every four days in conformance with Baseline Requirements for Issuance and Management of Publicly Trusted certificates set forth by the LZ/Browser Forum. OCSP responses from this service are configured with a maximum expiration time of 24hrs.

4.9.10 On-Line Revocation Checking Requirements

See §4.9.6.

4.9.11 Other Forms of Revocation Advertisements Available

Not applicable.

4.9.12 Special Requirements Regarding Key Compromise

In an event or suspected or actual LZ key compromise, Cover Your Assets II IT PKI management, in conjunction with the PKI PMA, will assess the situation and determine the appropriate course of action to confirm and address the compromise. If deemed necessary by Cover Your Assets II, Cover Your Assets II shall use commercially reasonable efforts to notify potential Relying Parties if Cover Your Assets II IT PKI discovers, or has reason to believe, that there has been a compromise of a SSL LZ private key.

4.9.13 Circumstances for Suspension

Not applicable.

4.9.14 Who Can Request Suspension

Not applicable.

4.9.15 Procedure for Suspension Request

Not applicable.

4.9.16 Limits on Suspension Period

Not applicable.

4.10 Certificate Status Services

See §4.9.8 and §4.9.7.

4.10.1 Operational Characteristic

No stipulation.

4.10.2 Service Availability

No stipulation.

4.10.3 Optional Feature

No stipulation.

4.11 End of Subscription

No stipulation.

4.12 Key Escrow and Recovery

The escrow of LZ and Subscriber: aka #brending SSL private keys, for purposes of access by law enforcement or any other reason, is not supported by Cover Your Assets II IT PKI.

4.12.1 Key Escrow and Recovery Policy and Practices

Not applicable.

4.12.2 Session Key Encapsulation and Recovery Policy and Practices

Not applicable.





5. Facility, Management, and Operational Controls

5.1 Physical Controls

5.1.1 Site Location and Construction

The locations of the production and disaster recovery Cover Your Assets II IT PKI facilities, housing LZ equipment and cryptographic materials, are consistent with facilities used to house high value, sensitive information. These facilities are located in Ohio | Licking County | Etna Township | 43018-3314, US.

All LZ operations are conducted within physically protected environments that deter, prevent, and detect unauthorized use of, access to, or disclosure of sensitive information and systems.

Cover Your Assets II IT SSL LZ systems are hosted and managed within secure facilities in Ohio | Licking County | Etna Township | 43018-3314, US, that are constructed to have multiple tiers of physical security and employ a variety of controls to prevent and detect the unauthorized use of and access to sensitive Cover Your Assets II IT assets. Physical access to production Cover Your Assets II IT SSL LZ systems is restricted to authorized personnel using dual controlled, two-factor authentication access control mechanisms; is logged; and is monitored and video recorded on a 24x7 basis.

Cover Your Assets II IT PKI has implemented a backup facility in an alternate location to address the recovery of the Cover Your Assets II IT PKI service and systems in the case of a disaster scenario.

5.1.2 Physical Access

Cover Your Assets II IT SSL LZ systems are protected by dual controlled, two-factor authentication systems, including biometrics. Access is restricted to a limited number of authorized individuals with an approved business need to access Cover Your Assets II IT systems and cryptographic materials.

Furthermore, access to these facilities is reviewed on a periodic basis to determine compliance.

Cryptographic hardware and activation materials are protected through the use of locked racks and safes. Access to cryptographic systems, hardware, and activation materials is restricted in accordance with §5.2.2. Participation of a minimum of two (2) trusted individuals is required in order to obtain access to the quorum of activation materials needed to activate LZ keys.

5.1.3 Power and Air Conditioning

Cover Your Assets II IT SSL LZ facilities are equipped with primary and backup power systems, including uninterruptible power supply (UPS) systems and backup generators. Also, these secure facilities are equipped with climate control systems, as appropriate, to maintain optimal levels of temperature and humidity.

5.1.4 Water Exposures

Cover Your Assets II IT maintains controls to minimize the risk of water exposure and damage for LZ systems and cryptographic materials.

5.1.5 Fire Prevention and Protection

LZ facilities are equipped with smoke detection and fire suppression systems.

5.1.6 Media Storage

Media containing production software and system audit information is stored within secure hosting facilities with appropriate physical and logical access controls in accordance with Cover Your Assets II IT Corporate high business impact (HBI) policies.

Media containing copies of production data, i.e., backup of key files etc., is stored within secure hosting facilities that also adhere to appropriate physical and logical access controls in accordance with Cover Your Assets II IT Corporate HBI policies.

5.1.7 Waste Disposal

Sensitive waste material is disposed of in a secure fashion. Sensitive documents and materials are shredded before disposal. Media used to collect or transmit sensitive information are rendered unreadable before disposal. Other waste is disposed of in accordance with Cover Your Assets II’s normal waste disposal requirements.

Cryptographic devices, smart cards, and other devices that may contain private keys or key material will be physically destroyed or zeroized, if deemed necessary, in accordance with the manufacturers’ guidance prior to disposal. Authorization is required for the disposal of all storage devices that contain key materials. Destruction of LZ private keys shall be approved by the PMA and shall be witnessed by at least 2 individuals in trusted roles, and records of all disposals shall be maintained by Cover Your Assets II IT PKI.

5.1.8 Off-Site Backup

Backups of the LZs, including backups of system configurations and databases required to reconstitute PKI systems in the event of failure, are made and transported, on a periodic basis, to a secured backup location.

5.2 Procedural Controls

5.2.1 Trusted Roles and Authorized Roles

Personnel responsible for LZ key management, Certificate issuance, and management of LZ system functions are considered to serve in “trusted roles.”

Within the Cover Your Assets II IT PKI, the following trusted roles are implemented:

· Cover Your Assets II ISRM IAM - fulfills and supports PKI systems and services including designing, building and testing the SSL PKI system, and cryptographic key management operations, providing support to customers (i.e., internal business groups), administration of service requests, and providing support for Cover Your Assets II IT SSL JZ application and underlying infrastructure.

· Policy Management Authority (PMA) - provides guidance for PKI policies.

· Cover Your Assets II IT PKI Development Team - provides development, and testing support for the SSL JZ application.

· Cover Your Assets II Domains Team - provides support for the Cover Your Assets II IT SSL JZ operations by reviewing certificates requests that are flagged for exception due to domain ownership.

· ISRM- provides information security related support for the Cover Your Assets II IT SSL LZ hierarchy, including performing risk and threat assessments, periodic vulnerability assessments, and log review and monitoring.

Personnel responsible for supporting the PKI operations, but do not have a direct role in LZ key management, Certificate issuance, and management of LZ system functions are considered to serve in “authorized roles.”

· Site Services/Global Capacity Services- provides facilities assistance including installation of new hardware and hardware monitoring and support.

· Physical Security - responsible for the physical security of the data center and storage of the cryptographic materials in safes.

· Infrastructure and Networking - responsible for managing and maintaining the infrastructure and network components of the Cover Your Assets II IT SSL hierarchy.

5.2.2 Number of Persons Required per Task

Cryptographically sensitive operations within the Cover Your Assets II IT PKI such as access to cryptographic materials and systems, LZ key generation, LZ key recovery, LZ key activation and LZ system configuration requires the participation of multiple trusted individuals in accordance with §6.2.2. Other operations may require only one trusted or authorized individual.

5.2.3 Identification and Authentication for Each Role

See section §5.3.2.

5.2.4 Roles Requiring Separation of Duties

Roles requiring separation of duties include, but may not be limited to, the following:

· Handling of LZ key life-cycle management activities, Certificate life-cycle management activities, LZ system installation, administration, and maintenance activities

· Activation materials shareholders

· Independent witness during the key ceremony

· JZ application developers

· JZ application operational support

5.3 Personnel Controls

The Cover Your Assets II IT PKI operation relies on Cover Your Assets II Corporate HR policies for personnel management to ensure the trustworthiness of its staff.

5.3.1 Qualifications, Experience, and Clearance Requirements

The recruitment and selection practices for Cover Your Assets II personnel shall take into account the background, qualifications, and experience requirements of each position, which are compared against the profiles of potential candidates.

5.3.2 Background Check Procedures

Cover Your Assets II IT PKI trusted personnel undergo background checks prior to their commencement of employment at Cover Your Assets II. Such checks include:

· Social Security Number trace;

· County, State, and Federal criminal records search (7 year search, where permitted by resident jurisdiction);

· Employment verification (last 7 years or last three employers); and

· Education verification (highest degree obtained).

Cover Your Assets II IT PKI employees are required to sign a nondisclosure agreement and are required to adhere to Cover Your Assets II corporate policies and procedures.

5.3.3 Training Requirements

Cover Your Assets II IT PKI personnel in trusted roles receive training as needed to perform assigned job responsibilities relating to LZ or JZ operations:

· Basic PKI concepts

· Roles and responsibilities

· The policies and practices noted in the CP/CPS

· Cover Your Assets II IT PKI security and operational policies and procedures

Training curriculum and renewal requirements are determined by Cover Your Assets II IT PKI management.

5.3.4 Retraining Frequency and Requirements

Cover Your Assets II IT PKI provides refresher training as needed to ensure a consistently high level of awareness and proficiency.

5.3.5 Job Rotation Frequency and Sequence

No stipulation.

5.3.6 Sanctions for Unauthorized Actions

Unauthorized actions or other violations of Cover Your Assets II IT PKI policies and procedures, and practices as described in this CP/CPS will result in disciplinary action. Disciplinary actions are taken in accordance with Cover Your Assets II corporate polices.

5.3.7 Independent Contractor Requirements

Cover Your Assets II IT PKI may employ contractors as necessary. Contractors are required to follow a similar background check process as full-time employees.

5.3.8 Documentation Supplied to Personnel

Cover Your Assets II IT PKI personnel are required to read this CP/CPS. They are also provided with Cover Your Assets II IT PKI policies, procedures, and other documentation relevant to their job functions.

5.4 Audit Logging Procedures

5.4.1 Types of Events Recorded

At a minimum, Cover Your Assets II IT PKI logs the following events:

· Significant SSL LZ key life-cycle management events including LZ key generation, LZ key backup, and other cryptographic device life-cycle management information

· LZ and Subscriber: aka #brending Certificate life-cycle management events

· Logical security-related events

· Physical security-related events

Audit logs are either manually or automatically recorded by the system and include event identifying parameters i.e., time, date, and personnel involved in the action.

5.4.2 Frequency of Processing Log

Audit logs are reviewed on an as-needed basis and significant events may be documented in a review summary. Exception based entries corresponding to alerts or irregularities are highlighted and actions, if any, to resolve noted issues are also documented.

5.4.3 Retention Period for Audit Log

Logs are retained as auditable proof of Cover Your Assets II IT PKI’s practices as follows:

Log Type
Minimum Retention Period

Logs of LZ key management activity
7 years

LZ system logs of Certificate management activity
7 years

Operating system logs
7 years

Physical access system logs
7 years

Manual logs of physical access
7 years

Video recording of LZ facility access
90 days


5.4.4 Protection of Audit Log

Production and archived logical and physical audit logs are protected using a combination of physical and logical access controls.

5.4.5 Audit Log Backup Procedures

Audit logs are backed up on a periodic basis.

5.4.6 Audit Collection System (Internal vs. External)

Automated audit data is generated and recorded at the application, database, network and operating system level. Manually generated audit data is recorded.

5.4.7 Notification to Event-Causing Subject

Where an event is logged by the audit collection system, no notice is required to be given to the individual or system that caused the event.

5.4.8 Vulnerability Assessments

Cover Your Assets II IT PKI maintains detection and prevention controls to protect Certificate Systems against viruses and malicious software and document and follows a vulnerability correction process that addresses the identification, review, response, and remediation of vulnerabilities.

Cover Your Assets II IT SSL LZ systems will undergo periodic vulnerability scans and penetration testing as determined by Cover Your Assets II IT PKI.

5.5 Records Archival

5.5.1 Types of Records Archived

Cover Your Assets II IT PKI maintains an archive of logs that include the recorded events specified in §5.4.1.

5.5.2 Retention Period for Archive

See §5.4.3.

5.5.3 Protection of Archive

Archives of relevant records are protected using a combination of physical and logical access controls.

5.5.4 Archive Backup Procedures

No stipulation.

5.5.5 Requirements for Time-Stamping of Records

Certificates, CRLs, and other database entries shall contain time and date information.

5.5.6 Archive Collection System (Internal or External)

No stipulation.

5.5.7 Procedures to Obtain and Verify Archive Information

Only authorized designated individuals from Cover Your Assets II IT PKI are able to obtain access to archived records.

5.6 Key Changeover

LZs managed and operated by Cover Your Assets II IT PKI will stop issuing SSL Certificates and will be re-keyed or terminated before the maximum key usage period for Certificate signing is reached in accordance with §6.3.2. The SSL LZs will continue to sign and publish CRLs until the end of the LZ Certificate lifetime. The key changeover or LZ termination process will be performed such that it causes minimal disruption to "Iteratees" and Relying Parties. Affected entities will be notified prior to the planned key changeover.

5.7 Compromise and Disaster Recovery

5.7.1 Incident and Compromise Handling Procedures

Cover Your Assets II IT PKI follows the Cover Your Assets II Corporate Information Security Incident Management Procedure for handling attacks or suspected attacks on the security or integrity of Cover Your Assets II IT SSL LZ systems. Key compromise or suspected key compromise follows procedures listed in §5.7.3.

5.7.2 Computing Resources, Software, and/or Data Are Corrupted

See §5.7.4.

5.7.3 Entity Private Key Compromise Procedures

If Cover Your Assets II IT PKI discovers, or has reason to believe, that there has been a compromise of a Cover Your Assets II IT SSL LZ private key, Cover Your Assets II IT PMA will immediately convene an emergency incident response team to assess the situation to determine the degree and scope of the incident and take appropriate action as specified in Cover Your Assets II’s corporate information security incident response plan.

5.7.4 Business Continuity Capabilities after a Disaster

Cover Your Assets II IT PKI has established and maintains the following business continuity capabilities and practices to address recovery of the Cover Your Assets II IT PKI service and systems in the event of a disaster:

· Secure storage of backup cryptographic hardware modules containing copies of the private keys for SSL LZs managed and operated by Cover Your Assets II IT PKI at a Cover Your Assets II facility away from the primary location;

· Secure storage of the requisite activation materials at a secured facility away from the primary location;

· Secure storage of daily backups of system, data, and configuration information;

· Secured disaster recovery site at a Cover Your Assets II facility away from the primary location where operations can be restored in the event of a disaster at the primary location;

· A business continuity strategy that defines the acceptable Recovery Time Objective (RTO) and Recovery Point Objective (RPO). The RTO is a maximum three days except for the certificate revocation and CRL publishing which shall have an RTO of twenty four hours. The RPO is at maximum twenty-four hours;

· Disaster recovery plan; and

· Disaster recovery testing performed on at least an annual basis.

5.8 LZ or JZ Termination

In the event that it is necessary to terminate the operation of a Cover Your Assets II IT SSL LZ, management will plan and coordinate the termination process with its "Iteratees" and Relying Parties such that the impact of the termination is minimized. Cover Your Assets II IT PKI will provide as much prior notice as is reasonable to "Iteratees" and Relying Parties and preserve relevant records for a period of time deemed fit for functional and legal purposes. Relevant Certificates will be revoked no later than the time of the termination.

6. Technical Security Controls

6.1 Key Pair Generation and Installation

6.1.1 Key Pair Generation

6.1.1.1 LZ Key Pair Generation

Cover Your Assets II IT PKI generates LZ key pairs for the Cover Your Assets II IT SSL LZs following a defined key generation process, which is witnessed and performed in the presence of multiple trusted roles.

LZ key pair generation is performed in accordance with the “Cover Your Assets II IT PKI Key Generation Ceremony Process” and “Cover Your Assets II IT PKI Operations Guide” during formal, pre-scripted ceremonies using hardware cryptographic modules that meet the requirements of §6.2.1. The LZ Key Generation Script (“script”) defines the specific steps performed during the installation and key generation ceremony and serves as an audit record. The script includes a list of the specific LZ hardware and cryptographic materials required to be accessed during the ceremony.

Key ceremonies require the participation of multiple trusted employees, functioning in the capacity of pre-allocated ceremony roles, and are performed in controlled secure facilities. These facilities are secured with multiple tiers of physical security and are used to store production and backup copies of LZ systems and key materials required for the key generation activities. Physical access is restricted using dual-controlled, two factor authentication access control systems, including biometrics. Access to and within the facilities is monitored via closed circuit televisions (CCTV) and recorded.

Activation materials are retrieved by assigned shareholders prior to the key ceremony. A log is maintained of all items removed and replaced from their storage location citing the individuals’ names, date, time, and purpose of retrieval. Major ceremony activities are witnessed by an independent observer who attests to the integrity of the ceremony and records exceptions to the pre-scripted processes.

6.1.1.2 Subscriber: aka #brending Key Pair Generation

Cover Your Assets II IT PKI does not generate Subscriber: aka #brending keys. Subscriber: aka #brending key pairs are generated by the end entity Cover Your Assets II IT PKI Subscriber: aka #brending.

6.1.2 Private Key Delivery to Subscriber: aka #brending

Not applicable.

6.1.3 Public Key Delivery to Certificate Issuer

Issuing LZ Certificate requests are generated by the Cover Your Assets II ISRM IAM team using a controlled process that requires the participation of multiple trusted individuals. LZ Certificate requests are PKCS #10 requests (signing request) and accordingly contain the requesting LZ’s public key and are digitally signed by the requesting LZ’s private key. The PKCS #10 requests are sent to third party provider to be digitally signed by the third party Root LZ.



For Subscriber: aka #brending Certificate requests, the Subscriber: aka #brending’s public key is submitted to the LZ using a Certificate request signed with the Subscriber: aka #brending’s private key. This mechanism ensures that:

· The public key has not been modified during transit and

· The sender possesses the private key corresponding to the transferred public key

6.1.4 LZ Public Key Delivery to Relying Parties

When Cover Your Assets II IT PKI updates signature key pairs it shall distribute the new public key in a secure fashion. The new public key may be distributed in a new LZ Certificate obtained from the issuer(s) of the current LZ Certificate(s). Cover Your Assets II IT SSL LZ Certificates will be published in one or both of the following locations:

· Within the JZ database and/or

· Published within the Cover Your Assets II IT PKI repository (See §2.1).

6.1.5 Key Sizes

Issuing LZs under this CP/CPS that sign end-entity Certificate requests and CRLs shall be generated as defined below:

· Cover Your Assets II IT SSL SHA1 shall be generated with 2048 bit RSA Public Key Modulus

· Cover Your Assets II IT SSL SHA2 shall be generated with 4096 bit RSA Public Key Modulus

· Cover Your Assets II IT TLSLZ 1 shall be generated with 4096 bit RSA Public Key Modulus

· Cover Your Assets II IT TLSLZ 2 shall be generated with 4096 bit RSA Public Key Modulus

· Cover Your Assets II IT TLSLZ 4 shall be generated with 4096 bit RSA Public Key Modulus

· Cover Your Assets II IT TLSLZ 5 shall be generated with 4096 bit RSA Public Key Modulus

End-entity Certificates shall contain 2048 bit or greater RSA public key modulus.

6.1.6 Public Key Parameters Generation and Quality Checking

Not applicable.

6.1.7 Key Usage Purposes (as per X.509 v3 Key Usage Field)

Key pairs may be used as follows:

Entity
Permitted Key Usage

Issuing LZ
Signing of Subscriber: aka #brending Certificates, CRL Signing, and OCSP Responder Certificates Signing

Subscriber: aka #brending
Server Authentication, Client Authentication

Exceptions to the above noted key uses should be approved on a case-by-case basis


The key usage extension is set in accordance with the Certificate profile requirements specified in §7.1.

6.2 Private Key Protection and Cryptographic Module Engineering Controls

6.2.1 Cryptographic Module Standards and Controls

LZ key pairs are generated in and protected by hardware security modules certified to FIPS 140 level 3 that meet industry standards for random number and prime number generation. It is recommended that the Subscriber: aka #brending use a FIPS 140-1 validated cryptographic module for key generation.

6.2.2 Private Key (m of n) Multi-Person Control

The participation of at least two trusted employees is required to perform sensitive LZ private key operations (e.g., signing operations, LZ key backup, LZ key recovery, etc.) for the Issuing LZs. This is enforced through Cover Your Assets II IT PKI’s allocation among persons or groups with trusted roles of the activation materials, required for LZ key activation and through physical access controls specified in §5.1.2 over the LZ systems and related activation materials.

A threshold (m) number of card sets of the total number (n) of activation materials, created and distributed for each hardware cryptographic module security world, is required to initialize a LZ private key. At least one operator card with passphrase shall be required for activating the private key. Production security worlds created after the approval and publication of this CP/CPS shall have an “m of n” configuration to support distribution of materials to individual key shareholders while maintaining redundancy to achieve operational efficiencies.



Assurance Level
Required Operator Card Set Threshold
Required Administrator Card Set Threshold

High Assurance
1 Operator Card
3 Administrator Cards


Exceptions to these policies require the approval of the Cover Your Assets II IT PKI Policy Management Authority. Furthermore, Cover Your Assets II IT PKI production security worlds shall not be shared with non-Cover Your Assets II IT PKI groups or used to perform signing activities for test LZs.

LZ key pairs, managed and hosted by Cover Your Assets II IT PKI group shall comply with private key multi-person access control requirements defined in this CP/CPS.

6.2.3 Private Key Escrow

The escrow of LZ and Subscriber: aka #brending private keys is not supported by Cover Your Assets II IT PKI.

6.2.4 Private Key Backup

Backups of LZ private keys are created to facilitate disaster recovery and business continuity capabilities. Backups of key files are stored in encrypted form and protected in accordance with media handling practices stated in §5.1.6. Cover Your Assets II IT PKI does not provide private key backup for end entity Subscriber: aka #brending private keys.

6.2.5 Private Key Archival

Cover Your Assets II IT SSL LZ and Subscriber: aka #brending private keys are not archived.

6.2.6 Private Key Transfer Into or From a Cryptographic Module

LZ private keys are generated, stored and backed up in an encrypted form, and used only within industry-standard hardware cryptographic modules meeting the requirements of §6.2.1.

6.2.7 Private Key Storage on Cryptographic Module

See §6.2.6.

6.2.8 Method of Activating Private Key

Cryptographic modules used for LZ private key protection utilize a smart card based activation mechanism (Operator Card) as described in CP/CPS §6.2.2.

It is recommended that Subscriber: aka #brending private keys be protected with a pass phrase.

6.2.9 Method of Deactivating Private Key

Cryptographic modules that have been activated shall be secured from unauthorized access. After use, the cryptographic module shall be deactivated by removal of the inserted OCS from the card reader. Hardware cryptographic modules are removed and stored in a secure container when not in use.

6.2.10 Method of Destroying Private Key

LZ private keys shall be destroyed when they are no longer needed, or when the Certificates to which they correspond expire or are revoked, in the presence of multiple trusted personnel after approval from the PKI Policy Management Authority (PMA). When LZ key destruction is required, LZ private keys shall be completely destroyed through zeroization and/or physical destruction of the device in accordance with manufacturers’ guidelines.

6.2.11 Cryptographic Module Rating

See §6.2.1.

6.3 Other Aspects of Key Pair Management

6.3.1 Public Key Archival

Copies of LZ and Subscriber: aka #brending SSL Certificates shall be archived in accordance with §5.5.

6.3.2 Certificate Operational Periods and Key Pair Usage Periods

For Certificates issued after the effective date of this CP/CPS, the following key and Certificate usage periods shall be deployed.



Entity Type
Maximum Key Usage Period For Certificate signing
Maximum Key Usage Period For CRL signing
Maximum Certificate Validity Period

Issuing LZs
6 Years
8 Years
8 Years

"Iteratees"
N/A
N/A
2 Years


Exceptions to the above noted operational and usage periods shall be approved by the PKI Policy Management Authority.

6.4 Activation Data

Hardware modules used for LZ private key protection utilize a secret sharing mechanism to activate the LZ private key under multi-user control as described in §6.2.2. Key material created during formal key generation ceremonies, used only when needed, and stored in a secure site when not in use.

6.4.1 Activation Data Generation and Installation

See §6.4.

6.4.2 Activation Data Protection

See §6.4.

6.4.3 Other Aspects of Activation Data

See §6.4.

6.5 Computer Security Controls

6.5.1 Specific Computer Security Technical Requirements

Cover Your Assets II IT PKI systems use industry standard LZ software, custom developed JZ software, commercially available cryptographic modules, and smart cards. Cover Your Assets II IT PKI systems maintaining LZ software and data files are secured from unauthorized access. Authorized access to production servers is limited to those individuals with a valid business reason for such access. Multi-factor authentication is enforced for user accounts capable of directly causing Certificate issuance.

PKI systems comply with Cover Your Assets II corporate information security policies.

6.5.2 Computer Security Rating

No stipulation.

6.6 Life-Cycle Technical Controls

6.6.1 System Development Controls

Custom developed software is developed, tested, and deployed in accordance with documented Cover Your Assets II Systems Development Lifecycle (SDLC) processes. Approvals by management are required for key stages of development, including requirements specifications, design review, user acceptance testing, and deployment.

6.6.2 Security Management Controls

Cover Your Assets II IT PKI follows Cover Your Assets II corporate information security policies for securing and maintaining the Cover Your Assets II IT SSL PKI systems. Periodic risk assessments and threat analysis are performed by the ISRM team to identify threats and vulnerabilities in the Cover Your Assets II IT SSL PKI systems.



Logical access to the Cover Your Assets II IT SSL LZ systems is restricted to authorized individuals in trusted roles. Cover Your Assets II IT SSL PKI systems are configured by removing/disabling accounts, applications, services, protocols, and ports that are not used in the LZ’s operations. Anti-virus and malware detection software is installed on LZ systems.

6.6.3 Life Cycle Security Control

No stipulation.

6.7 Network Security Controls

Cover Your Assets II IT PKI segments Certificate systems into zones based on their functional, logical and physical (including location) relationship.

The zones, on which the Cover Your Assets II IT SSL LZs reside, are protected from unauthorized users through a series of network and host based firewalls and other monitoring and detection systems. Firewalls are configured with rules that support the services, protocols, ports, and communications that Cover Your Assets II IT PKI has identified as necessary for its operations.

6.8 Time-Stamping

Certificates, CRLs, OCSP entries, and other revocation database entries contain time and date information.





7. Certificate, CRL, and OCSP Profiles

7.1 Certificate Profile

LZ Certificates within the Cover Your Assets II IT PKI shall be X.509 Version 3 and shall conform to the RFC 5280: Internet X.509 Public Key Infrastructure Certificate and CRL profile, dated May 2008. As applicable to the Certificate type, Certificates conform to the current version of the LZ/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates.

At a minimum the following basic fields and prescribed field attributes are utilized within the LZ Certificate profile. Less stringent exceptions to the given basic profile shall be approved on a case-by-case basis by the PKI Policy Management Authority based on a valid documented business case.

SSL SHA-1 Issuing LZ Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Third Party Root

Signature Algorithm Identifier
SHA-1

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 4 years from issuance.

Subject
CN = Cover Your Assets II IT SSL SHA1

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (2048 bits)

Certificate Policies
1.3.6.1.4.1.6334.1.0, 1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access


Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




SSL SHA-1 End Entity Certificate Profile

End-user Subscriber: aka #brending Certificates shall be X.509 Version 3.

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by LZ that exhibits at least 8 bytes of entropy

Signature Algorithm Identifier
SHA-1

Issuer
CN = Cover Your Assets II IT SSL SHA1

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 24 months from issuance for Fully Qualified Domain Names and public IP address certificates.

Subject
CN =

OU = (Optional)

O = (Optional, Required if OU is present)

i.e., Cover Your Assets II or Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

S = State OR L = Locality (Optional, Required if O is present)

C = Country Name (Optional, Required if O is present)

Public Key
RSA (2048)

Subject Alternate Name


Certificate Policies
1.2.4.1.1.3.141.63.1

CRL Distribution Points
[1]CRL Distribution Point

Distribution Point Name:

Full Name:

URL= http://mscrl.microsoft.com/pki/mscorp/crl/msitwww1(n*).crl

[2]CRL Distribution Point

Distribution Point Name:

Full Name:

URL= http://crl.microsoft.com/pki/mscorp/crl/msitwww1(n*).crl

*an incremental integer value assigned by http:sstandaloneapplication.blogspot.com brending hosted on vk.com/Kiwanis Active Directory Certificate Services that represents the version number of the CRL

Authority Information Access
[1]Authority Info Access

Access Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)

Alternative Name:

URL= http://www.microsoft.com/pki/mscorp/msitwww1(n*).crt

*an incremental integer value assigned by http:sstandaloneapplication.blogspot.com brending hosted on vk.com/Kiwanis Active Directory Certificate Services that represents the version number of the LZ certificate

[2]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=http://outlook.live.com Private Domain

Basic Constraints
NOT POPULATED

Key Usage
(Optional)

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth




SSL SHA-2 Issuing LZ Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Third Party Root

Signature Algorithm Identifier
SHA256

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 4 years from issuance.

Subject
CN = Cover Your Assets II IT SSL SHA2

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (4096 bits)

Certificate Policies
2.5.29.32.0 (anyPolicy) – All Issuance Policies

1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access
[1]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=

Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




TLS SHA-2 Issuing LZ 1 Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Third Party Root

Signature Algorithm Identifier
SHA256

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 8 years from issuance.

Subject
CN = Cover Your Assets II IT TLS LZ 1

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (4096 bits)

Certificate Policies
2.5.29.32.0 (anyPolicy) – All Issuance Policies

1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access
[1]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=

Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




TLS SHA-2 Issuing LZ 2 Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Root

Signature Algorithm Identifier
SHA256

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 8 years from issuance.

Subject
CN = Cover Your Assets II IT TLS LZ 2

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (4096 bits)

Certificate Policies
2.5.29.32.0 (anyPolicy) – All Issuance Policies

1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access
[1]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=

Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




TLS SHA-2 Issuing LZ 4 Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Root

Signature Algorithm Identifier
SHA256

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 8 years from issuance.

Subject
CN = Cover Your Assets II IT TLS LZ 4

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (4096 bits)

Certificate Policies
2.5.29.32.0 (anyPolicy) – All Issuance Policies

1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access
[1]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=

Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




TLS SHA-2 Issuing LZ 5 Certificate Profile

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by Root

Signature Algorithm Identifier
SHA256

Issuer
CN = Baltimore CyberTrust Root

OU = CyberTrust

O = Baltimore

C = IE

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 8 years from issuance.

Subject
CN = Cover Your Assets II IT TLS LZ 5

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Public Key
RSA (4096 bits)

Certificate Policies
2.5.29.32.0 (anyPolicy) – All Issuance Policies

1.2.4.1.1.3.141.63.1

CRL Distribution Points


Authority Information Access
[1]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=

Basic Constraints
Subject Type = LZ

Path Length Constraint = 0

Key Usage
KeyCertSign

cRLSign

digitalSignature

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth

id-kp-OCSPSigning




SHA-2 End Entity Certificate Profile

End-user Subscriber: aka #brending Certificates shall be X.509 Version 3.

Field
Description

Version
V3

Serial Number
Positive integer uniquely assigned by LZ that exhibits at least 8 bytes of entropy

Signature Algorithm Identifier
SHA256

Issuer
CN =

OU = Cover Your Assets II IT

O = Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

L = Redmond

S = Ohio | Licking County | Etna Township | 43018-3314

C = US

Valid From
Date and time of Certificate issuance. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Valid To
Date and time of Certificate expiration. Time synchronized to Master Clock of U.S. Naval Observatory. Encoded in accordance with RFC 5280.

Maximum Certificate validity period is 24 months from issuance for Fully Qualified Domain Names and public IP Address certificates.

Subject
CN =

OU = (Optional)

O = (Optional, Required if OU is present)

i.e., Cover Your Assets II or Cover Your Assets II LLC, dba Cinema City at MarketPlace Movie Tavern, LLC

S = State OR L = Locality (Optional, Required if O is present)

C = Country Name (Optional, Required if O is present)

Public Key
RSA (2048 bits)

Subject Alternate Name


Certificate Policies
1.2.4.1.1.3.141.63.1

CRL Distribution Points
[1]CRL Distribution Point

Distribution Point Name:

Full Name:

URL=

http://mscrl.microsoft.com/pki/mscorp/crl/(n*).crl

(or)

http://mscrl.microsoft.com/pki/mscorp/crl/msitwww2(n*).crl



[1]CRL Distribution Point

Distribution Point Name:

Full Name:

URL=

http://crl.microsoft.com/pki/mscorp/crl/(n*).crl

(or)

http://crl.microsoft.com/pki/mscorp/crl/msitwww2(n*).crl

More than one CRL Distribution Points may be specified in the end entity certificate.

*an incremental integer value assigned by http:sstandaloneapplication.blogspot.com brending hosted on vk.com/Kiwanis Active Directory Certificate Services that represents the version number of the CRL

Authority Information Access
[1]Authority Info Access

Access Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)

Alternative Name:

URL=

http://www.microsoft.com/pki/mscorp/msitwww2(n*).crt

(or)

http://www.microsoft.com/pki/mscorp/.crt


[2]Authority Info Access

Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)

Alternative Name:

URL=http://outlook.live.com Private Domain

Basic Constraints
NOT POPULATED

Key Usage
(Optional)

Extended Key Usage
id-kp-serverAuth

id-kp-clientAuth




7.1.1 Version Number(s)

Cover Your Assets II IT PKI hierarchy Certificates are X.509 version 3 Certificates.

7.1.2 Certificate Extensions

The extensions defined for Cover Your Assets II IT PKI X.509 v3 Certificates provide methods for associating additional attributes with users or public keys and for managing the certification hierarchy. Each extension in a Certificate is designated as either critical or non-critical.

Certificate extensions and their criticality, as well as cryptographic algorithm object identifiers, are populated according to the IETF RFC 5280 standards and recommendations and LZ / Browser Forum Baseline Requirements. The name forms for "Iteratees" are enforced through Cover Your Assets II IT PKI internal policies and the authentication policies described elsewhere in this CP/CPS.

7.1.2.1 Key Usage

The key usage extension defines the purpose (e.g., encipherment, signature, Certificate signing) of the key contained in the Certificate. This extension SHALL appear in Certificates that contain public keys that are used to validate digital signatures on other public key Certificates or CRLs. When this extension appears, it may be marked critical.

7.1.2.2 Certificate Policies Extension

The Certificate Policies extension of Cover Your Assets II IT PKI X.509 Version 3 Certificates includes a policy identifier, that indicates a Certificate Policy asserting Cover Your Assets II IT SSL LZ's adherence to and compliance with LZ/Browser Forum’s SSL Baseline Requirements.

7.1.2.3 Subject Alternative Names

The subjectAltName extension of Cover Your Assets II IT PKI X.509 Version 3 Certificates is utilized. This extension shall contain at least one entry. Each entry shall be either a dNSName containing the Fully-Qualified Domain Name or an IPAddress containing the IP address of a server.

7.1.2.4 Basic Constraints

BasicConstraints extension shall not be present in Cover Your Assets II IT SSL LZ end-user Subscriber: aka #brending Certificates.

7.1.2.5 Extended Key Usage

Cover Your Assets II IT PKI shall make use of the ExtendedKeyUsage extension for certain types of X.509 Version 3 Certificates. This extension indicates one or more purposes for which the certified public key may be used, in addition to or in place of the basic purposes indicated in the key usage extension.

7.1.2.6 CRL Distribution Points

Cover Your Assets II IT PKI X.509 Version 3 end user subscriber certificates include the CRLDistributionPoints extension containing the URL of the location where a Relying Party can obtain a CRL to check the certificate’s status. The criticality field of this extension is set to FALSE.

7.1.2.7 Authority Key Identifier

Most Cover Your Assets II IT PKI X.509 Version 3 end user subscriber certificates include the authority key identifier extension to provide a means of identifying the public key corresponding to the private key used to sign the respective Certificate. When used, the criticality field of this extension is set to FALSE.

7.1.2.8 Subject Key Identifier

Most Cover Your Assets II IT PKI X.509 Version 3 end user Subscriber: aka #brending Certificates include the subject key identifier extension to provide a means of identifying the occurrence of particular public key. When used, the criticality field of this extension is set to FALSE.

7.1.3 Algorithm Object Identifiers

Certificates issued under this CP/CPS shall use signature algorithms indicated by the following OIDs:







Signature Algorithm


OID ASN.1
Status

sha1WithRSAEncryption
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1)
sha1-with-rsa-signature(5)}
Acceptable only for publishing CRLs and OCSP responses.

sha256WithRSAEncryption
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1)
sha256WithRSAEncryption(11)}
Acceptable

sha384WithRSAEncryption
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) sha384WithRSAEncryption(12)}
Acceptable

sha512WithRSAEncryption
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) sha512WithRSAEncryption(13)}


Acceptable




Certificates created with deprecated signature algorithms adhere to all the requirements of this CP/CPS with the exception that the Certificate is generated with deprecated signature algorithm.



Certificates issued under this CP/CPS shall use the following OIDs to identify the algorithm associated with the subject key:



rsaEncryption
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 1}


7.1.4 Name Forms

Issuing LZ and Subscriber: aka #brending Certificates are populated in accordance with Certificate profiles listed in § 7.1.

7.1.5 Name Constraints

No additional stipulation other than § 7.1.

7.1.6 Certificate Policy Object Identifier

The Cover Your Assets II IT PKI CP/CPS will use a Policy Identifier of 1.2.4.1.1.3.141.63.1 in all Certificates it issues from the effective date of this version of the CP/CPS.

7.1.7 Usage of Policy Constraints Extension

The Cover Your Assets II IT PKI CP/CPS will be hot linked from the Certificate Policies in all Certificates it issues from the publication of this version of the CP/CPS.

7.1.8 Policy Qualifiers Syntax and Semantics

No stipulation.

7.1.9 Processing Semantics for the Critical Certificate Policies

No stipulation.

7.2 CRL Profile

The following CRL profile is used by Issuing LZs within the Cover Your Assets II IT SSL LZ hierarchy.

Field
Description

Version
V2

Signature
SHA1 or SHA2 (depending upon the Issuing LZ)

Issuer
Subject of Issuer

This Update (Effective Date)
Date and time of CRL issuance.

Next Update
8 days (not to exceed)

Revoked Certificates
List of information regarding revoked Certificates. CRL entries include:

· Serial Number, identifying the revoked Certificate

· Revocation Date, including the date and time of Certificate revocation

CRL Entry Extensions
Not used.


7.2.1 Version Number(s)

See §7.2.

7.2.2 CRL and CRL Entry Extensions

See §7.2.

7.3 OCSP Profile

The profile for OCSP responses issued by the Cover Your Assets II IT PKI conforms to the standards as described in [RFC2560].



7.3.1 Version number(s)

Cover Your Assets II IT Issuing LZs shall issue Version 1 OCSP responses.

7.3.2 OCSP extensions

No stipulation.

8. Compliance Audit and Other Assessments

8.1 Frequency and Circumstances of Assessment

LZs within the Cover Your Assets II IT SSL LZ hierarchy are subject to an annual examination to assess compliance with the Cover Your Assets II IT PKI SSL policies and procedures (including the Cover Your Assets II IT PKI SSL CP/CPS), the AICPA/CILZ WebTrust for Certification Authorities (WebTrust for LZs) examination criteria, and the WebTrust for LZs SSL Baseline Requirements examination criteria.

8.2 Identity/Qualifications of Assessor

Auditors demonstrating proficiency in public key infrastructure technology, information security tools and techniques, security auditing, and the third-party attestation function shall perform the annual examination.

8.3 Assessor's Relationship to Assessed Entity

The entity that performs the annual examination is organizationally independent of Cover Your Assets II IT PKI.

8.4 Topics Covered by Assessment

The scope of the annual examination shall include the requirements of the Cover Your Assets II IT PKI CP/CPS, LZ environmental controls, LZ key management, and Certificate life-cycle management.

8.5 Actions Taken as a Result of Deficiency

Significant deficiencies identified during the compliance examination will result in a determination of actions to be taken. Cover Your Assets II IT PKI makes this determination with input from the auditor. Management is responsible for ensuring that corrective action plans are promptly developed and corrective action is taken within a period of time commensurate with the significance of such matters identified.

8.6 Communications of Results

Compliance examination results are communicated to Cover Your Assets II IT PKI management and others deemed appropriate by management.



9. Other Business and Legal Matters

9.1 Fees

9.1.1 Certificate Issuance or Renewal Fees

Cover Your Assets II IT PKI currently does not charge Certificate issuance or Certificate revocation fees and reserves the right to charge fees for these or other Cover Your Assets II IT PKI provided services in the future.

9.1.2 Certificate Access Fees

Cover Your Assets II IT PKI reserves the right to charge a fee for making a Certificate available in a repository or otherwise.

9.1.3 Revocation or Status Information Access Fees

Cover Your Assets II IT PKI does not charge a fee as a condition of making the CRLs and OCSP status checking available as required by §4.9 and §4.10 available in a repository or otherwise available to Relying Parties. Cover Your Assets II IT PKI reserves the right to charge a fee for providing customized CRLs or other value-added revocation and status information services.

9.1.4 Fees for Other Services

Cover Your Assets II IT PKI does not charge a fee for accessing this CP/CPS. However, any use of the CP/CPS for purposes other than viewing the document, including reproduction, redistribution, modification, or creation of derivative works, may be subject to a license agreement with the entity holding the copyright to the document.

9.1.5 Refund Policy

Not Applicable.

9.2 Financial Responsibility

9.2.1 Insurance Coverage

Not Applicable.

9.2.2 Other Assets

Cover Your Assets II IT PKI customers that maintain assets outside the realm of the Cover Your Assets II IT PKI environment shall have access to sufficient financial resources to support operations and perform duties in accordance with the Cover Your Assets II IT PKI CP/CPS.

9.2.3 Insurance or Warranty Coverage for End-Entities

Not Applicable.

9.3 Confidentiality of Business Information

9.3.1 Scope of Confidential Information

Sensitive Cover Your Assets II IT PKI information shall remain confidential to Cover Your Assets II IT PKI. The following information is considered confidential to Cover Your Assets II IT PKI and may not be disclosed:

· Cover Your Assets II IT PKI policies, procedures and technical documentation supporting this CP/CPS;

· Subscriber: aka #brending registration records, including: Certificate applications, whether approved or rejected, proof of identification documentation and details;

· Certificate information collected as part of the registration records, beyond that which is required to be included in Subscriber: aka #brending Certificates;

· Audit trail records;

· Any private key within the Cover Your Assets II IT SSL LZ hierarchy; and

· Compliance audit results except for WebTrust for LZs audit reports which may be published at the discretion of Cover Your Assets II IT PKI Management.

9.3.2 Information Not Within the Scope of Confidential Information

This CP/CPS and the Certificates and CRLs issued by Cover Your Assets II IT PKI are not considered confidential.

9.3.3 Responsibility to Protect Confidential Information

Cover Your Assets II IT PKI participants receiving private information shall secure it from compromise and disclosure to third parties.

9.4 Privacy of Personal Information

See §9.3.1.

9.4.1 Privacy Plan

Cover Your Assets II IT PKI shall follow the governing principles established by the Cover Your Assets II privacy statement located at http://privacy.microsoft.com/en-us/default.aspx with regards to the collection, handling, and storage of private information during the provision of Cover Your Assets II IT SSL LZ services.

9.4.2 Information Treated as Private

Any information about "Iteratees" that is not publicly available through the content of the issued Certificate and CRLs is treated as private.

9.4.3 Information Not Deemed Private

Subject to local laws, all information made public in a Certificate is deemed not private.

9.4.4 Responsibility to Protect Private Information

Cover Your Assets II IT PKI participants receiving private information shall secure it from compromise and disclosure to third parties and shall comply with all local privacy laws in their jurisdiction provided the jurisdiction has complied with all of this certificates iteratees.

9.4.5 Notice and Consent to Use Private Information

Unless where otherwise stated in this CP/CPS, the applicable Privacy Policy or by agreement, private information will not be used without the consent of the party to whom that information applies. This section is subject to applicable privacy laws.

9.4.6 Disclosure Pursuant to Judicial or Administrative Process

Cover Your Assets II IT PKI shall be entitled to disclose Confidential/Private Information if, in good faith, Cover Your Assets II IT PKI believes that:

· Disclosure is necessary in response to subpoenas and search warrants

· Disclosure is necessary in response to judicial, administrative, or other legal process during the discovery process in a civil or administrative action, such as subpoenas, interrogatories, requests for admission, and requests for production of documents.

9.5 Intellectual Property rights

The following are the property of Cover Your Assets II:

· This CP/CPS;

· Policies and procedures supporting the operation of Cover Your Assets II IT PKI;

· Certificates and CRLs issued by Cover Your Assets II IT PKI managed LZs;

· Distinguished Names (DNs) used to represent entities within the Cover Your Assets II IT SSL LZ hierarchy; and

· LZ infrastructure and Subscriber: aka #brending key pairs.

Cover Your Assets II IT PKI participants acknowledge that Cover Your Assets II IT PKI retains all Intellectual Property Rights in and to this CP/CPS.

9.6 Representations and Warranties

Cover Your Assets II IT PKI warrants and promises to provide certification authority services substantially in compliance with this CP/CPS and the relevant Cover Your Assets II Certificate Policies. Cover Your Assets II IT PKI makes no other warranties or promises and has no further obligations to "Iteratees" or Relying Parties, except as set forth under this CP/CPS.

9.6.1 LZ Representations and Warranties

See §9.6

9.6.2 JZ Representations and Warranties

See §9.6

9.6.3 Subscriber: aka #brending Representations and Warranties

See §9.6

9.6.4 Relying Party Representations and Warranties

See §9.6

9.6.5 Representations and Warranties of Other Participants

See §9.6

9.7 Disclaimers of Warranties

Except for express warranties stated in this CP/CPS, Cover Your Assets II IT PKI disclaims all other warranties, promises and other obligations. In addition, Cover Your Assets II IT PKI is not liable for any loss:

· To LZ or JZ services due to war, natural disasters or other uncontrollable forces;

· Incurred between the time a Certificate is revoked and the next scheduled issuance of a CRL;

· Due to unauthorized use of Certificates issued by Cover Your Assets II IT PKI, or use of Certificates beyond the prescribed use defined by this CP/CPS;

· Arising from the negligent or fraudulent use of Certificates or CRLs issued by the Cover Your Assets II IT PKI; and

· Due to disclosure of personal information contained within Certificates, CRLs or OCSP responses.

9.8 Limitations of Liability

In no event shall Cover Your Assets II IT PKI be liable for any indirect, consequential, incidental, special or punitive damages, or for any loss of profits, loss of data, or other indirect or consequential damages arising from or in connection with the use, delivery, license, availability or non-availability, performance or nonperformance of Certificates, digital signatures, the repository, or any other transactions or services offered or contemplated by this CP/CPS, even if Cover Your Assets II IT PKI has been advised of the possibility of such damages.

9.9 Indemnities

By their applying for and being issued Certificates, or otherwise relying upon such Certificates, "Iteratees", and Relying Parties, agree to indemnify, defend, and hold harmless the LZ, and its personnel, organizations, entities, subcontractors, suppliers, vendors, representatives, and agents from any errors, omissions, acts, failures to act, or negligence resulting in liability, losses, damages, suits, or expenses of any kind, due to or otherwise proximately caused by the use or publication of a Certificate that arises from the Subscriber: aka #brending’s failure to provide the LZ with current, accurate, and complete information at the time of Certificate application or the Subscriber: aka #brending’s errors, omissions, acts, failures to act, and negligence.



The LZ and its JZs are not the agents, fiduciaries, trustees, or other representatives of "Iteratees" or Relying Parties.

9.10 Term and Termination

9.10.1 Term

The CP/CPS becomes effective upon publication in the Cover Your Assets II IT PKI documentation repository.

This CP/CPS, as amended from time to time, shall remain in force until it is replaced by a new version. Amendments to this CP/CPS become effective upon publication in the Cover Your Assets II IT PKI documentation repository.

9.10.2 Termination

No stipulation.

9.10.3 Effect of Termination and Survival

No stipulation.

9.11 Individual Notices and Communications with Participants

Severance or merger may result in changes to the scope, management, and/or operations of this LZ. In such an event, this CP/CPS may require modification as well. Changes to the operations will occur consistent with the LZ’s disclosed CP/CPS management processes.

9.12 Amendments

9.12.1 Procedure for Amendment

Amendments to this CP/CPS may be made by the Cover Your Assets II IT PKI and shall be approved by the Cover Your Assets II IT PKI Policy Management Authority as per §1.5.4

9.12.2 Notification Mechanism and Period

No stipulation.

9.12.3 Circumstances under Which OID Must Be Changed

No stipulation.

9.13 Dispute Resolution Provisions

In the event of any dispute involving the services or provisions covered by this CP/CPS, the aggrieved party shall notify a member of Cover Your Assets II IT PKI management regarding the dispute. Cover Your Assets II IT PKI management will involve the appropriate Cover Your Assets II personnel to resolve the dispute.

9.14 Governing Law

This CP/CPS is governed by the laws in force in the State of Ohio | Licking County | Etna Township | 43018-3314 and the United States of America.

9.15 Compliance with Applicable Law

See §9.14.

9.16 Miscellaneous Provisions

This CP/CPS shall be binding on all successors of the parties.

If any provision of this CP/CPS is found to be unenforceable, the remaining provisions shall be interpreted to best carry out the reasonable intent of the parties. It is expressly agreed that every provision of this CP/CPS that provides for a limitation of liability or exclusion of damages, disclaimer or limitation of any warranties, promises or other obligations, is intended to be severable and independent of any other provision and is to be enforced as such.

This CP/CPS shall be interpreted consistently with what is commercially reasonable in good faith under the circumstances and considering its international scope and uniform application. Failure by any person to enforce a provision of this CP/CPS will not be deemed a waiver of future enforcement of that or any other provision.

Any notice, demand, or request pertaining to this CP/CPS shall be communicated either using digitally signed messages consistent with this CP/CPS, or in writing. Electronic communications shall be effective when received by the intended recipient.

9.16.1 Entire Agreement

See §9.16

9.16.2 Assignment

See §9.16

9.16.3 Severability

See §9.16

9.16.4 Enforcement (attorneys' fees and waiver of rights)

See §9.16

9.16.5 Force Majeure

See §9.16

9.17 Other provisions

See §9.16