Gatekeeper Public Key Infrastructure Framework

Gatekeeper Public Key Infrastructure Framework

Gatekeeper Public Key Infrastructure Framework V 3.1 – December 2015 Digital Transformation Office © Commonwealth of Australia 2015 This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the rights explicitly granted below, all rights are reserved. Licence With the exception of the Commonwealth Coat of Arms and where otherwise noted, all material presented in this document is provided under a Creative Commons Attribution Non-Commercial 3.0 Australia licence. To view a copy of this licence, visit: http://creativecommons.org/licenses/by- nc/3.0/au/ You are free to copy, communicate and adapt the work for non-commercial purposes, as long as you attribute the authors. Except where otherwise noted, any reference to, reuse or distribution of all or part of this work must include the following attribution: Gatekeeper PKI Framework: © Commonwealth of Australia 2015. Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the It’s an Honour website (http://www.itsanhonour.gov.au) Contact us Enquiries or comments regarding this document are welcome at: Gatekeeper Competent Authority C/O Director, Trusted Digital Identity Team Digital Transformation Office Email: [email protected] Gatekeeper Public Key Infrastructure Framework – V 3.1 – December 2015 Page 2 of 91 Executive summary Information and Communication Technologies (ICT) are transforming the way we work and are driving change in many industries. Governments around the world understand their decisions can assist or impede businesses to adjust to an increasingly digital economy and society. The Commonwealth Government, as a key user of ICT has an important role to play in developing and supporting the infrastructures required to support this digital transformation. Trust is an essential element in the provision of government digital services. Agencies and their customers alike need to establish a degree of trust or confidence about the identity of parties to digital services. Where an agency may be providing online access to services and benefits it will need to ensure that these are being delivered to the correct customer. As such, authentication policies, standards and technologies are essential to ensure trust can be established and maintained between agencies and their customers. Since 1999, the Commonwealth Government has developed and maintained the Gatekeeper Public Key Infrastructure (PKI) Framework. The Framework is an accreditation program which ensures a whole-of-government outcome that delivers integrity, interoperability, authenticity and trust between agencies and their customers. The Gatekeeper PKI Framework includes a suite of policies, standards and procedures that govern the use of digital certificates in Government for the authentication of agencies and their customers. This document is the third edition of the Framework and outlines the requirements Service Providers need to obtain and maintain for Gatekeeper accreditation and recognition. I recommend the Gatekeeper PKI Framework to anyone interested in providing digital services to Government. Gatekeeper Competent Authority November 2015 Gatekeeper Public Key Infrastructure Framework – V 3.1 – December 2015 Page 3 of 91 Contents Executive summary ............................................................................................................................... 3 1. Framework Management ............................................................................................................... 7 1.1 Change Log ............................................................................................................................. 7 1.2 Review Date ............................................................................................................................ 7 1.3 Conventions ............................................................................................................................. 7 1.4 Terms and Definitions .............................................................................................................. 8 1.5 Transition Arrangements ......................................................................................................... 8 1.6 Advice on this Framework ....................................................................................................... 8 1.7 Document Structure ................................................................................................................. 8 2. Aims and Purpose ........................................................................................................................ 10 3. Electronic Authentication ............................................................................................................ 12 3.1 Electronic Authentication ....................................................................................................... 12 3.2 The e-Authentication Process ............................................................................................... 12 3.3 Levels of Assurance .............................................................................................................. 13 4. Public Key Infrastructure ............................................................................................................ 14 4.1 Public Key Infrastructure ....................................................................................................... 14 4.2 Security Services provided by a PKI ..................................................................................... 14 4.3 Elements of Public Key Infrastructure ................................................................................... 15 5. Gatekeeper PKI Framework ........................................................................................................ 17 5.1 Purpose ................................................................................................................................. 17 5.2 Framework Structure ............................................................................................................. 18 5.3 Levels of Assurance .............................................................................................................. 19 5.4 Commonwealth Government Requirements ......................................................................... 19 5.5 Risk Management .................................................................................................................. 19 5.6 Accreditation Process ............................................................................................................ 20 5.7 Accreditation Requirements .................................................................................................. 23 5.8 Mandatory Requirements ...................................................................................................... 24 5.9 Recommended Standards and Guides ................................................................................. 25 6. Core Obligations .......................................................................................................................... 26 6.1 Core Obligations Policy ......................................................................................................... 26 6.2 Liability ................................................................................................................................... 26 6.3 Service Providers .................................................................................................................. 26 6.4 Certification Authority ............................................................................................................ 27 6.5 Registration Authority ............................................................................................................ 31 6.6 Validation Authority ................................................................................................................ 31 Gatekeeper Public Key Infrastructure Framework – V 3.1 – December 2015 Page 4 of 91 6.7 Subscriber .............................................................................................................................. 32 6.8 Relying Party ......................................................................................................................... 33 7. Gatekeeper Mandatory Security Requirements ........................................................................ 34 8. Operational Evaluations .............................................................................................................. 39 8.1 Information Security Registered Assessors Program............................................................ 39 8.2 Privacy Impact Assessment .................................................................................................. 39 9. Gatekeeper Approved Documents ............................................................................................. 41 9.1 Information Security Documentation ..................................................................................... 41 9.2 Information Security Policy .................................................................................................... 42 9.3 Protective Security Risk Review ............................................................................................ 43 9.4 Security Risk Management Plan ..........................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    91 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us