You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The NCSSRs should state that the private signing keys for all OCSP responders must be protected in an HSM, as opposed to, for example, storage of OCSP private signing keys in software, which would be more susceptible to misuse and comprise. This issue came up during a threat-modeling discussion today in the weekly subgroup meeting. Protection of OCSP signing keys in HSMs should not just be an underlying assumption, but should be expressly required in the NCSSRs.
The text was updated successfully, but these errors were encountered:
I think this should be a BR requirement and not a NCSSR requirement. Note the NCSSR does not have any key protection levels for any other private keys.
The NCSSRs should state that the private signing keys for all OCSP responders must be protected in an HSM, as opposed to, for example, storage of OCSP private signing keys in software, which would be more susceptible to misuse and comprise. This issue came up during a threat-modeling discussion today in the weekly subgroup meeting. Protection of OCSP signing keys in HSMs should not just be an underlying assumption, but should be expressly required in the NCSSRs.
The text was updated successfully, but these errors were encountered: