|
1 | 1 | --- |
2 | 2 | title: Baseline Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates |
3 | | -subtitle: Version 3.4.0 |
| 3 | +subtitle: Version 3.5.0 |
4 | 4 |
|
5 | 5 | author: |
6 | 6 | - CA/Browser Forum |
7 | | -date: September 5, 2023 |
| 7 | +date: December 7, 2023 |
8 | 8 |
|
9 | 9 | copyright: | |
10 | 10 | Copyright 2023 CA/Browser Forum |
@@ -55,6 +55,7 @@ The following Certificate Policy Identifier is reserved for use by CAs as a requ |
55 | 55 | | 3.2 | CSC-17 | Subscriber Private Key Protection Extension | 28 October 2022 | |
56 | 56 | | 3.3 | CSC-18 | Update Revocation Requirements | 29 June 2023 | |
57 | 57 | | 3.4 | CSC-19 | Remove SSL BR References | 5 September 2023 | |
| 58 | +| 3.5 | CSC-20 | Restore Version Reference to EV Guidelines | 7 December 2023 | |
58 | 59 |
|
59 | 60 |
|
60 | 61 | ### 1.2.2 Relevant Dates |
@@ -359,6 +360,8 @@ FIPS 140-3, Federal Information Processing Standards Publication - Security Requ |
359 | 360 |
|
360 | 361 | FIPS 186-4, Federal Information Processing Standards Publication - Digital Signature Standard (DSS), Information Technology Laboratory, National Institute of Standards and Technology, July 2013. |
361 | 362 |
|
| 363 | +Guidelines for the Issuance and Management of Extended Validation Certificates, Version 1.7.2, available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-EV-Guidelines-v1.7.2.pdf. |
| 364 | + |
362 | 365 | ISO 21188:2006, Public key infrastructure for financial services -- Practices and policy framework. |
363 | 366 |
|
364 | 367 | Network and Certificate System Security Requirements, Version 1.7, available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf. |
@@ -633,7 +636,7 @@ For EV Code Signing Certificates, use of documents, data, and previous validatio |
633 | 636 |
|
634 | 637 | ### 4.2.2 Approval or rejection of certificate applications |
635 | 638 |
|
636 | | -CAs MUST not issue new or replacement Code Signing Certificates to an entity that the CA determined intentionally signed Suspect Code. The CA MUST keep meta-data about the reason for revoking a Code Signing Certificate as proof that the Code Signing Certificate was not revoked because the Applicant was intentionally signing Suspect Code. |
| 639 | +CAs MUST NOT issue new or replacement Code Signing Certificates to an entity that the CA determined intentionally signed Suspect Code. The CA MUST keep meta-data about the reason for revoking a Code Signing Certificate as proof that the Code Signing Certificate was not revoked because the Applicant was intentionally signing Suspect Code. |
637 | 640 |
|
638 | 641 | CAs MAY issue new or replacement Code Signing Certificates to an entity who is the victim of a documented Takeover Attack, resulting in either a loss of control of their code-signing service or loss of the Private Key associated with their Code Signing Certificate. |
639 | 642 |
|
|
0 commit comments