CA/Browser Forum
Home » All CA/Browser Forum Posts » Ballot CSC-10 – WebTrust CSBR v2.0 Audit Criteria

Ballot CSC-10 – WebTrust CSBR v2.0 Audit Criteria

Results of IPR Review

(Mailing list post is available here.)

The review period has ended and no exclusion notices were filed.

The final documents, with the effective date being 2021-09-13, are available here.

Results of Voting

(Mailing list post is available here.)

YesNoAbstain
Certificate IssuersCertum (Asseco), DigiCert, eMudhra, Entrust, GlobalSign, HARICA, Sectigo
Certificate ConsumersMicrosoft

The ballot has PASSED.

Purpose of the Ballot

For Baseline Requirement for the Issuance and Management of Publicly-Trusted Code Signing Certificates v2.3, the purpose is to allow the new WebTrust CSBR 2.0 or later audit scheme. The ballot allows the older WebTrust audits to continue for audit periods which start before 1 November 2020. There is no specific start date for the CSBR 2.0 audit scheme, which allows it also to be used for audit periods starting before 1 November 2021.

Motion

Delete the following text from Section 17.1:

  1. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Publicly Trusted Code Signing Certificates v1.0.1 or newer”; or

  2. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Extended Validation Code Signing v1.4.1 or newer”; or

  3. ETSI EN 319 411-1, which includes normative references to ETSI EN 319 401 (the latest version of the referenced ETSI documents should be applied); or

  4. If a Government CA is required by its Certificate Policy to use a different internal audit scheme, it MAY use such scheme provided that the audit either (a) encompasses all requirements of one of the above schemes or (b) consists of comparable criteria that are available for public review.

Insert the following text to Section 17.1:

  1. For Audit Periods starting before 1 November 2020, “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Publicly Trusted Code Signing Certificates v1.0.1 or newer”; or

  2. For Audit Periods starting before 1 November 2020, “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Extended Validation Code Signing v1.4.1 or newer”; or

  3. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Code Signing Baseline Requirements v2.0 or newer”; or

  4. ETSI EN 319 411-1, which includes normative references to ETSI EN 319 401 (the latest version of the referenced ETSI documents should be applied); or

  5. If a Government CA is required by its Certificate Policy to use a different internal audit scheme, it MAY use such scheme provided that the audit either (a) encompasses all requirements of one of the above schemes or (b) consists of comparable criteria that are available for public review.

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.6 - Ballot SMC08 - Aug 29, 2024

This ballot sets a date by which issuance of certificates following the Legacy generation profiles must cease. It also includes the following minor updates: Pins the domain validation procedures to v 2.0.5 of the TLS Baseline Requirements while the ballot activity for multi-perspective validation is concluded, and the SMCWG determines its corresponding course of action; Updates the reference for SmtpUTF8Mailbox from RFC 8398 to RFC 9598; and Small text corrections in the Reference section

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).