CA/Browser Forum
Home » All CA/Browser Forum Posts » Ballot CSC-10 – WebTrust CSBR v2.0 Audit Criteria

Ballot CSC-10 – WebTrust CSBR v2.0 Audit Criteria

Results of IPR Review

(Mailing list post is available here.)

The review period has ended and no exclusion notices were filed.

The final documents, with the effective date being 2021-09-13, are available here.

Results of Voting

(Mailing list post is available here.)

YesNoAbstain
Certificate IssuersCertum (Asseco), DigiCert, eMudhra, Entrust, GlobalSign, HARICA, Sectigo
Certificate ConsumersMicrosoft

The ballot has PASSED.

Purpose of the Ballot

For Baseline Requirement for the Issuance and Management of Publicly-Trusted Code Signing Certificates v2.3, the purpose is to allow the new WebTrust CSBR 2.0 or later audit scheme. The ballot allows the older WebTrust audits to continue for audit periods which start before 1 November 2020. There is no specific start date for the CSBR 2.0 audit scheme, which allows it also to be used for audit periods starting before 1 November 2021.

Motion

Delete the following text from Section 17.1:

  1. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Publicly Trusted Code Signing Certificates v1.0.1 or newer”; or

  2. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Extended Validation Code Signing v1.4.1 or newer”; or

  3. ETSI EN 319 411-1, which includes normative references to ETSI EN 319 401 (the latest version of the referenced ETSI documents should be applied); or

  4. If a Government CA is required by its Certificate Policy to use a different internal audit scheme, it MAY use such scheme provided that the audit either (a) encompasses all requirements of one of the above schemes or (b) consists of comparable criteria that are available for public review.

Insert the following text to Section 17.1:

  1. For Audit Periods starting before 1 November 2020, “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Publicly Trusted Code Signing Certificates v1.0.1 or newer”; or

  2. For Audit Periods starting before 1 November 2020, “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Extended Validation Code Signing v1.4.1 or newer”; or

  3. “WebTrust for CAs v2.0 or newer” AND “WebTrust for Certification Authorities – Code Signing Baseline Requirements v2.0 or newer”; or

  4. ETSI EN 319 411-1, which includes normative references to ETSI EN 319 401 (the latest version of the referenced ETSI documents should be applied); or

  5. If a Government CA is required by its Certificate Policy to use a different internal audit scheme, it MAY use such scheme provided that the audit either (a) encompasses all requirements of one of the above schemes or (b) consists of comparable criteria that are available for public review.

Latest releases
Code Signing Requirements
v3.8 - Aug 5, 2024

What’s Changed CSC-25: Import EV Guidelines to CS Baseline Requirements by @dzacharo in https://github.com/cabforum/code-signing/pull/38 Full Changelog: https://github.com/cabforum/code-signing/compare/v3.7...v3.8

S/MIME Requirements
v1.0.7 - Ballot SMC09 - Nov 25, 2024

This ballot includes updates for the following: • Require pre-linting of leaf end entity Certificates starting September 15, 2025 • Require WebTrust for Network Security for audits starting after April 1, 2025 • Clarify that multiple certificatePolicy OIDs are allowed in end entity certificates • Clarify use of organizationIdentifer references • Update of Appendix A.2 Natural Person Identifiers This ballot is proposed by Stephen Davidson (DigiCert) and endorsed by Clint Wilson (Apple) and Martijn Katerbarg (Sectigo).

Network and Certificate System Security Requirements
v2.0 - Ballot NS-003 - Jun 26, 2024

Ballot NS-003: Restructure the NCSSRs in https://github.com/cabforum/netsec/pull/35

Edit this page
The Certification Authority Browser Forum (CA/Browser Forum) is a voluntary gathering of Certificate Issuers and suppliers of Internet browser software and other applications that use certificates (Certificate Consumers).