Heute 79

Gestern 638

Insgesamt 39432302

Donnerstag, 16.05.2024
eGovernment Forschung seit 2001 | eGovernment Research since 2001
Under tight security procedures, the Saudi Public Key Infrastructure (PKI) was launched following what's known as Key Generation Ceremony, a set of strict steps carried out under tight security and meticulous scrutiny by an international auditor, which culminated in the issuance of the digital public certificate of the Root Certification Authority (RCA) of the National Center for Digital Certification (NCDC). The security spectacle was executed in the presence of the minister of Communications and Information Technology, Eng. Mohammed Jameel bin Ahmad Mulla, and the governor of the Communications and Information Technology Commission, Dr. Abdulrahman Al Jaffary.

The ceremony was conducted on Tuesday 10th of March 2009 (13th Rabi Al Awwal 1430 H), and was witnessed by members of the PKI National Policy Authority, and members of the e-government steering committee, in addition to others attending for supervision, quality control, and assistance in adhering to international standards and best practices.

Those attending included Mr. Neill Duff, senior VP of Entrust Company, the main vendor for the PKI Solution, and Eng. Parag Parikh, senior Information Security Consultant of Al-Moammar Information Systems (MIS), representing the local company who was awarded the contract for implementing this turnkey project.

Following general guidelines and best practices, an external auditor was appointed to review documented policies, standards, and, procedures and ensure that the generation of the National Root Certificate Authority (CA) Keys adhere to the strictest controls specified for similar environments in International standards.

Devoteam DaVinci of Norway was appointed as the external auditor to vouch for the proper and secure execution of the key generation ceremony. The auditor followed strict auditing standards to check compliance, including physical access to the center, inspection of equipment used for generating, storing and handling of the Root CA Cryptographic keys, and inspection of operational routines.

Notes were taken for the entire ceremony, allowing the auditor to assure transparency and appropriately reporting proper compliance to environmental, operational, and technical controls. The NCDC Key generation Ceremony went through three sets of rehearsals in the past months, each lasting for about 12-hours, in order to simulate and fine tune the final procedures.

Dr. Fahad Al-Hoymany, senior advisor and general director of NCDC welcomed the attendees to the ceremony and delivered a brief presentation on the objectives, functionality, and the work methodology for NCDC. He also talked about the main components involved in the center, the security measures applied, and queries raised by the attendees, after which he accompanied the attendees to the highly secure data center in order to witness the Root CA Cryptographic Keys Generation.

The attendees watched the event from their assigned location in the operations area and saw the key generation tasks being performed by NCDC management and operations team, which consisted of 15 members. The most critical tasks of creating the master users for the cryptographic systems which were used to generate and store the Root CA private Key and certificate were observed by the witnesses and directly monitored by the external auditor.

Upon finishing the key generation tasks, Project Manager and assistant director of NCDC, Eng. Mohammed Edan Al-Ghamdi announced the successful and secure generation of Saudi National Root CA Keys and the issuance of the Root CA digital certificate. This announcement was greeted by all participants and witnesses with a big round of applause.

It is worth noting that prior to conducting the key generation ceremony, preparation of two important documents, the Certificate Policies (CP) and Certificate Practices statement (CPS), was completed and documents approved, along with the development of Security policies, operational procedures, routines, support and other documentation.

Subscriber Agreements have also been developed to allow end-users to obtain digital certificates from this National PKI Framework. The Root CA Key Generation Ceremony is one of the most important milestones of the second phase of the project to issue digital certificates from NCDC.

This is in alignment with the National Plan for Communications and Information Technology, which is overseen by MCIT.

Following this key milestone in the project, the center will be ready to implement the final tasks in the second phase by planning for the key generation ceremony for the Government CA, which will issue digital certificates to government agencies, to be followed by issuing digital certificates for businesses and individuals.

---

Quelle/Source: Aim168 Real Estate, 08.04.2009

Bitte besuchen Sie/Please visit:

Zum Seitenanfang