Aaltronav s.r.o. Certification Practice Statement (CPS)

This document describes the policies and practices employed by the Aaltronav Certification Authority (CA) in its Public Key Infrastructure (PKI).

Change History

Table of Contents

Introduction

Overview

Document Name and Identification

The name of this document is “Aaltronav s.r.o. Certification Practice Statement (CPS)”.

This document is available at the URI https://pki.aaltronav.eu/cps.

PKI Participants

Note that in a PKI the term “subscriber” refers to an individual or organization that is a subject of a certificate issued by a CA. The term is used in this fashion throughout this document, without qualification, and should not be confused with the networking use of the term to refer to an individual or organization that receives service from an ISP. In such cases, the term “network subscriber” will be used. Also note that, for brevity, this document always refers to PKI participants as organizations or entities, even though some of them are individuals.

Certification Authorities

The Certification Authority (CA) hierarchy is composed of the top-level CA for Aaltronav’s portion of the PKI, Aaltronav Root CA and a subordinate production CA, Aaltronav Production CA 1.

Aaltronav Root CA

This is the offline, top-level CA for Aaltronav s.r.o., providing a secure revocation and recovery capability in case the production CA is compromised or becomes unavailable.

Aaltronav Root CA issues certificates only to instances of Aaltronav Production CA 1, and its Certificate Revocation Lists (CRL) are used only to revoke certificates issued to Aaltronav Production CA 1.

Aaltronav Production CA 1

This production certificate authority is used to issue public key infrastructure (PKI) certificates to members of Aaltronav s.r.o.

Registration Authorities

Registrations are handled through the IT manager.

Subscribers

The subscribers of this PKI are the members of Aaltronav staff and Aaltronav equipment or resources to which certificates are issued.

Relying Parties

Entities or individuals that act in reliance on certificates or PKI-signed objects issued under this PKI are relying parties. Relying parties may or may not be subscribers within this PKI.

Other Participants

Entities, individuals or organizations that are using, or are in some form involved with preparing, the certificates of a subscriber and may or may not wish to secure communication with this subscriber. Other participants may or may not be subscribers within this PKI.

Certificate Usage

Appropriate Certificate Uses

Certificates issued under this policy may be used for:

Prohibited Certificate Uses

Any uses other than those described in the previous section are prohibited.

Policy Administration

Organisation Administering the Document

This certificate policy statement is administered by Aaltronav s.r.o.

Contact Person

Contact the IT manager via https://aaltronav.eu/contact for any questions.

Person Determining CPS Suitability for the Policy

The IT manager reviews the certificate policy statement.

CPS Approval Procedures

The certificate policy statement is approved by any of Aaltronav’s directors.

Definitions and Acronyms

Term/Acronym Definition
CA Certification Authority: An entity that issues digital certificates.
CPS Certification Practice Statement: This document detailing the practices and procedures of the CA.
CRL Certificate Revocation List: A list of revoked certificates issued by the CA.
CSR Certificate Signing Request: A message sent from an applicant to a CA to apply for a public key certificate.
DN Distinguished Name: A unique identifier for a certificate subject, based on X.500 standards.
HTTPS Hypertext Transfer Protocol Secure: A protocol for secure communication over a computer network.
OID Object Identifier: A unique numeric identifier for policies or objects in the PKI.
PKI Public Key Infrastructure: A system for managing digital certificates and public-key encryption.
RA Registration Authority: An entity that verifies certificate requests before approval by the CA.
RFC Request for Comments: A publication from the Internet Engineering Task Force (IETF) describing standards.
URI Uniform Resource Identifier: A string identifying a resource, such as a web address.

Publication and Repository Responsibilities

Repositories

This Certification Practice Statement conforms to RFC 5280 for the profile of X.509 certificates, CRLs, and extensions used in this PKI. Repository publication follows common industry practices for HTTP-accessible PKI repositories, including publication of CRLs, Authority Information Access (AIA)-reachable issuer certificates, and other trust anchors. The repository is publicly accessible (read-only) via HTTPS at https://pki.aaltronav.eu/. It is organised with:

Publication of Certification Information

Aaltronav s.r.o. will publish certificates, CRLs, and PKI-signed objects issued by it to a repository that operates as part of a worldwide distributed system of PKI repositories.

Time or Frequency of Publication

Certificates, CRLs and PKI-signed objects are published to the repository as part of the issuance or update process.

The Aaltronav s.r.o. CA will publish its CRL prior to the nextUpdate value in the scheduled CRL previously issued by the CA.

Access Controls on Repositories

Public repository data is publicly readable. Repository updates are carried out as part of an automated process under control of the registration authority (RA).

Identification and Authentication

Naming

Types of Names

The subject of each certificate issued by this organization is identified by an X.500 Distinguished Name (DN). The distinguished name will consist of a single Common Name (CN) attribute with a value generated by Aaltronav s.r.o… Optionally, additional attributes may be included along with the common name (to form a terminal relative distinguished name set), to disambiguate in cases where the Common Name alone does not uniquely identify the subject, or to distinguish among successive instances of certificates associated with the same entity.

Need for Names to be Meaningful

Where certificates are issued to organisations, individuals or entities commonly associated with a name, a sufficiently recognisable form of their name (or one of their names) will form part of the Subject Name of each certificate.

Anonymity or Pseudonymity of Subscribers

Anonymity is neither explicitly supported nor proscribed by this certification policy. Pseudonymity is supported upon an individual’s or organisation request or for confidentiality, security or other reasons.

Rules for Interpreting Various Name Forms

Names (in particular, Common Name attributes) are encoded using UTF-8. Names need not be in the Latin alphabet. Where an entity’s name uses a non-Latin alphabet name, a Latin alphabet version of the name should be included as well.

Uniqueness of Names

Subject names are unique among the certificates issued by this CA. Where necessary, disambiguation will be carried out by additional attributes.

Recognition, Authentication and Role of Trademarks

No provision is made in this regard.

Initial Identity Validation

Method to Prove Possession of Private Key

The concerned user, or the person responsible for the entity in question, must submit a duly formed certificate signing request (CSR) to the registration authority (RA).

Authentication of Organisation Identity

This CA does not as a rule issue certificates to organisations other than itself and, should the need arise, any certificates issued will not attest to the organisational identity of subscribers.

However, in the unlikely event that authentication of an organisation entity should be necessary, this will take place by:

Authentication of Individual Identity

This CA does not attest to the individual identity of a subscriber, only to their association with Aaltronav s.r.o.

Non-verified Subscriber Information

Information that is for internal use only, such as email addresses or optional attributes (e.g., organisational unit) may be included without external verification but subscribers are required to confirm accuracy during enrolment to prevent errors.

Validation of Authority

Authority to represent an internal subscriber is determined by reference to Aaltronav’s internal hierarchy. In the event of a request concerning another organisation, the requester must prove to the satisfation of the Registration Authority (RA) the he is authorised to represent the subscriber.

Testing certificates require explicit IT manager approval via a traceable method such as email or ticket in an issue tracking system.

Criteria for Interoperation

There is no explicit provision for interoperation with any other PKI.

Identification and Authentication for Re-key Requests

Identification and Authentication for Routine Re-key

Subscribers must submit a new CSR via the RA, with identity re-verified against internal records. Re-keys occur before expiry, with a grace period of 30 days.

Identification and Authentication for Re-key after Revocation

Full re-validation as in initial issuance will be required, plus an explanation of the revocation reason, approved by the IT manager.

Identification and Authentication for Revocation Request

Revocation requests must be submitted to the RA by the subscriber or an authorised representative. Authentication occurs via internal verification (e.g., email from a company domain or in-person confirmation). Reasons for revocation include key compromise, cessation of authority, or policy violation.

Certificate Life Cycle Operational Requirements

Certificate Application

Who Can Submit a Certificate Application

Any Aaltronav staff member or authorised representative for equipment/resources.

Enrollment Process and Responsibilities

Subscribers generate a CSR using tools like OpenSSL, submit it to the RA with justification (e.g., use case). The RA reviews and forwards to the CA for issuance.

Certificate Application Processing

Performing Identification and Authentication Functions

The RA performs identification and authentication as described in the Indentification and Authentication section.

Approval or Rejection of Certificate Applications

Applications are approved if they meet policy requirements; otherwise, rejected with notification to the applicant.

Time to Process Certificate Applications

The RA aims to process applications within 72 hours, verifying identity and authority. Approvals are logged; denials are notified with reasons.

Certificate Issuance

CA Actions during Certificate Issuance

The CA signs the certificate using its private key after RA approval.

Notification to Subscriber by the CA of Issuance of Certificate

The subscriber is notified via email or the enrolment system upon issuance.

Certificate Acceptance

Conduct Constituting Certificate Acceptance

Acceptance is constituted by the subscriber’s use of the certificate or failure to reject it within 7 days of issuance.

Publication of the Certificate by the CA

End user certificates are, as a rule, not published to the PKI repository in the interests of privacy. Any non-revoked end user certificate signed by Aaltronav’s production CA may be considered valid a priori.

Notification of Certificate Issuance by the CA to Other Entities

No stipulation for notification to other entities.

Key Pair and Certificate Usage

Subscriber Private Key and Certificate Usage

Subscribers must use private keys only for authorised purposes and protect them from compromise.

Relying Party Public Key and Certificate Usage

Relying parties must verify certificate validity, including CRL checks, before reliance.

Certificate Renewal

Circumstances for Certificate Renewal

Renewal is permitted for unrevoked certificates nearing expiry, without key change.

Who May Request Renewal

The original subscriber or authorised representative.

Processing Certificate Renewal Requests

Processed as routine re-key, with verification.

Notification of New Certificate Issuance to Subscriber

Via email or enrolment system.

Conduct Constituting Acceptance of a Renewal Certificate

As described in the Conduct Constituting Certificate Acceptance subsection.

Publication of the Renewal Certificate by the CA

As described in the Publication and Repository Responsibilities section.

Notification of Certificate Issuance by the CA to Other Entities

No stipulation.

Certificate Re-key

Circumstance for Certificate Re-key

Re-key is required for key compromise, expiry, or policy changes requiring new keys.

Who May Request Certification of a New Public Key

The subscriber or RA.

Processing Certificate Re-keying Requests

As in initial validation, with new CSR.

Notification of New Certificate Issuance to Subscriber

Via email or enrolment system.

Conduct Constituting Acceptance of a Re-keyed Certificate

As described in the Conduct Constituting Certificate Acceptance subsection.

Publication of the Re-keyed Certificate by the CA

As described in the Publication and Repository Responsibilities section.

Notification of Certificate Issuance by the CA to Other Entities

No stipulation.

Certificate Modification

Circumstance for Certificate Modification

Modification is for changes in non-key attributes, e.g., name updates.

Who May Request Certificate Modification

The subscriber or RA.

Processing Certificate Modification Requests

With verification of changes.

Notification of New Certificate Issuance to Subscriber

Via email or enrolment system.

Conduct Constituting Acceptance of Modified Certificate

As described in the Conduct Constituting Certificate Acceptance subsection.

Publication of the Modified Certificate by the CA

As described in the Publication and Repository Responsibilities section.

Notification of Certificate Issuance by the CA to Other Entities

No stipulation.

Certificate Revocation and Suspension

Circumstances for Revocation

Revocation occurs for key compromise, policy violation, cessation of authority, or subscriber request.

Who Can Request Revocation

Subscriber, RA, or IT manager.

Procedure for Revocation Request

Submit to RA with reason; processed within 24 hours.

Revocation Request Grace Period

No grace period for compromise; 24 hours otherwise.

Time Within Which CA Must Process the Revocation Request

Within 24 hours.

Revocation Checking Requirement for Relying Parties

Relying parties must check CRL before use.

CRL Issuance Frequency (if applicable)

At least daily, or immediately upon revocation.

Maximum Latency for CRLs (if applicable)

1 hour.

On-line Revocation/Status Checking Availability

No stipulation (OCSP not supported).

On-line Revocation Checking Requirements

N/A.

Other Forms of Revocation Advertisements Available

No stipulation.

Special Requirements re Key Compromise

Immediate revocation and notification to affected parties.

Circumstances for Suspension

Suspension is not supported.

Who Can Request Suspension

N/A.

Procedure for Suspension Request

N/A.

Limits on Suspension Period

N/A.

Certificate Status Services

Operational Characteristics

Status via CRL.

Service Availability

Repository available 24/7.

Optional Features

No optional features.

End of Subscription

Subscription ends upon revocation, expiry, or subscriber departure from Aaltronav.

Key Escrow and Recovery

Key Escrow and Recovery Policy and Practices

No key escrow; private keys are subscriber-managed.

Session Key Encapsulation and Recovery Policy and Practices

No stipulation.

Facility, Management, and Operational Controls

Physical Controls

Site Location and Construction

CA systems are in a secure, access-controlled facility.

Physical Access

Access limited to authorised personnel.

Power and Air Conditioning

Uninterruptible power supply (UPS) and climate control provided.

Water Exposures

Facility protected against flooding.

Fire Prevention and Protection

Fire suppression systems in place.

Media Storage

Secure storage for backups.

Waste Disposal

Sensitive waste shredded or destroyed.

Off-site Backup

Backups stored off-site securely.

Procedural Controls

Trusted Roles

Roles include CA operator, RA, and auditor.

Number of Persons Required per Task

Critical tasks require two-person control.

Identification and Authentication for Each Role

Via certificates or passwords.

Roles Requiring Separation of Duties

CA operations separated from RA.

Personnel Controls

Qualifications, Experience, and Clearance Requirements

Personnel must have relevant experience; background checks for trusted roles.

Background Check Procedures

Internal verification.

Training Requirements

Initial and ongoing training on PKI operations.

Retraining Frequency and Requirements

Annual.

Job Rotation Frequency and Sequence

No stipulation.

Sanctions for Unauthorised Actions

Disciplinary action up to termination.

Independent Contractor Requirements

Contractors bound by this CPS.

Documentation Supplied to Personnel

This CPS and operational procedures.

Audit Logging Procedures

Types of Events Recorded

Issuance, revocation, access attempts.

Frequency of Processing Log

Daily review.

Retention Period for Audit Log

7 years.

Protection of Audit Log

Stored securely, access restricted.

Audit Log Backup Procedures

Regular backups.

Audit Collection System (Internal vs. External)

Internal.

Notification to Event-causing Subject

No stipulation.

Vulnerability Assessments

Annual.

Records Archival

Types of Records Archived

Certificates, CRLs, logs.

Retention Period for Archive

10 years.

Protection of Archive

Secure storage, integrity checks.

Archive Backup Procedures

Off-site duplicates.

Requirements for Time-stamping of Records

Electronic records time-stamped.

Archive Collection System (Internal or External)

Internal.

Procedures to Obtain and Verify Archive Information

Dual control verification.

Key Changeover

CA keys changed every 5 years or upon compromise; new keys certified under old.

Compromise and Disaster Recovery

Incident and Compromise Handling Procedures

Report to IT manager; investigate and respond.

Computing Resources, Software, and/or Data Are Corrupted

Restore from backups; re-issue if needed.

Entity Private Key Compromise Procedures

Revoke, notify, re-issue.

Business Continuity Capabilities after a Disaster

Off-site backups enable recovery within 48 hours.

CA or RA Termination

Notify subscribers; transfer records to custodian (IT manager).

Technical Security Controls

Key Pair Generation and Installation

Key Pair Generation

Generated by subscriber or CA using secure modules.

Private Key Delivery to Subscriber

Secure channel (e.g., encrypted).

Public Key Delivery to Certificate Issuer

Via CSR.

CA Public Key Delivery to Relying Parties

Via repository.

Key Sizes

RSA 2048 bits minimum.

Public Key Parameters Generation and Quality Checking

CA-generated parameters verified.

Key Usage Purposes (as per X.509 v3 Key Usage Field)

As per certificate profile.

Private Key Protection and Cryptographic Module Engineering Controls

Cryptographic Module Standards and Controls

FIPS 140-2 Level 2 or equivalent for CA keys.

Private Key (n out of m) Multi-person Control

Two-person for CA keys.

Private Key Escrow

No escrow.

Private Key Backup

Encrypted backups.

Private Key Archival

No archival of private keys.

Private Key Transfer Into or From a Cryptographic Module

Only authorised, encrypted.

Private Key Storage on Cryptographic Module

Encrypted.

Method of Activating Private Key

PIN or token.

Method of Deactivating Private Key

Logout or timeout.

Method of Destroying Private Key

Overwrite or destruction.

Cryptographic Module Rating

As above.

Other Aspects of Key Pair Management

Public Key Archival

Public keys archived with certificates.

Certificate Operational Periods and Key Pair Usage Periods

1-3 years for end-entity; 10 years for CA.

Activation Data

Activation Data Generation and Installation

Generated securely.

Activation Data Protection

Stored encrypted.

Other Aspects of Activation Data

Destroyed after use if one-time.

Computer Security Controls

Specific Computer Security Technical Requirements

Firewalls, antivirus, access controls.

Computer Security Rating

No external rating.

Life Cycle Technical Controls

System Development Controls

Secure development practices.

Security Management Controls

Regular updates.

Life Cycle Security Controls

Vendor support required.

Network Security Controls

Segmented networks, firewalls.

Time-stamping

No stipulation.

Certificate, CRL, and OCSP Profiles

Certificate Profile

Version Number(s)

X.509 v3.

Certificate Extensions

Standard extensions as needed (e.g., key usage).

Algorithm Object Identifiers

SHA-256 with RSA.

Name Forms

As described in the Naming subsection.

Name Constraints

Permitted subtrees for Aaltronav domains.

Certificate Policy Object Identifier

1.3.6.1.4.1.50168.1.1.0

Usage of Policy Constraints Extension

No stipulation.

Policy Qualifiers Syntax and Semantics

CPS URI.

Processing Semantics for the Critical Certificate Policies Extension

Require policy check.

CRL Profile

Version Number(s)

v2.

CRL and CRL Entry Extensions

Standard.

OCSP Profile

Version Number(s)

N/A (not supported).

OCSP Extensions

N/A.

Compliance Audit and Other Assessments

Frequency or Circumstances of Assessment

Annual internal review.

Identity/Qualifications of Assessor

IT manager or external consultant.

Assessor’s Relationship to Assessed Entity

Internal or independent.

Topics Covered by Assessment

All CPS sections.

Actions Taken as a Result of Deficiency

Corrective measures.

Communication of Results

To directors.

Fees

Certificate Issuance or Renewal Fees

None.

Certificate Access Fees

None.

Revocation or Status Information Access Fees

None.

Fees for Other Services

None.

Refund Policy

N/A.

Financial Responsibility

Insurance Coverage for Relying Parties

No insurance.

Other Assets

No stipulation.

Insurance or Warranty Coverage for End-Entities

None.

Confidentiality of Business Information

Scope of Confidential Information

Subscriber data.

Information Not Within the Scope of Confidential Information

Public certificates.

Responsibility to Protect Confidential Information

Handled securely.

Privacy of Personal Information

Privacy Plan

Data protected per EU GDPR.

Information Treated as Private

Personal identifiers.

Information Not Deemed Private

Certificate contents.

Responsibility to Protect Private Information

Secure storage.

Via enrolment.

Disclosure Pursuant to Judicial or Administrative Process

As required by law.

Other Information Disclosure Circumstances

No stipulation.

Intellectual Property Rights

Certificates are Aaltronav property.

Representations and Warranties

CA Representations and Warranties

Certificates issued per CPS.

RA Representations and Warranties

Accurate verification.

Subscriber Representations and Warranties

Accurate information.

Relying Party Representations and Warranties

Proper validation.

Representations and Warranties of Other Participants

Compliance with CPS.

Disclaimers of Warranties

No warranties beyond CPS.

Limitations of Liability

Limited to direct damages.

Indemnities

Subscribers indemnify CA for misuse.

Term and Termination

Term

Effective upon approval.

Termination

Upon supersession.

Effect of Termination and Survival

Obligations survive.

Individual Notices and Communications with Participants

Via email.

Amendments

Procedure for Amendment

Review and approval.

Notification Mechanism and Period

Published updates.

Circumstances Under Which OID Must be Changed

Major changes.

Dispute Resolution Provisions

Internal resolution; arbitration if needed.

Governing Law

Czech law.

Compliance with Applicable Law

Compliant with EU regulations.

Miscellaneous Provisions

Assignment

Not assignable.

Severability

Invalid provisions severed.

Enforcement (Attorneys’ Fees and Waiver of Rights)

Waiver must be written.

Force Majeure

Excused for uncontrollable events.

Other Provisions

No stipulation.