Certigna: Finding #3 ETSI Audit – Event log protection beyond seven years shall be improved
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: j.allemandou, Assigned: j.allemandou)
Details
(Whiteboard: [ca-compliance] [audit-finding])
Full Incident Report
Findings with regard to ETSI EN 319 411-1:
6.4.6 Records archival
Event log protection beyond seven years shall be improved. [OVR-6.4.6-01]
Summary
-
CA Owner CCADB unique ID: A000011
-
Incident description: Logs are retained for 7 years after the expiry of the associated certificates, however, the log integrity protection tool was configured for 7 years only.
-
Timeline summary:
- Non-compliance start date: 2024-03-13
- Non-compliance identified date: 2025-03-28
- Non-compliance end date: 2025-05-27
-
Relevant policies: ETSI EN 319 411-1 V1.4.1 (2023-10)
-
Source of incident disclosure:
CAB-Forum_AAL_Certigna_Standard_Audit_2025_V3_S.3
CAB-Forum_AAL_Certigna_TLS-BR_Audit_2025_V3_S.3
CAB-Forum_AAL_Certigna_TLS-EV_Audit_2025_V3_S.3
CAB-Forum_AAL_Certigna_SMIME-BR_Audit_2025_V3_S.3
CAB-Forum_AAL_Certigna_CS-BR_Audit_2025_V3_S.3
Impact
No impact identified on certificates.
- Total number of certificates: (N/A)
- Total number of "remaining valid" certificates: (N/A)
- Affected certificate types: (N/A)
- Incident heuristic: No certificates affected (N/A)
- Was issuance stopped in response to this incident, and why or why not?: (N/A)
- Analysis: (N/A)
- Additional considerations: (N/A)
Timeline
All times are now UTC.
2024-03-13: Protection of Log repositories for archiving were set to a maximum of 7 years for logs linked to new short-lived certificates with a lifetime of 30 minutes. The associated logs therefore had to be deleted within 7 years and 30 minutes.
2025-03-28: An auditor identified the limitation of the log protection configuration set at 7 years for all logs, and not only logs linked to short-lived certificates.
2025-05-16: Receipt of the audit report with validation of proposed actions to address deviations.
2025-05-16: Update of logging procedure to reinforce guidelines for configuring protection of archived logs and regular monitoring of this configuration.
2025-05-16: Raising team awareness of archived log protection configuration and new guidelines.
2025-05-19: Update of repository configurations to adapt the duration of protection considering the lifetime of the associated certificates.
2025-05-27: Validation of deviation resolution by auditor after analysis of log repository configurations and associated procedure.
Related Incidents
N/A
Root Cause Analysis
Contributing Factor #1: Creation of new short-lived certificate profiles with logs to be deleted after seven years and 30 minutes.
- Description: Protection of Log repositories for archiving were set to a maximum of 7 years for logs linked to new short-lived certificates with a lifetime of 30 minutes. The associated logs therefore had to be deleted within 7 years and 30 minutes.
- Timeline: Generation of new certificate profiles, and update of log repository protection configurations to enable log deletion after certificate expiration.
- Detection: The ETSI auditor identified the limitation of the log protection configuration set at 7 years for all logs.
- Interaction with other factors: N/A
- Root Cause Analysis methodology used: 5-Whys
Lessons Learned
- What went well: Archived and required logs were still available on the depots, and extended protection has been correctly configured.
- What didn’t go well: The configuration of integrity log protection was not adapted to the different certificate lifetimes.
- Where we got lucky: Archived and required logs were still available on the depots, because the log deletion scripts were correctly configured for deletion, considering the lifetimes of the associated certificates.
- Additional: N/A
Action Items
Action Item | Kind | Corresponding Root Cause(s) | Evaluation Criteria | Due Date | Status |
---|---|---|---|---|---|
Update of logging procedure to reinforce guidelines for configuring protection of archived logs and regular monitoring of this configuration | Detect | Root Cause # 1 | Should reduce the occurrence of this type of non-compliance | 2025-05-16 | Complete |
Raising team awareness of archived log protection configuration and new guidelines | Detect | Root Cause # 1 | Should reduce the occurrence of this type of non-compliance | 2025-05-16 | Complete |
Update of repository configurations to adapt the duration of protection considering the lifetime of the associated certificates | Mitigate | Root Cause # 1 | Correctly configured and controlled protection | 2025-05-19 | Complete |
Appendix
Details of affected certificates
No certificates affected (N/A)
Assignee | ||
Comment 1•2 days ago
|
||
Report Closure Summary
- Incident description: Logs are retained for 7 years after the expiry of the associated certificates, however, the log integrity protection tool was configured for 7 years only.
- Incident Root Cause(s): Protection of Log repositories for archiving were set to a maximum of 7 years for logs linked to new short-lived certificates with a lifetime of 30 minutes. The associated logs therefore had to be deleted within 7 years and 30 minutes.
- Remediation description: Logging procedure has been updated to reinforce guidelines for configuring protection of archived logs and regular monitoring of this configuration. Teams have been made aware of the new guidelines and have updated the configuration of the protection of log archiving repositories.
- Commitment summary: Increased configuration and controls for archived log protection.
All Action Items disclosed in this report have been completed as described, and we request its closure.
Updated•1 day ago
|
Description
•