Open
Bug 1990271
Opened 3 months ago
Updated 2 months ago
SwissSign: recommendation on firewall review
Categories
(CA Program :: CA Certificate Compliance, task)
CA Program
CA Certificate Compliance
Tracking
(Not tracked)
ASSIGNED
People
(Reporter: sandy.balzer, Assigned: sandy.balzer)
Details
(Whiteboard: [ca-compliance] [audit-finding] Next update 2026-04-30)
Preliminary Incident Report
Summary
-
Incident description: The audit report contains a recommendation regarding the further improvement of SwissSign’s firewall review.
-
Relevant policies: ETSI EN 319 401, REQ-7.8-21X
-
Source of incident disclosure: Audit
Updated•3 months ago
|
Assignee: nobody → sandy.balzer
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [audit-finding]
| Assignee | ||
Comment 1•3 months ago
|
||
Full Incident Report
Summary
- CA Owner CCADB unique ID: A000049
- Incident description: The audit report contains a recommendation regarding the further improvement of SwissSign’s firewall review.
- Timeline summary:
- Non-compliance start date: N/A (audit recommendation and not non-compliance)
- Non-compliance identified date: N/A (audit recommendation and not non-compliance)
- Non-compliance end date: N/A (audit recommendation and not non-compliance)
- Relevant policies: ETSI EN 319 401, REQ-7.8-21X
- Source of incident disclosure: Audit
Impact
- Total number of certificates: N/A
- Total number of "remaining valid" certificates: N/A
- Affected certificate types: N/A
- Incident heuristic: N/A
- Was issuance stopped in response to this incident, and why or why not?: Certificate issuance was not halted, as certificate issuance was not impacted.
- Analysis: N/A
- Additional considerations: SwissSign's networking infrastructure is completely built by "Infrastructure as code". This includes definitions of network zones and communication channels. From this, firewall rules are built automatically and pushed to the firewalls via automation. There is no manual FW-rule management. This leads to potentially enabled FW-rules that are never used. Since some FW-rules see very little traffic / are rarely used, finding unused rules is non trivial.
Timeline
- 12.09.2025 Audit report containing this recommendation published
Related Incidents
none found
Root Cause Analysis
Contributing Factor #1:
- Description: Auditors recommend improving the search for unused FW-rules. We need to investigate if the FW allow automatic retrieval of usage of all FW-rules to detect unused rules. This will include investigation if counters are reset when FW-rules are uploaded via our automation (it's always a full upload) since that would lead to false positives. Also, jobs / tasks that are done rarely (e.g. yearly test of some emergency process) must be taken into consideration.
- Timeline: N/A
- Detection: Audit
- Interaction with other factors: N/A
- Root Cause Analysis methodology used: N/A
Lessons Learned
- What went well: N/A
- What didn’t go well: N/A
- Where we got lucky: N/A
- Additional: N/A
Action Items
| Action Item | Kind | Corresponding Root Cause(s) | Evaluation Criteria | Due Date | Status |
|---|---|---|---|---|---|
| Investigate possibility to automatically extract usage of all FW-rules to detect unused rules | Mitigate | Root Cause # 1 | Investigation concluded | 2026-04-30 | In progress |
Appendix
N/A
| Assignee | ||
Comment 2•3 months ago
|
||
We're monitoring this Bugzilla for Community feedback.
| Assignee | ||
Comment 3•2 months ago
|
||
We're monitoring this Bugzilla for Community feedback.
Updated•2 months ago
|
Whiteboard: [ca-compliance] [audit-finding] → [ca-compliance] [audit-finding] Next update 2026-04-30
You need to log in
before you can comment on or make changes to this bug.
Description
•