Closed
Bug 2008027
Opened 2 months ago
Closed 29 days ago
PKIoverheid: TSP CIBG Findings in 2025 ETSI Audit - Incident Report #6 – Access Control Management
Categories
(CA Program :: CA Certificate Compliance, task)
CA Program
CA Certificate Compliance
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: Patrick.Berg, Assigned: pkioverheid)
Details
(Whiteboard: [ca-compliance] [audit-finding])
Preliminary Incident Report
Summary
- Incident Description:
- Minor Non-conformity: Access Control Management
- Relevant Policies:
- ETSI 319 401 (Clause 7.4)
- Source of incident disclosure:
- Annual ETSI Audit
Updated•2 months ago
|
Assignee: nobody → Patrick.Berg
Status: UNCONFIRMED → ASSIGNED
Type: defect → task
Ever confirmed: true
Whiteboard: [ca-compliance] [audit-finding]
| Reporter | ||
Comment 1•2 months ago
|
||
The full incident report is in its final review stage and will be posted shortly.
| Reporter | ||
Comment 2•2 months ago
|
||
Full Incident Report
Summary
- CA Owner CCADB unique ID: A000068
- Incident description: Some compliance issues were found in Access Control management. Some inconsistencies were found in the document used for Access Control Management, such as an error in the number of trusted roles, as well as an error in a formula used for the definition of conditions. Also, although requests for revocation of trusted roles contain a deadline, in the revocation process there are no measures to assure that the deadline is met. Lastly, not all historical versions of the Access Control Management document were available.
- Timeline summary:
- Non-compliance start date: N/A
- Non-compliance identified date: 26-Sep-2025
- Non-compliance end date: Ongoing
- Relevant policies:
- ETSI 319 401 (Clause 7.4)
- Source of incident disclosure: Finding by CAB during annual ETSI audit.
Impact
- Total number of certificates: N/A
- Total number of "remaining valid" certificates: N/A
- Affected certificate types: N/A
- Incident heuristic: N/A
- Was issuance stopped in response to this incident, and why or why not?: N/A (see "additional considerations" below)
- Analysis: N/A
- Additional considerations: CIBG only operates legacy S/MIME-capable CAs but has never issued actual S/MIME-capable end-entity certificates. CIBG only issues certificates for use in the CIBG healthcare ecosystem.
Timeline
- 26-Sep-2025: Auditor identifies finding
- 23-Oct-2025: Created Corrective Action Plan
- 06-11-2025: Corrective Action Plan Approved by auditor
Related Incidents
N/A
Root Cause Analysis
-
Contributing Factor 1: Insufficient QA on the Access Control document
- Description: Over time during its many updates several mistakes were introduced which stayed unnoticed due to insufficient QA. No approval was needed for changes the Access Control document missing the scrutiny needed for QA.
- Timeline: See main timeline.
- Detection: Audit finding by CAB.
- Interaction with other factors: No.
- Root Cause Analysis methodology used: N/A
-
Contributing Factor 2: Document Management process with limited scope
- Description: At the moment, a formal document management process has only been drawn up for the Certification Practice Statement (CPS), as this is specifically required by ETSI. Availability of historical versions is the Access Control document is only done through a quarterly snapshot (source information used for this document is available).
- Timeline: See main timeline.
- Detection: Audit finding by CAB.
- Interaction with other factors: No.
- Root Cause Analysis methodology used: N/A
-
Contributing Factor 3: No direct link between CIBG's termination of employment and transfer process and the Access Control process
- Description: At the moment, termination of employment and transfer information is not automatically shared within the Access Control process which can lead to stale entries.
- Timeline: See main timeline.
- Detection: Audit finding by CAB.
- Interaction with other factors: No.
- Root Cause Analysis methodology used: N/A
Lessons Learned
- What went well: N/A
- What didn’t go well: N/A
- Where we got lucky: N/A
- Additional: N/A
Action Items
| Action Item | Kind | Corresponding Root Cause(s) | Evaluation Criteria | Due Date | Status |
|---|---|---|---|---|---|
| Expand formal document management process to also include the Access Control document and its QA | Prevent | Root Cause #1, #2 | Check | 2025-12-19 | Completed |
| Automated pushes of termination of employment and transfer information into the Access Control process | Prevent | Root Cause #3 | Check | 2026-01-09 | In progress |
Appendix
N/A
Updated•1 month ago
|
Assignee: Patrick.Berg → pkioverheid
| Assignee | ||
Comment 3•1 month ago
|
||
All action items have been closed. A Report Closure Summary will be posted shortly.
| Assignee | ||
Comment 4•1 month ago
|
||
Report Closure Summary
- Incident description: Some compliance issues were found in Access Control management. Some inconsistencies were found in the document used for Access Control Management, such as an error in the number of trusted roles, as well as an error in a formula used for the definition of conditions. Also, although requests for revocation of trusted roles contain a deadline, in the revocation process there are no measures to assure that the deadline is met. Lastly, not all historical versions of the Access Control Management document were available.
- Incident Root Cause(s): Over time during its many updates several mistakes were introduced which stayed unnoticed due to insufficient QA. No approval was needed for changes the Access Control document missing the scrutiny needed for QA. At the moment of observation, a formal document management process has only been drawn up for the Certification Practice Statement (CPS), as this is specifically required by ETSI. Availability of historical versions is the Access Control document is only done through a quarterly snapshot (source information used for this document is available). At the moment of observation, termination of employment and transfer information is not automatically shared within the Access Control process which can lead to stale entries.
- Remediation description: The formal document management process has been expanded to also include the Access Control document and its QA. The Access Control management process has been expanded and automated pushes of termination of employment that transfer that information into the Access Control process are now in place, assuring timely processing.
- Commitment summary: In addition to the remediation description CIBG commits to adding to the internal audit plan the checking of timely access control processing.
All Action Items disclosed in this report have been completed as described, and we request its closure.
Comment 5•1 month ago
|
||
This is a final call for comments or questions on this Incident Report.
Otherwise, it will be closed on approximately 2026-02-06.
Whiteboard: [ca-compliance] [audit-finding] → [close on 2026-02-06] [ca-compliance] [audit-finding]
Updated•29 days ago
|
Status: ASSIGNED → RESOLVED
Closed: 29 days ago
Resolution: --- → FIXED
Whiteboard: [close on 2026-02-06] [ca-compliance] [audit-finding] → [ca-compliance] [audit-finding]
You need to log in
before you can comment on or make changes to this bug.
Description
•