PIN Security Requirements:
28-5.1 For CA and KDH certificate-signing requests, including certificate or key-validity status changes—for example, revocation, suspension, replacement—verification must include validation that:
- The entity submitting the request is who it claims to be.
- The entity submitting the request is authorized to submit the request on behalf of the certificate request’s originating entity.
- The entity submitting the request has a valid business relationship with the issuing authority (for example, the vendor) consistent with the certificate being requested.
- The certificate-signing request has been transferred from the certificate request’s originating entity to the RA in a secure manner.
Testing Procedures:
28-5.1.a Examine documented procedures to verify that certificate-signing requests, including certificate or key-validity status changes, require validation that:
- The entity submitting the request is who it claims to be.
- The entity submitting the request is authorized to submit the request on behalf of the certificate request’s originating entity.
- The entity submitting the request has a valid business relationship with the issuing authority (for example, the vendor) consistent with the certificate being requested.
- The certificate-signing request has been transferred from the certificate request’s originating entity to the RA in a secure manner.
28-5.1.b Observe certificate-signing requests, including certificate or key-validity status changes, to verify they include validation that:
- The entity submitting the request is who it claims to be.
- The entity submitting the request is authorized to submit the request on behalf of the certificate request’s originating entity.
- The entity submitting the request has a valid business relationship with the issuing authority (for example, the vendor) consistent with the certificate being requested.
- The certificate-signing request has been transferred from the certificate request’s originating entity to the RA in a secure manner.