to the management of unisys corporation...

4
REPORT OF THE INDEPENDENT ACCOUNTANT To the management of Unisys Corporation (“Unisys”): We have examined for its Certification Authority (CA) operations at Eagan, MN and Roseville, MN, Unisys’ disclosure of its SSL certificate lifecycle management business practices, including its commitment to provide SSL certificates in conformity with the CA/Browser Forum Requirements on the Unisys website, the provision of such services in accordance with its disclosed practices, and the design of its controls over key and SSL certificate integrity, over the authenticity and confidentiality of SSL subscriber and relying party information, over continuity of key and SSL certificate lifecycle management operations, and over development, maintenance, and operation of CA systems integrity, and over meeting the network and certificate system security requirements set forth by the CA/Browser Forum throughout the period July 1, 2015 to June 30, 2016 for its Root Unisys Internal Certification Authority (UIS-Root-CA), INT-B Intermediate Certification Authority (UIS-IntB-CA), and ISU-B1 Issuing Certification Authority (UIS-IsuB1-CA). These disclosures and controls are the responsibility of Unisys’s management. Our responsibility is to express an opinion on the conformity of these disclosures and controls with the WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Network Security v2.0, based on our examination. We conducted our examination in accordance with standards for attestation engagements established by the American Institute of Certified Public Accountants and, accordingly, included: (1) obtaining an understanding of Unisys’ SSL certificate lifecycle management business practices, including its relevant controls over the issuance, renewal, and revocation of SSL certificates, and obtaining an understanding of Unisys’ network and certificate system security to meet the requirements set forth by the CA/Browser Forum; (2) selectively testing transactions executed in accordance with disclosed SSL certificate lifecycle management practices; (3) testing and evaluating the operating effectiveness of the controls; and (4) performing such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion. During our examination, we noted the following matter: Impacted WebTrust for CAs Baseline Criterion Matter Noted Principle 2 Criterion §2.1 requires the CA to meet the minimum requirements for Certificate Content and Profile, including the Issuer Information. The Issuer Information section is included within certificates issued by the CA; however the required fields for Issuer Organization Name, and Issuer Country Name are not documented. As a result, we noted that Unisys had not maintained effective controls to meet Principle 2, Criterion §2.1 during the period July 1, 2015 through June 30, 2016. KPMG LLP is a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. KPMG LLP 1601 Market Street Philadelphia, PA 19103-2499

Upload: others

Post on 06-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: To the management of Unisys Corporation (“Unisys”)uispki.unisys.com/rep/2016_Unisys_SSL_Audit_Report.pdf · We have examined for its Certification Authority (CA) operations at

REPORT OF THE INDEPENDENT ACCOUNTANT

To the management of Unisys Corporation (“Unisys”):

We have examined for its Certification Authority (CA) operations at Eagan, MN and Roseville, MN, Unisys’ disclosure of its SSL certificate lifecycle management business practices, including its commitment to provide SSL certificates in conformity with the CA/Browser Forum Requirements on the Unisys website, the provision of such services in accordance with its disclosed practices, and the design of its controls over key and SSL certificate integrity, over the authenticity and confidentiality of SSL subscriber and relying party information, over continuity of key and SSL certificate lifecycle management operations, and over development, maintenance, and operation of CA systems integrity, and over meeting the network and certificate system security requirements set forth by the CA/Browser Forum throughout the period July 1, 2015 to June 30, 2016 for its Root Unisys Internal Certification Authority (UIS-Root-CA), INT-B Intermediate Certification Authority (UIS-IntB-CA), and ISU-B1 Issuing Certification Authority (UIS-IsuB1-CA).

These disclosures and controls are the responsibility of Unisys’s management. Our responsibility is to express an opinion on the conformity of these disclosures and controls with the WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Network Security v2.0, based on our examination.

We conducted our examination in accordance with standards for attestation engagements established by the American Institute of Certified Public Accountants and, accordingly, included:

(1) obtaining an understanding of Unisys’ SSL certificate lifecycle management business practices, including its relevant controls over the issuance, renewal, and revocation of SSL certificates, and obtaining an understanding of Unisys’ network and certificate system security to meet the requirements set forth by the CA/Browser Forum;

(2) selectively testing transactions executed in accordance with disclosed SSL certificate lifecycle management practices;

(3) testing and evaluating the operating effectiveness of the controls; and (4) performing such other procedures as we considered necessary in the circumstances.

We believe that our examination provides a reasonable basis for our opinion.

During our examination, we noted the following matter:

Impacted WebTrust for CAs Baseline Criterion

Matter Noted

Principle 2 Criterion §2.1 requires the CA to meet the minimum requirements for Certificate Content and Profile, including the Issuer Information.

The Issuer Information section is included within certificates issued by the CA; however the required fields for Issuer Organization Name, and Issuer Country Name are not documented. As a result, we noted that Unisys had not maintained effective controls to meet Principle 2, Criterion §2.1 during the period July 1, 2015 through June 30, 2016.

KPMG LLP is a Delaware limited liability partnership and the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity.

KPMG LLP1601 Market StreetPhiladelphia, PA 19103-2499

Page 2: To the management of Unisys Corporation (“Unisys”)uispki.unisys.com/rep/2016_Unisys_SSL_Audit_Report.pdf · We have examined for its Certification Authority (CA) operations at

In our opinion, except for the matter noted above, throughout the period July 1, 2015 to June 30, 2016, Unisys has, in all material respects:

disclosed its SSL certificate lifecycle management business practices in its: o Unisys Internal PKI (UIPKI) Certification Practice Statement Version 1.16 ; and o Unisys Internal PKI (UIPKI) Certificate Policy Version 1.12a,

including its commitment to provide SSL certificates in conformity with the CA/Browser Forum Requirements on the Unisys website, and provided such services in accordance with its disclosed practices

maintained effective controls to provide reasonable assurance that: o the integrity of keys and SSL certificates it manages is established and protected throughout

their lifecycles; and o SSL subscriber information is properly authenticated (for the registration activities performed

by Unisys)

maintained effective controls to provide reasonable assurance that: o logical and physical access to CA systems and data is restricted to authorized individuals; o the continuity of key and certificate management operations is maintained; and o CA systems development, maintenance, and operations are properly authorized and

performed to maintain CA systems integrity]

maintained effective controls to provide reasonable assurance that it meets the Network and Certificate System Security Requirements as set forth by the CA/Browser Forum

based on the WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Network Security v2.0.

Unisys’ management is responsible for its assertion. Our responsibility is to express an opinion on management’s assertion based on our examination.

The relative effectiveness and significance of specific controls at Unisys and their effect on assessments of control risk for subscribers and relying parties are dependent on their interaction with the controls, and other factors present at individual subscriber and relying party locations. We have performed no procedures to evaluate the effectiveness of controls at individual subscriber and relying party locations.

Because of the nature and inherent limitations of controls, Unisys’ ability to meet the aforementioned criteria may be affected. For example, controls may not prevent, or detect and correct, error, fraud, unauthorized access to systems and information, or failure to comply with internal and external policies or requirements. Also, the projection of any conclusions based on our findings to future periods is subject to the risk that changes may alter the validity of such conclusions.

This report does not include any representation as to the quality of Unisys’ services beyond those covered by the WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Network Security v2.0, nor the suitability of any of Unisys’ services for any customer's intended purpose.

Certified Public Accountants Philadelphia, Pennsylvania September 20, 2016

Page 3: To the management of Unisys Corporation (“Unisys”)uispki.unisys.com/rep/2016_Unisys_SSL_Audit_Report.pdf · We have examined for its Certification Authority (CA) operations at

UNISYS MANAGEMENT’S ASSERTION

Unisys Corporation (“Unisys”) operates the Certification Authority (CA) services known as the Root Unisys Internal Certification Authority (UIS-Root-CA), INT-B Intermediate Certification Authority (UIS-IntB-CA), and ISU-B1 Issuing Certification Authority (UIS-IsuB1-CA) and provides SSL CA services.

The management of Unisys is responsible for establishing and maintaining effective controls over its SSL CA operations, including its network and certificate security system controls, its SSL CA business practices disclosure on its website, SSL key lifecycle management controls, and SSL certificate lifecycle management controls. These controls contain monitoring mechanisms, and actions are taken to correct deficiencies identified.

There are inherent limitations in any controls, including the possibility of human error, and the circumvention or overriding of controls. Accordingly, even effective controls can only provide reasonable assurance with respect to Unisys’ Certification Authority operations. Furthermore, because of changes in conditions, the effectiveness of controls may vary over time.

Unisys management has assessed its disclosures of its certificate practices and controls over its SSL CA services. Based on that assessment, in Unisys management’s opinion, in providing its SSL Certification Authority (CA) services at Eagan, MN and Roseville, MN, throughout the period July 1, 2015 to June 30, 2016, Unisys has:

disclosed its SSL certificate lifecycle management business practices in its: o Unisys Internal PKI (UIPKI) Certification Practice Statement Version 1.16 ; and o Unisys Internal PKI (UIPKI) Certificate Policy Version 1.12a ,

including its commitment to provide SSL certificates in conformity with the CA/Browser Forum Requirements on the Unisys website, and provided such services in accordance with its disclosed practices

maintained effective controls to provide reasonable assurance that: o the integrity of keys and SSL certificates it manages is established and protected

throughout their lifecycles; and o SSL subscriber information is properly authenticated (for the registration activities

performed by Unisys)

maintained effective controls to provide reasonable assurance that: o logical and physical access to CA systems and data is restricted to authorized individuals; o the continuity of key and certificate management operations is maintained; and o CA systems development, maintenance, and operations are properly authorized and

performed to maintain CA systems integrity

maintained effective controls to provide reasonable assurance that it meets the Network and Certificate System Security Requirements as set forth by the CA/Browser Forum

based on the WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Network Security v2.0 except for the matter noted below:

Page 4: To the management of Unisys Corporation (“Unisys”)uispki.unisys.com/rep/2016_Unisys_SSL_Audit_Report.pdf · We have examined for its Certification Authority (CA) operations at

Impacted WebTrust for CAs Baseline Criterion

Matter Noted Additional Information Provided by Unisys Corporation

Principle 2 Criterion §2.1 requires the CA to meet the minimum requirements for Certificate Content and Profile, including the Issuer Information.

The Issuer Information section is included within certificates issued by the CA; however the required fields for Issuer Organization Name, and Issuer Country Name are not documented. As a result, we noted that Unisys had not maintained effective controls to meet Principle 2, Criterion §2.1 during the period July 1, 2015 through June 30, 2016.

While these specific fields are not included, this information can be inferred by the following information present in every certificate:

Other Issuer Information fields include both the name of the company (Unisys), and their stock symbol (UIS), from which the data for these fields may be inferred.

The Extensions fields include links to the external Unisys PKI website, and the Relying Party Agreement and Certificate Policy document, which document this information and provide specific names, addresses and telephone numbers available for contact.

All SSL certificates are issued to internal Unisys resources, and the Organization and Country name are displayed in the Subject fields.

We note that providing the information in the format specified would have required retirement of the existing CAs, invalidation of existing end user certificates and replacement by new CAs.

Chris Odom Vice President – Global Infrastructure September 20, 2016