NAVY POLICY ON USE OF NIPRNET PUBLIC KEY INFRASTRUCTURE (PKI) SOFTWARE CERTIFICATES:
RTTUZYUW RUEWMCS0000 1041827-UUUU--RUCRNAD ZNR UUUUU R 141827Z APR 09 FM CNO WASHINGTON DC TO NAVADMIN BT UNCLAS//N5500// NAVADMIN 110/09 MSGID/GENADMIN/CNO WASHINGTON DC/N6// SUBJ/NAVY POLICY ON USE OF NIPRNET PUBLIC KEY INFRASTRUCTURE (PKI) SOFTWARE CERTIFICATES// REF/A/MSG/DON CIO WASHINGTON DC/031859Z DEC 08// REF/B/MSG/DON CIO WASHINGTON DC/122213Z MAY 08// NARR/REF A PROVIDED UPDATE TO DON PKI SOFTWARE CERTIFICATE POLICY. REF B ANNOUNCED THE DON CIO SOFTWARE CERTIFICATE MINIMIZATION EFFORT// POC/JOHN ROSS/CIV/OPNAV N61/LOC: WASHINGTON DC/ EMAIL: john.r.ross@navy.mil/TEL:703-604-7736// PASSING INSTRUCTIONS: NCMS: PLEASE PASS TO ALL NAVY NIPRNET LOCAL REGISTRATION AUTHORITY (LRAS). RMKS/1. LAST YEAR, DON CIO RELEASED REFS A AND B ADDRESSING THE ISSUE OF ACCEPTABLE SOFTWARE CERTIFICATE USE. THIS MESSAGE PROVIDES AMPLIFYING NAVY POLICY ON THE USE OF PKI SOFT CERTIFICATES. THE LACK OF APPROPRIATE HARDWARE (CARD READER) AND SOFTWARE (E.G. ACTIVCLIENT MIDDLEWARE) FOR USE OF THE CAC IS NO LONGER A VALID REASON FOR ISSUANCE OF PKI SOFTWARE CERTIFICATES FOR PERSONAL USE. 2. ACCEPTABLE SOFTWARE CERTIFICATE USE CASES ARE IDENTIFIED IN REFS A AND B. SPECIFIC NAVY GUIDANCE IS AS FOLLOWS: A. EXTERNAL CERTIFICATION AUTHORITY (ECA) CERTIFICATES - IF NAVY WEB SITES HAVE BEEN CAC ENABLED, USERS OF ECA CERTIFICATES SHOULD BE ADVISED TO OBTAIN MEDIUM ASSURANCE TOKEN CERTIFICATES. THESE ARE SOFTWARE CERTIFICATES ON A HARDWARE TOKEN AND HAVE A UNIQUE POLICY OBJECT IDENTIFIER (OID) WHICH ENABLES THEIR IDENTIFICATION BY RELYING PARTIES. APPROPRIATE ACCESS CONTROL MEASURES MUST ALSO BE IMPLEMENTED TO LIMIT ACCESS TO ONLY INDIVIDUALS WITH A "NEED TO KNOW". B. COALITION PARTNERS - APPROPRIATE ACCESS CONTROL MEASURES MUST BE IMPLEMENTED TO LIMIT ACCESS TO ONLY INDIVIDUALS WITH A "NEED TO KNOW". C. AFLOAT CONTINGENCY PLAN - ALL AFLOAT USERS HAVE BEEN PROVIDED WITH THE REQUISITE CARD READERS AND MIDDLEWARE TO ENABLE THE USE OF PKI CERTIFICATES ON THE CAC. ON SHIPS THAT DO NOT HAVE THE ABILITY TO ISSUE THE CAC, SOFTWARE CERTIFICATES MAY BE ISSUED AS A CONTINGENCY SHOULD A USER'S CAC BECOME LOST, STOLEN, LOCKED, DAMAGED OR OTHERWISE INOPERABLE. SOFTWARE CERTIFICATES ISSUED FOR THIS PURPOSE MUST BE TRACKED AND REVOKED UPON COMPLETION OF CAC MAINTENANCE OR CAC REPLACEMENT, AND SHALL BE ISSUED TO EXPIRE NO LATER THAN 30 DAYS AFTER THE END OF THE DEPLOYMENT. SOFTWARE CERTIFICATES ISSUED AND REVOKED AS A RESULT OF AFLOAT CONTINGENCY OPERATIONS SHALL BE REPORTED USING THE SAME PROCESS IDENTIFIED IN PARAGRAPH 5. D. INDIVIDUALS WHO ARE AUTHORIZED A COMMON ACCESS CARD MAY NO LONGER BE ISSUED NIPRNET SOFTWARE CERTIFICATES UNLESS DEEMED A MISSION ESSENTIAL REQUIREMENT AND AUTHORIZED BY THE NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS). AT THIS TIME THE ONLY VALID POPULATION AUTHORIZED FOR ISSUANCE OF SOFTWARE CERTIFICATES ARE THOSE FOREIGN NATIONALS WHO ARE AUTHORIZED TO RECEIVE A CAC BUT CANNOT BE ISSUED ONE DUE TO UNRESOLVED LOCAL OR NATIONAL ISSUES RELATED TO THE COLLECTION AND/OR STORAGE OF BIOMETRIC OR OTHER REQUIRED PERSONAL DATA. 3. NAVY REGISTRATION AUTHORITIES (RAS)/LOCAL REGISTRATION AUTHORITIES (LRAS) WILL NOT ISSUE SOFTWARE CERTIFICATES TO INDIVIDUALS WHO DO NOT QUALIFY UNDER PARAS 2.C OR 2.D ABOVE WITHOUT APPROVAL FROM THE NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS). 4. INSTALLATION PROCEDURES FOR SOFTWARE CERTIFICATES ARE AVAILABLE AT HTTPS:(SLASH)(SLASH)INFOSEC.NAVY.MIL(SLASH)PKI(SLASH)TRAINING.HTML <HTTPS:(SLASH)(SLASH)INFOSEC.NAVY.MIL(SLASH)PKI(SLASH)TRAINING.HTML> SOFTWARE CERTIFICATE INSTALLATION .P12 AND .PFX FILES MUST BE REMOVED FROM WORKSTATIONS IMMEDIATELY AFTER INSTALLATION IN WEB BROWSERS. 5. ALL INDIVIDUAL SOFTWARE CERTIFICATES MUST BE ISSUED BY AN AUTHORIZED NAVY REGISTRATION AUTHORITY (RA)/LOCAL REGISTRATIONAUTHORITY (LRA). LRAS WILL PROVIDE A MONTHLY REPORT TO THE NAVY RA AT NCMS WHICH WILL CONTAIN, AS A MINIMUM, THE FOLLOWING INFORMATION FOR EACH SOFTWARE CERTIFICATE ISSUED: NAME OF INDIVIDUAL CERTIFICATE(S) ISSUED TO, TYPES OF CERTIFICATE(S) ISSUED, VALIDITY PERIOD OF CERTIFICATE(S), JUSTIFICATION INCLUDING WHETHER THEY WERE ISSUED UNDER PARA 2.C OR 2.D ABOVE OR IF THEY WERE ISSUED BASED ON APPROVAL FROM THE NCMS, AND WHETHER OR NOT THE CERTIFICATE(S) HAVE BEEN REVOKED. IN ADDITION, THE MONTHLY REPORT WILL PROVIDE INFORMATION ON ALL GROUP/ROLE SOFTWARE CERTIFICATES ISSUED. 6. EFFECTIVE IMMEDIATELY, NCMS WILL PROVIDE QUARTERLY REPORTS TO CNO (N61 AND N6F52) WHICH WILL SUMMARIZE THE NUMBER, DESCRIPTION OF THE ASSOCIATED MISSION REQUIREMENT TYPES AND STATUS OF SOFTWARE CERTIFICATES ISSUED. 7. REQUEST WIDEST DISSEMINATION OF THIS MESSAGE. 8. RELEASED BY MR. KEVIN COOLEY, DIRECTOR OF INFORMATION TECHNOLOGY AND INFORMATION RESOURCE MANAGEMENT.// BT #0000 NNNN