Compromise and Disaster Recovery

Incident and Compromise Handling Procedures

The disaster recovery plan addresses the following:

  1. the conditions for activating the plans

  2. resumption procedures

  3. a maintenance schedule for the plan

  4. awareness and education requirements

  5. the responsibilities of the individuals

  6. recovery point objective (RPO) of fifteen minutes

  7. recovery time objective (RTO) of 24 hours for essential CA operations which include Certificate revocation, and issuance of Certificate revocation status

  8. testing of recovery plans

In order to mitigate the event of a disaster, the CAs have implemented the following:

  1. Four datacenters with highly-available HSMs and secure on-site and off-site storage of backup HSMs containing copies of all CA Private Keys

  2. secure on-site and off-site storage of all requisite activation materials

  3. database replication between primary and secondary regions

  4. daily database backups within both the primary and secondary regions

  5. weekly backup of critical data to a secure off-site storage facility

  6. secure off-site storage of disaster recovery plan and disaster recovery procedures

  7. environmental controls as described in ยง5.1

Entrust has implemented physical datacenters near Dallas, TX and Denver, CO. For European Union coverage, Entrust has also implemented physical datacenters in Munich and Frankfurt, Germany.

Cloud-based components utilize multiple availability zones for high availability and a secondary region for disaster recovery.

Entrust requires rigorous security controls to maintain the integrity of the CAs. The compromise of the Private Key used by a CA is viewed by Entrust as being very unlikely; however, Entrust has policies and procedures that will be employed in the event of such a compromise. At a minimum, all RAs will be informed as soon as practicable of such a compromise. Certificates signed by the compromised CA will be revoked.

Computing Resources, Software, and/or Data are Corrupted

No stipulation.

Entity Private Key Compromise Procedures

In the event of a compromised RA credential, the credential is revoked.

Business Continuity Capabilities After a Disaster

No stipulation.