See below for the practice statement on life-cycle technical controls.

System Development Controls

Systems developed by Entrust are deployed according to Entrust software lifecycle development standards.

Security Management Controls

The configuration of the CA system and any modifications and upgrades shall be documented and controlled. Methods of detecting unauthorized modifications to the CA system and configuration are in place to ensure the integrity of the security software, firmware, and hardware for correct operation. A formal configuration and change management methodology is used to install and maintain the CA system.

Life Cycle Security Controls

No stipulation.