Last updated on: 2026-01-28

Applicant Information

Full Legal Name: Identity Digital Limited
Business URL: https://www.identity.digital/
Primary Business Phone: +1 4252982200
Primary Business Email: rsp@identity.digital
Country Code of Location: IE
Application Information
Application Type DNSSEC
Application Status Cleared
Technical Screening Status Cleared
RST Status Cleared
Application Questions
DNSSEC.1.1.Third-Party Certificate
Does or will this RSP have a publicly verifiable, third-party certification (e.g. ISO 27001) held directly by the organization and relevant to the registry services under application?
Response
Yes
DNSSEC.1.3.Physical Access Controls
Does or will this RSP have processes and controls to manage physical access to infrastructure and systems, including building access controls, security cameras and/or other sensors, physical environmental monitoring and safety equipment, and alarm systems related to the physical infrastructure?
Response
Yes
DNSSEC.1.4.System Access Controls
Does or will this RSP have processes and controls to manage non-physical access to infrastructure, including network access from both internal systems and external Internet systems, intrusion detection systems, security information and event management systems, network firewalls, network segmentation and isolation, user identification and authentication, and authorization schemes?
Response
Yes
DNSSEC.1.5.Vendor Management
Does or will this RSP have processes and controls pertaining to the selection of vendors and equipment suppliers, management and maintenance of assets while in use, procurement of assets, and safe disposal of assets?
Response
Yes
DNSSEC.1.6.Cryptographic Material
Does or will this RSP routinely renew and keep safe all cryptographic material necessary for the operation of the RSP?
Response
Yes
DNSSEC.1.7.Secure Data At-Rest
Does or will this RSP secure (e.g. encryption, tamper detection, etc…) at-rest data relevant to the operation of the RSP, including but not limited to DNSSEC if applicable?
Response
Yes
DNSSEC.1.8.Secure Data In-Transit
Does or will this RSP secure (e.g. encryption, tamper detection, etc…) in-transit data relevant to the operation of the RSP, including but not limited to DNSSEC if applicable?
Response
Yes
DNSSEC.1.9.Virtualization Controls
If applicable, does or will this RSP have security controls for data in virtualized environments, including controls relevant to both on-premises or private virtualization environments as well as public clouds, network isolation, memory isolation, process isolation, and hypervisor access controls?
Response
Yes
DNSSEC.1.10.CISO
Does or will this RSP have a senior executive primarily in charge of and responsible for security?
Response
Yes
DNSSEC.1.12.Background Checks
Does or will this RSP conduct background checks, both initial and on-going, of personnel and vendors relevant to the registry services under application?
Response
Yes
DNSSEC.1.14.BCP 38
Does or will this RSP comply with BCP 38?
Response
Yes
DNSSEC.1.15.Secure Routing
Does or will this RSP implement routing security of some nature, such as automated route filters, RPKI route origin validation, or other operational practices defined by the Internet Society and Global Cyber Alliance’s Mutually Agreed Norms for Routing Security (MANRS)?
Response
Yes
DNSSEC.2.2.Standard Hardware Maintenance
Does or will this RSP have documented, regular, and active practices for the maintenance of hardware relevant to the registry services under application?
Response
Yes
DNSSEC.2.3.Standard Hardware Lifecycle
Does or will this RSP have documented, regular, and active practices for the maintenance, upgrading, and patching of software relevant to the registry services under application?
Response
Yes
DNSSEC.2.4.Standard Hardware Lifecycle
Does or will this RSP have documented, regular, and active practices for the lifecycle of hardware relevant to the registry services under application?
Response
Yes
DNSSEC.2.5.Secure Software Development
Does or will this RSP have documented, regular, and active practices for the secure development of software?
Response
Yes
DNSSEC.2.6.Hardware Maintenance Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the maintenance of hardware relevant to the registry services under application?
Response
Yes
DNSSEC.2.7.Software Maintenance Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the maintenance, upgrading, and patching of software relevant to the registry services under application?
Response
Yes
DNSSEC.2.8.Hardware Lifecycle Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the lifecycle of hardware relevant to the registry services under application?
Response
Yes
DNSSEC.2.9.Software Development Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the development of software?
Response
Yes
DNSSEC.2.10.IaC
Does or will this RSP use Infrastructure-as-Code (IaC) to manage all systems relevant to operation of the registry services under application?
Response
Yes
DNSSEC.2.11.Automated Orchestration
Does or will this RSP use automated orchestration to manage all systems relevant to the operation of the registry services under application?
Response
Yes
DNSSEC.3.3.Tier III Data Center
Does or will this RSP have at least two Tier III (as defined here: https://uptimeinstitute.com/tiers) or equivalent data centers having no inter-dependencies?
Response
Yes
Attachments
DNSSEC.3.9.FIPS 140-3
Does or will this RSP use hardware security modules (HSMs) certified to at least FIPS 140-3 Level 3?
Response
Yes
DNSSEC.4.3.RFC 4033
Does or will this RSP implement RFC 4033 (“DNS Security Introduction and Requirements”)?
Response
Yes
DNSSEC.4.4.RFC 4034
Does or will this RSP implement RFC 4034 (“Resource Records for the DNS Security Extensions”)?
Response
Yes
DNSSEC.4.5.RFC 4035
Does or will this RSP implement RFC 4035 (“Protocol Modifications for the DNS Security Extensions”)?
Response
Yes
DNSSEC.4.6.RFC 4509
Does or will this RSP implement RFC 4509 (“Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)”)?
Response
Yes
DNSSEC.4.7.RFC 6840
Does or will this RSP implement RFC 6840 (“Clarifications and Implementation Notes for DNS Security (DNSSEC)”)?
Response
Yes
DNSSEC.4.8.RFC 6781
Does or will this RSP implement RFC 6781 (“DNSSEC Operational Practices, Version 2”)?
Response
Yes
DNSSEC.4.9.RFC 7583
Does or will this RSP implement RFC 7583 (“DNSSEC Key Rollover Timing Considerations”)?
Response
Yes
DNSSEC.4.10.RFC 9276
Does or will this RSP implement RFC 9276 (“Guidance for NSEC3 Parameter Settings”)?
Response
Yes
DNSSEC.4.11.RFCs 6605, 5702, and 8080
Does or will this RSP implement any of RFC 6605 (“Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC”), RFC 5702 (“Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC“), and/or RFC 8080 (“Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC”)?
Response
Yes
DNSSEC.4.14.KSK Rollovers
Describe the processes and procedures to be used to practice and ensure a successful KSK rollover for both emergency and non-emergency situations, including coordination with the MAIN RSP and IANA.
Response
Online KSK Rollovers For Online Key Signing Keys (KSKs), Identity Digital follows the “double DS” rollover method, as described in RFC 5011. The procedure is as follows: - A new KSK is generated. - The new KSK is added to the apex DNSKEY RRSet and signed using the current KSK. - A hold-down period of 2x the DNSKEY T TL is performed. - The new DS record is added to the parent zone (via IANA RZM request). - A hold-down period of 2x the DS TTL is performed. - The DNSKEY RRSet is signed using the new KSK. - A hold-down period of 2x the DNSKEY TTL is performed. - The old DS record is removed from the parent zone via IANA RZM request. - The old DNSKEY record is removed from the apex DNSKEY RRSet. Offline KSK Rollovers In the case where the Registry Operator or another MAIN-RSP controls the KSK, the KSK rollover methodology becomes their responsibility. Identity Digital, as DNSSEC-RSP, will generate the necessary Key Signing Request / Signed Key Response operations to facilitate the KSK rollover: - KSK owner informs Identity Digital of desired KSK rollover. - KSK owner generates a new KSK. - Identity Digital generates a KSR that will span the timeframe of the KSK rollover and validates the KSR. - Identity Digital encrypts the KSR and sends it to the KSK owner. - KSK owner generates the SKR based on the KSR. - KSK owner encrypts the SKR and sends it to Identity Digital. - Identity Digital validates the SKR and loads it into the DNSSEC Signing Subsystem External DNSSEC-RSP KSK Rollovers. Identity Digital performs DNSSEC operations after the MAIN-RSP has prepared an unsigned zone. For a DNSSEC-RSP outside of the organization, the unsigned zone will be transferred out to the DNSSEC-RSP, as shown in the Transfer Data Source in ID_DNSSEC.4.14_Data-Flow_1of1. It is the responsibility of the DNSSEC-RSP to then correctly perform the KSK rollover according to their preferred methodology and validate the zone. The signed zone (along with any changes to the DNSKEY RRSet as part of a KSK rollover) are then transferred from the DNSSEC-RSP and sent to all DNS-RSPs for publication and resolution. Emergency KSK Rollovers There are two distinct emergency scenarios that could involve a KSK rollover: The compromise of a key, or the compromise of one or more Hardware Security Modules (HSMs). The highest priority is always to keep the zone resolving and avoid validators who consider the zone Invalid. To this effect, the most prudent procedure involves removing the current DNSSEC signature, and then quickly performing a KSK installation. This would be executed as follows: - Identity Digital informs the IANA, as the parent zone operator of an emergency KSK rollover, and requests that the DS record for the compromised key be removed immediately. - A new KSK is generated. - The new KSK replaces the old KSK in the apex DNSKEY RRSet and is signed using the current KSK, with a TTL of 120. - A hold-down period of 2x the DNSKEY TTL is performed. - The new DS record is added to the parent zone (via IANA RZM request). - A hold-down period of 2x the DS TTL is performed. - The DNSKEY RRSet is signed using the new KSK. - A hold-down period of 2x the DNSKEY TTL is performed. Using this method, new queries for the DS record will immediately show the change in the zone, which decreases the possibility of the zone not resolving if caches do not purge data quickly enough. For the first scenario, Identity Digital will follow the procedure above. In the second scenario, where the potential for all keys on the HSM have been compromised, the above procedure would be repeated across all affected zones.
Attachments
DNSSEC.4.15.DNSSEC Virtualization
Does or will this RSP compartmentalize (e.g. virtualization) the DNSSEC service in such a manner that each compartment (e.g. containers, virtual machines, physical machines) is dedicated to DNSSEC (excluding system services such as monitoring, remote access NTP)?
Response
Yes
DNSSEC.5.1.DNSSEC Service Continuity Exercise
Does or will this RSP regularly exercise DNSSEC service continuity actions?
Response
Yes
DNSSEC.5.3.Transfer of Operations
Does or will this RSP be capable of transferring all applicable operations to another RSP as defined by the Material Subcontracting Arrangement Technical Questions?
Response
Yes
DNSSEC.5.4.EBERO
Does or will this RSP participate in coordinated Emergency Back-end Registry Operator (EBERO) transitions, including but not limited to maintaining the DNSSEC chain of trust, of hosted gTLDs when the business relationship of this RSP and the Registry Operator is not in good standing?
Response
Yes
DNSSEC.6.1.Internal Monitoring
Does or will this RSP monitor for faults inside its own network?
Response
Yes
DNSSEC.6.2.External Monitoring
Does or will this RSP monitor for faults from a point outside any of its own networks?
Response
Yes
DNSSEC.6.3.Fault Triage
Does or will this RSP have documented processes for aggregation and triage of faults?
Response
Yes
DNSSEC.6.4.Fault Mitigation
Does or will this RSP have documented processes to mitigate faults once detected?
Response
Yes
DNSSEC.6.6.Fault Minimization
Does or will this RSP have processes to minimize faults during maintenance of systems, including both automated processes and manual change control processes?
Response
Yes
DNSSEC.6.7.On-call Staff
Does or will this RSP have personnel capable of reacting to and mitigating faults 24 hours per day of every day of every year of service?
Response
Yes
DNSSEC.6.8.Service Disruptions
Provide documentation regarding any RSP functions currently being served for any gTLD, the domain names of the gTLDs, and all service disruptions for each gTLD in the past six months, where a service disruption is defined by Specification 10 of the ICANN Registry Agreement (2024).
Response
Per the clarifying information ICANN has provided regarding this question via the FAQs posted on the RSP Pre-Evaluation site, Identity Digital confirms that in the six months preceding the submission of this application, we have not experienced any service disruptions that went beyond the Emergency Threshold defined in Section 6 of Specification 10 of the ICANN Registry Agreement for any supported TLDs.