PKI as a Service old


"4.1 billion: Number of data records compromised during just the first six months of 2019."

(2019 State of Security Operations – MicroFocus)

Encryption Consulting's PKI As A Service

An efficient and secure way to manage access using trusted credentials. Get your own dedicated Microsoft PKI delivered as PKI As A Service, hosted in Azure.

Key Points

An Enterprise PKI in the cloud

Many organizations are moving core components of their infrastructure to the cloud to enable cost savings and provide scalability. When running a PKI, the challenge is to both secure the root as an offline resource and to separately manage the Root CA and issuing sub-CAs which need to be accessible online for certificate requests and issuances. Encryption Consulting has the expertise and secure environment necessary to hold the Root Private Key offline and to manage the signing of keys used for online RAs and issuing sub-CAs.

Customers will have a two-tier PKI CA hierarchy.  All CAs within this CA hierarchy will only issue CA and end-entity certificates for internal usage.  Customer PKI CA hierarchy consists of a single PKI Root CA and two or more PKI Issuing CAs as per their requirement.

Deployed to industry best practice, with supporting policy and procedures tailored to your own organization’s compliance requirements, the Encryption Consulting Managed PKI  Service will provide you with a robust infrastructure to provide a solid foundation for your corporate PKI requirements.

Encryption Consulting's PKI As A Service

Encryption Consulting will deploy and support your PKI using a fully developed and tested set of procedures and audited processes. Admin rights to your Active Directory will not be required and control over your PKI and its associated business processes will always remain with you. Furthermore, for security reasons the CA keys will be held in FIPS140-2 Level 3 HSMs hosted either in in your secure datacenter or in our Encryption Consulting datacenter in Dallas, Texas.

Hosted Root CA

The trust anchor of a PKI is a high-assurance Root CA. If you choose to use our Root Service, your Root will be hosted securely in our SOC2-certified datacenter in Dallas, Texas. If required, we can support customers participation in the Root CA build,and will undertake a Key Signing Ceremony (KSC) with you for this purpose. This is the event where the protected key material for the CA is created and implemented according to your policy.

As this is your PKI, you are the only one who has access to the Root CA private keys; these are protected by a quorum of HSM control keys of which you hold the majority share. This means that no one can initialize the Root to create additional Sub-CAs or revoke Sub-CAs without your presence. After the KSC, Encryption Consulting will facilitate Root CRL signings as often as required. Signings will be undertaken under the accreditation and compliance requirements for the specific Root CA, according to its policy.

Additional Services

Encryption Consulting can also offer further services related to the Root CA such as:

  • Sub CA signings
  • Root CA and sub CA certificate lifecycle management advice (e.g. hashing algorithms / cryptographic algorithms)
  • Policy / certificate profile advice
  • Root maintenance
    • Root migration / rollover

Benefits of a PKI As A Service

Key Features and Technical Specifications

Case Study

Encryption Consulting assisted a Retail institution to implement a new PKI Infrastructure.

"Encryption Consulting is exceptional in helping to manage our PKI and also helped us follow the best industry PKI practice"

Senior PKI Engineer, Insurance Company


PKI as a Service

Validating and trusting an identity is one of the most important aspects of Cyber Security.


Global PKI and IoT Trends Study

According to the findings, the rapid growth in the use of IoT devices is having an impact on the use of PKI technologies

Download Report
Know more