PKI-As-A-Service

continue

"4.1 billion: Number of data records compromised during just the first six months of 2019."

(2019 State of Security Operations – MicroFocus)

Encryption Consulting’s PKI-As-A-Service:

An efficient and secure way to manage access using trusted credentials. Get your own dedicated PKI solution delivered as PKI-As-A-Service, hosted in cloud (AWS, Azure PKI, Google Cloud Certificate Authority manager).

Key Points

  • Encryption Consulting’s PKI-As-A-Service offers you a customizable, and high assurance PKI solution (On-prem and Cloud) designed and built to the highest standards.
  • Encryption Consulting’s PKI-As-A-Services are suitable for:
    • Customers who may already have an existing PKI.
    • Customers planning for a new PKI Infrastructure (Designing and deploying).
  • Encryption Consulting provides PKI Services for existing PKI infrastructure and helps to design and deploy a new PKI Infrastructure for Traditional PKI (On-Prem) as well as, PKI on the Cloud (such as, AWS Certificate Manager/ AWS Certificate manager Private CA (ACM PCA); Azure PKI; Google Cloud Certificate Authority manager).
  • It is a low-risk solution that gives you full control of your PKI without worrying about the complexity of the solution.

An Enterprise PKI in the cloud

Many organizations are moving core components of their infrastructure to the cloud to enable cost savings and provide scalability. When running a PKI, the challenge is to secure the root as an offline resource and to separately manage the Root CA and issuing sub-CAs which need to be accessible online for certificate requests and issuance. Encryption Consulting has the expertise and secure environment necessary to hold the Root Private Key offline and to manage the signing of keys used for online RAs and issuing sub-CAs.
Encryption Consulting manages PKI on-premises, as well as in-the cloud. Customers will have a PKI CA hierarchy (two-tier or three-tier) as per their business needs.  All CAs within this CA hierarchy will only issue certificates to the below level CAs and end-entity certificates for internal usage.  The two-tier PKI CA hierarchy consists of a single PKI Root CA and two or more PKI Issuing CAs as per their business requirement.

Deployed to industry best practice, with supporting policy and procedures tailored to your own organization’s compliance requirements, the Encryption Consulting Managed PKI Service will provide you with a robust infrastructure to provide a solid foundation for your corporate PKI requirements.

Encryption Consulting's Managed PKI:

Encryption Consulting LLC (EC) will completely offload the Public Key Infrastructure environment, which means EC will take care of building the PKI infrastructure to lead and manage the PKI environment (on-premises, PKI in the cloud, cloud-based hybrid PKI infrastructure) of your organization.
Encryption Consulting will deploy and support your PKI using a fully developed and tested set of procedures and audited processes. Admin rights to your Active Directory will not be required and control over your PKI and its associated business processes will always remain with you. Furthermore, for security reasons the CA keys will be held in FIPS140-2 Level 3 HSMs hosted either in in your secure datacenter or in our Encryption Consulting datacenter in Dallas, Texas.

Encryption Consulting’s services related to PKI-As-A-Service

Dedicated

  • Advanced security expertise will be assigned for the service
  • Consistent and Flexible to meet your organization’s demands
  • In-House Organization Still maintains complete oversight
  • Not Dependent on company turnover

Reduces Cost & Complexity

  • Quicker Deployment
  • Less in-house issues
  •  Reduces spending for in-house technologies
  • Periodic PKI Assessments & Trainings

Scalability and Flexibility

  • Provide observations and recommendations regarding current and future initiatives to help achieve desired future state capabilities.

Hosted Root CA

The trust anchor of a PKI is a high-assurance Root CA. If you choose to use our Root Service, your Root will be hosted securely in our SOC2-certified datacenter in Dallas, Texas. If required, we can support customers participation in the Root CA build and will undertake a Key Signing Ceremony (KSC) with you for this purpose. This is the event where the protected key material for the CA is created and implemented according to organization’s policy.
As this is your PKI, you are the only one who has access to the Root CA private keys; these are protected by a quorum of HSM control keys of which you hold the majority share. This means that no one can initialize the Root to create additional Sub-CAs or revoke Sub-CAs without your permission. After the KSC, Encryption Consulting will facilitate Root CRL signings as often as required. Signings will be undertaken under the accreditation and compliance requirements for the specific Root CA, according to its policy.

Cloud-based PKI options

Encryption consulting helps building and manage PKI infrastructure as per the customers business requirement. Here we are showing few of the cloud-based PKI architecture which we have already leveraged and implemented for our clients.

Two-Tier Cloud-based PKI Model

  • In this approach the Root CA is on-prem and kept offline.
  • Two issuing CAs are deployed – CA1 (on-prem) and CA2 (on the cloud).
  • CA2 will focus on issuance and availability outside of the premises.
  • Whereas the on-prem issuing CA or CA1 will have security focus on non-cloud resources for example: workstation authentication, domain certificate etc.
  • This model can also be used as HA (high availability) concept – If one issuing CA is unavailable then the other one can take over (optional).

Three-Tier Hybrid PKI Cloud-based Model

  • Root CA – on prem, kept offline and it is using HSM for its signing key.
  • Policy CA- on prem, kept offline and it is using HSM for its signing key.
  • Incorporating the approach explained in option 3.
  • One issuing CA is in the cloud (CA2) and another issuing CA is on-prem (CA1) and both issuing CAs using HSMs.
  • With this model we can allow the CA to be placed in the cloud and also be assured with the FIPS- level 3 certified HSM being secured on the cloud.

Additional Services

Encryption Consulting can also offer further services related to the Root CA such as:

  • Sub CA signings
  • Root CA and sub CA certificate lifecycle management advice (e.g. hashing algorithms / cryptographic algorithms)
  • Policy / certificate profile advice
  • Root maintenance
    • Root migration / rollover

Benefits of a PKI-As-A-Service

Key Features and Technical Specifications

Case Study

Encryption Consulting assisted a Retail institution to implement a new PKI Infrastructure.

"Encryption Consulting is exceptional in helping to manage our PKI and also helped us follow the best industry PKI practice"

Senior PKI Engineer, Insurance Company

Blog

PKI as a Service

Validating and trusting an identity is one of the most important aspects of Cyber Security.

Report

Global PKI and IoT Trends Study

According to the findings, the rapid growth in the use of IoT devices is having an impact on the use of PKI technologies

Download Report
Know more