Title: Certification Authority
1Certification Authority
2Overview
- Identifying CA Hierarchy Design Requirements
- Common CA Hierarchy Designs
- Documenting Legal Requirements
- Analyzing Design Requirements
- Designing a Hierarchy Structure
3Identifying CA Hierarchy Design Requirements
- Project Scope
- Applications that Use a PKI
- Which Accounts Use PKI-Enabled Applications?
- How to Identify Technical Requirements
- How to Identify Business Requirements
4Roles in a Certification Authority Hierarchy
5Applications That Use a PKI
DigitalSignatures
Smart Card Logon
EncryptingFile System
SecureE-mail
InternetAuthentication
SoftwareCode Signing
Software Restriction Policy
IP Security
802.1x
6Which Accounts Use PKI-Enabled Applications?
Users
Computers
Services
7How to Identify Technical Requirements
8How to Identify Business Requirements
9Common CA Hierarchy Designs
- CA Hierarchy Based on Certificate Usage
- CA Hierarchy Based on Location
- CA Hierarchy Based on Departments
- CA Hierarchy Based on Organizational Structure
10CA Hierarchy Based on Certificate Use
Certificate Use
S/MIME
EFS
RAS
Use a CA hierarchy based on certificate use to
- Implement different issuance requirements
- Meet local legal requirements for a specific
certificate type
11CA Hierarchy Based on Location
Location
India
Canada
United States
Use a CA hierarchy based on location to
- Meet legal requirements for local management
- Meet business requirements for CA availability
12CA Hierarchy Based on Organizational Structure
13Documenting Legal Requirements
- Steps for Designing Legal Requirements
- Security Policy
- Certificate Policy
- Certification Practice Statement
14Steps for Designing Legal Requirements
15Security Policy
A security policy
- Defines for using security services
- Reflects an organizations business and IT
strategy - Identifies applications to secure by using
certificates - Defines security services to offer by using
certificates
16Certificate Policy
A certificate policy describes
- The user identification process
- Private key management requirements
- The process for responding to lost or compromised
private keys - Certificate enrollment and renewal requirements
- The maximum dollar value for transactions
17Certification Practice Statement
A CPS can include these sections
- Introduction
- General Provisions
- Identification and Authentication
- Operational Requirements
- Physical, Procedural, and Personnel Security
Controls - Technical Security Controls
- Certificate and CRL Profile
- Specification Administration
18Analyzing Design Requirements
- Recommendations for Meeting Security Requirements
- Recommendations for Meeting External Access
Requirements - Recommendations for Meeting Application
Requirements - Recommendations for Meeting Administration
Requirements - Recommendations for Meeting Availability
Requirements
19Recommendations for Meeting Security Requirements
20Recommendations for Meeting External Access
Requirements
21Recommendations for Meeting Application
Requirements
22Recommendations for Meeting Administration
Requirements
23Recommendations for Meeting Availability
Requirements
24Designing a CA Hierarchy Structure
- Recommended Depth of a CA Hierarchy
- Security Levels in the CA Hierarchy
- Considerations for Choosing a CA Type
- CA Management Using Role Separation
- Guidelines for Designing a CA Hierarchy
25Recommended Depth of a CA Hierarchy
26Security Levels in the CA Hierarchy
- Security at the root CA
- Requires highest level of security
- Requires minimal access
- As the distance from the root CA increases
- Security decreases
- Access to issuing CAs increases
27Considerations for Choosing a CA Type
28Guidelines for Designing a CA Hierarchy
When designing a CA hierarchy
- Define the scope of your CA hierarchy design
- Define all requirements for your CA hierarchy
- Deploy an offline root CA
- Design a hierarchy that is no more than 3-4
layers - Define appropriate security levels for each CA
- Choose the appropriate CA policy for each CA
- Plan role separation early in the CA hierarchy
design