PKI Buyer's Guide
PKI Buyer's Guide
The Essential
Guide to
Evaluating PKI
Solutions
Learn the 6 critical elements
of a modern PKI platform
Read before you start
If you’re reading this guide, chances are you’re in the market for a
new public key infrastructure (PKI) solution. Why? It could be that
your root certificate authority (CA) is about to expire, or maybe it’s
running on a server that’s near end-of-life. You may be rolling out a new
project or product line, or maybe it’s just that your current PKI solution
can’t support the growing volume and velocity of certificates in your
environment.
What’s inside
PKI comes in many forms and flavors, each designed to meet specific
use cases and requirements. This guide is intended to help you find
the right fit for your organization. It identifies the different types of
PKI, common use cases, key considerations, and guidance on how to
evaluate various solutions and service offerings.
Introduction 4
03 Evaluate solutions 9
Flexibility 12
Extensibility 14
Scalability 16
Certificate management 18
Public key infrastructure (PKI) is nothing new. It’s been widely adopted The use of PKI is
for the better part of two decades. Why? PKI delivers the critical
growing, and more
functions of authentication and encryption that ensure every connec-
tion — human to machine or machine to machine — is protected. It
machines use cer-
also enables organizations to digitally sign everything from code to tificates to encrypt
documents with a trusted and verified signature. communication for
authentication or
The world has become hyper-connected, making it more important than
ever to establish digital trust with a modern PKI. The adoption of PKI has
to sign workloads
extended well beyond traditional use cases like securing web servers or (i.e., code signing.)”
users and devices on the network. The productive and innovative ways
people use PKI today are simply incredible — delivering authenticity
across the Internet, enabling developers to move fast while staying Managing Machine Identities,
Secrets, Keys and Certificates,
secure, and even securing millions of connected vehicles. Erik Wahlstrom
Gartner, 16 Mar 2022
There’s truly no end to the potential for PKI to deliver value. That said,
many teams and organizations rely on outdated PKI software or multi-
ple point solutions, resulting in overly complex, manual, and risk-prone
processes. Fortunately, advancements in technology and cloud
services mean that PKI is now more flexible than ever, so long as you
have the right solution.
This guide was created to help IT, IoT, and security professionals better
understand the PKI landscape, evaluate solutions based on key criteria,
and ultimately, find a modern PKI platform to effectively protect and
enable their organization.
needs What you do with PKI is far more important than PKI itself. Begin
by assessing your organization’s unique use cases, IT policies,
Understand what your and available skills and resources required to support PKI. Taking
organization needs this step first will help you assess solutions based on your needs
in a PKI solution versus what vendors say you “need.”
DEDICATED TEAM
Expertise
Do you have the specialized expertise on staff required to deploy,
configure, and manage PKI? Remember, PKI is critical infra-
structure — a simple misconfiguration can lead to serious risks
and consequences. Also, consider whether you have enough
bandwidth on your team to handle ongoing maintenance and certif-
NO TEAM icate management.
FULLY MANAGED
Control
How hands-on does your organization want to be in managing PKI?
Should the solution be fully configurable or turnkey? Are there
policy or regulatory considerations that require your organiza-
tion’s PKI to remain on-premises? Or would you benefit from a
SaaS PKI or fully managed service?
SELF-MANAGED
MILLIONS
Scale
Another consideration is the scale and growth of your business
operations. This is where capabilities such as high availability,
active-active architecture, and auto-scaling become import-
ant. For instance, DevOps teams typically require high-volume
issuance and short-lived certificates. Not every PKI solution
THOUSANDS is able to support the volume and velocity of issuance in these
environments.
HIGH ASSURANCE
Trust & compliance
Perhaps the most important consideration is the level of assur-
ance behind your organization’s PKI. Depending on your industry,
corporate IT policy, and regulatory mandates, your organization’s
PKI will need to comply with certain standards. Be sure that the
PKI solution and vendor you select will help you meet these
LOW ASSURANCE requirements.
FULL AUTOMATION
Certificate management
It’s one thing to issue certificates — it’s another to manage them.
To avoid outages and security risks caused by untracked or
unmanaged certificates, consider the tools you’ll need to discover,
inventory, and manage them at scale. Some providers offer PKI
with full certificate lifecycle automation. Others require bolt-on
PROTOCOL-BASED solutions from other vendors.
Understand PKI is one of the most critical components in any security strategy.
Unfortunately, those responsible for deploying and managing PKI
the PKI face an increasingly complex landscape of CAs and PKI tools —
landscape
all with features that sound identical at the surface level. With
so many options, choosing the right PKI solution is anything but
straightforward.
Know your options and
the key differences
Public CAs
Publicly trusted CAs, also known as SSL/TLS certificate provid-
ers, issue certificates trusted by operating systems, browsers,
and applications. These are required for public-facing web servers
and code signing but shouldn’t be used for internal use cases.
Cloud CAs
Cloud-native CA solutions, such as AWS Private CA and Google
CA Service, are designed to support cloud workloads and services
within their own cloud environment but aren’t well-equipped to
handle on-prem or multi-cloud environments.
If you’re in the market for a PKI solution, chances are you’re not looking
for a traditional PKI. A solution that’s static, difficult to scale, and doesn’t
integrate with modern infrastructure isn’t a solution at all. On the other
hand, you don’t want point solutions either. You need one modern PKI
platform which meets all your use cases and that deploys however and
wherever you need it.
PKI solutions requirements. That’s a tall order, but not an impossible one.
The 6 critical elements of To achieve both security and flexibility, PKI must include six critical
a modern PKI platform elements. These elements can be used as guidelines when evalu-
ating PKI platform solutions. Some will carry more weight than
others, but all are important to assess and consider.
Extensibility Scalability
Integration to systems and Fast deployment, high availabil-
applications via protocols, APIs, ity, and on-demand issuance at
and pre-built plugins. any scale — large or small.
Self-service enrollment
Not everyone uses APIs and protocols. End users should have an
easy-to-use interface where they can request and obtain compliant
certificates for their applications. Look for solutions that provide a
registration authority (RA) that can be deployed on the same instance
as your CA or proxied to the CA to avoid exposing the CA to the domain.
You should also be able to define roles and access management rules,
as well as approval workflows for enrollment.
HSM integration
PKI acts as the root of trust for your organization, and therefore, it must
be safeguarded. Hardware security modules (HSMs) are essential to
protect CA keys against theft or misuse. Ensure the PKI solution you
choose offers flexible support for HSMs via PKCS#11 or REST API,
including hardware- and cloud-based HSM services, such as Azure Key
Vault or AWS CloudHSM.
Security needs to run wherever your teams do, without slowing them
53%
of organizations
down. When PKI systems are hard to deploy and administer, people say they don’t have
come up with workarounds or wind up deploying multiple PKI tools to enough staff to de-
solve different use cases — creating more complexity, effort, expense,
ploy and maintain
and risk.
their PKI
The good news is that advancements in PKI and cloud
technologies offer much more flexibility than ever 2023 State of Machine Identity
Management Report
before – so long as you choose a solution that offers:
Windows auto-enrollment
Auto-enrollment is still widely used to provision Active Directory-issued
certificates to Windows servers and clients. Look for a solution that can
augment and integrate with AD auto-enrollment environments, as well
as unified endpoint management (UEM) platforms, like Microsoft Intune.
REST API
The solution you want will provide value upfront, will work with both
modern and legacy systems, and will work across multiple siloed
apps. Beyond standards-based protocols, your PKI provider should
offer proprietary APIs that empower teams to integrate with custom
workflows and applications.
Gone are the days of one or two CAs behind the four walls of the data
256k
Average number
center. Now PKI is everywhere, and the average organization has more of internally issued
than 250,000 active certificates.* That number can look much different certificates within
for your organization — higher or lower — but there’s no denying that to
organizations
support the business, PKI must be able to scale.
On-demand provisioning
As new use cases and projects are initiated, the last thing teams want is
to wait weeks for a new certificate or Issuing CA (ICA). Make sure — no
matter which deployment model you choose — you’re able to spin up a
new ICA or issue a new certificate within minutes, not days. Ideally, you
should be able to automate ICA configuration and deployment steps for
scalable, repeatable provisioning.
Horizontal scalability
As the demand for certificates grows, your PKI will need to flex and
scale. Look for solutions that can integrate with your existing database
and HSM solutions, so you can replicate database or HSM instances
and simply cluster PKI instances to load balance the demand. Avoid
solutions that only work with a built-in database or require additional
servers for each new CA, which works at a small scale but will not
support larger deployments.
Download now ↗
To avoid outages or audit failures that result from
untracked certificates, seek vendors that offer fully
integrated PKI and certificate management so you can:
Enable crypto-agility
With shorter TLS lifespans, certificate compromises, and quantum
threats on the horizon, you need to be crypto-agile. To stay ahead,
organizations must be able to quickly identify and remediate certifi-
cate-related threats, whether it’s a single certificate or thousands.
Look for solutions that enable bulk revocation and seamless transition
to a new CA without complex, manual processes involved.
Finding the right fit for your organization isn’t all about features and
functionality, especially if you’re evaluating a vendor to host and operate
your organization’s PKI. Look beyond the software; consider their
security posture, software supply chain, and compliance certifications.
Comprehensive compliance
Remember, PKI is critical infrastructure. Be sure that the CA software
and crypto libraries behind your new PKI solution are compliant with
industry-standard frameworks, which include FIPS and Common Crite-
ria certifications. Also, ensure that built-in logging capabilities are
designed to fulfill audit logging requirements for any audits that may
impact your PKI.
PKI, your way, — of digital certificates to authenticate and verify the identity of
devices, workloads, and a growing number of connected things.
with Keyfactor To meet demand, IT and security teams need a new approach to
Deploy fast. Run anywhere. PKI. One that doesn’t add to the complexity, but instead simplifies
infrastructure and streamlines management while scaling with
Scale on-demand.
demand.
Deploy your way with the only PKI solution that runs
however and wherever you need it — in the cloud or on-prem,
turnkey or fully configurable, as a software appliance, a
hardware appliance with a built-in HSM, a container, in the
cloud, SaaS-delivered or a fully managed service.
Explore resources
Not quite ready to take the next step? No problem. Explore additional resources
to help you build the business case and map your path to success.
Contact us
Keyfactor brings digital trust to the hyper-connected world with • www.keyfactor.com
identity-first security for every machine and human. By simplifying PKI,
• +1 216 785 2946
automating certificate lifecycle management, and securing every device,
(North America)
workload, and thing, Keyfactor helps organizations move fast to estab-
lish digital trust at scale — and then maintain it. In a zero-trust world, • +46 8 735 61 01
every machine needs an identity and every identity must be managed. (Europe)