130 likes | 148 Views
CA Options: Buy or Build, and Signed by Whom?. Paul Caskey PKI Deployment Forum 2008. Things to consider: Costs. Fixed Acquisition Facilities Initial Implementation Hardware Variable/Recurring Licensing/Signing Service/Software/Renewal Support Personnel Audit.
E N D
CA Options: Buy or Build, and Signed by Whom? Paul Caskey PKI Deployment Forum 2008
Things to consider: Costs • Fixed • Acquisition • Facilities • Initial Implementation • Hardware • Variable/Recurring • Licensing/Signing • Service/Software/Renewal • Support • Personnel • Audit
Things to consider: Personnel • Quantity/Roles • Skills • Availability • Retention
Things to consider: Uses • What will you use your certs for? • Are there regulations governing this use? • Are there special requirements?
Benefits of a “buy” approach • Certs are trusted by almost all software • New technologies/services easily adopted • Minimal staffing challenges • Minimal infrastructure demands • No audits • No policy development/maintenance • Formal SLAs
Risks of a “buy” approach • Vendor problems • Service degradation • Barriers to switching • Price increases • Reduced Flexibility • Cross-certification • Custom OIDs • Different attributes (“Subject Unique Identifier”)
An analysis: Assumptions(source: Chosen Security – www.chosensecurity.com) • A 5,000 user implementation that remains constant over three years. • A focus on client certificates only. • There is an existing data center facility in place and one will not have to be built from scratch. • The system needs to be both secure and available. • A yearly external audit is required to maintain certification. • Role separation as defined by Certificate Issuing and Management Components (CIMC) – from NIST
An analysis: Assumptions (cont) • Security Level 3 Protection Profile (see Windows Server 2003 PKI and Certificate Security – Microsoft Press), consisting of one internal auditor, two PKI administrators and four operators need to be trained on the system, for a total of two FTEs. • Redundant systems exist – two for the CA and two for the enrollment functions. • Because of the security requirement, the enrollment and validation function is separated from the CA function, and the systems are separated by a firewall. • There is a dedicated backup and monitoring function for the PKI environment. • A pre-production system, with less redundancy which will be used for testing, also exists.
An Analysis: 3 year total To be fair, Chosen Security, the vendor that published this analysis, did so to point out that their solution, called On-Demand PKI, meets the above scenario with a total 3-year cost of $259,600 ($17.31/user/year). The specifics were omitted since we use a Managed PKI solution.