Keyfactor EJBCA Azure AWS
EJBCA PKI for Enterprises - A powerful and
flexible certificate issuance and management
system to issue and enable full life-cycle control
of digital certificate and Certificate (CA),
Registration (RA) and Validation Authorities (VA);
enabling multiple use cases and standards
compliance.
Features
- Certificate Authority - Certificate Issuance
- Registration Authority - Approvals
- Validation Authority - OCSP and CRL's
- Multi Vendor HSM Integration
- Integration - ACME, SCEP, CMP, EST, Microsoft Autoenrollment, REST
- Multi Tenant - Multiple CAs on one instance
- Multi-cloud, multi-region
- Highly-scalable PKI
Benefits
- Certificates to every entity, device, use cases
- Native integrations with all certificate use cases
- 8×5 or 24×7 expert support
Pricing
£17,791 to £67,366 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 4 7 7 7 5 8 1 4 5 9 3 0 6
Contact
UNSUNG LIMITED
Richard Warwick-Smith
Telephone: 07961166249
Email: info@unsungltd.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Certificate Lifecycle Management (SaaS or OnPremises) Signum SignServer
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- N/A
- System requirements
- Certificate enrolment service
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
EJBCA Cloud provides Premium Support
Responses. Severity Level 1 - 30 Minutes
Severity Level 2 - 1 Hour Severity Level 3 - 4
Hours Severity Level 4 - 8 Hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Support 8-5 / Premium Support 24x7
(optional) - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Users can get started with EJBCA Cloud using
our extensive online documentation:
https://doc.primekey.com/ejbca-cloud/ejbcacloud-aws/aws-launch-guide.
https://www.youtube.com/@KeyfactorSecure
Instructor led virtual and onsite training is
available upon request. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
https://support.keyfactor.com/hc/en-us to provide
any and all data, including private keys - End-of-contract process
-
https://support.keyfactor.com/hc/en-us to provide
any and all data, including private keys
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Cloud Configuration Wizard
- Accessibility standards
- None or don’t know
- Description of accessibility
- Through the EJBCA online service portal and API
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
API allows users to request or renew certificates,
and allows administrators to revoke certificates
as well as make configuration changes such as
creating certificate authorities. Complete
documentation can be found here:
https://doc.primekey.com/ejbca/ejbcaoperations/ejbca-ca-conceptguide/protocols/ejbca-rest-interface - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The administrator at the customer has full access
to the EJBCA Administration screens to fully
customize the configuration.
Scaling
- Independence of resources
-
Each EJBCA Cloud customer is provisioned a
cloud provider dedicated environment for their
contracted service. One customer does not affect
another customer from a load, operations or
security perspective.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Customers can access health check APIs, and
application APIs to gather statistics - Reporting types
-
- API access
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Keyfactor
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Other data at rest protection approach
We inherit data at rest security from cloud
provider managed database services such as
RDS in AWS and Managed SQL by Azure. - Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
Data can be exported a number of different ways.
The EJBCA application provides CMS exports,
and key recovery can be enabled, all being self
service. Ultimately, a customer can open a
service request for a full data base dump and
transferring of Cloud HSM or Keyvaulted private
key material to the customer's cloud account
https://support.keyfactor.com/hc/en-us - Data export formats
- Other
- Other data export formats
-
- CMS
- P12
- SQL
- CloudHSM, AKV, KMS
- YAML (ConfigDump)
- Data import formats
- Other
- Other data import formats
-
- PML
- YAML (ConfigDump)
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
The service and optional cloud database is
hosted by the cloud provider AWS or Azure. The
purchaser is responsible for uptime, updates and
monitoring of the EJBCA service hosted on the
platform. - Approach to resilience
-
EJBCA is completely hosted in AWS and Azure,
and commonly understood multi availability zone
(AZ) resiliency is fully leveraged by this EJBCA
service. - Outage reporting
-
Scheduled and unscheduled outages are
communicated by Email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Keyfactor uses NSGs and MFA to limit access of
support personnel to proper channels while
maintaining RBAC. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO27001 is forecast for July 2024
- Cyber Essentials Plus is forecast for July 2024
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Compliance answers to the SVP, Cloud
Operations & IT Compliance which falls into the
CTO's organizational structure. All policies
required by ISO27001:2013 are covered
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
All cloud components within EJBCA are tracked
for configuration changes. Alerting and
monitoring are in place for security configuration
reviews. Any changes to configuration and
conducted after change management. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Threats, patches, and evolving threats are
managed monthly per Keyfactor patching
schedule. Current threats are reviewed by our SOC and SIEM alerting, threat hunting, or
security teams. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Alerting and reviews. Compromises are
managed by stopping the current process,
quarantining the affected system, and ticket
creation for management processes. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
All events are managed by our standard
remediation process. Users can send an email to
the compliance or information security teams to
notify the teams to open a ticket and
investigation. Incident reports are kept internally
and not released.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
Unsung have the majority of our staff working remotely which reduces our climate impact. We also book all of our business travel through Travel Perk which allows us to offset corporate travel emissions.Tackling economic inequality
Unsung are committed to collaboration, innovation and responsibility. We prioritise developing a diverse supply chain and work with startups and SMEs to foster inclusivity and economic growth.
Our solutions emphasise innovation and disruptive technologies to enhance cost effectiveness and quality. We are focused on developing scalable, future-proof delivery methods.
We prioritise collaboration and responsible practices to ensure operational continuity. We engage with our stakeholders to build support for resilience and capacity building, creating a collaborative ecosystem focused on sustainable growth and mutual success.Wellbeing
Unsung are committed to improving health and wellbeing for our staff. We offer flexible working and remote working options allowing for a work-life balance that allows and supports physical and mental health.
Additionally, we provide subscriptions to the meditation app Calm which promotes mental wellness.
These initiatives enhance the wellbeing of our workforce and set a positive example.
Pricing
- Price
- £17,791 to £67,366 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
POC/Test licenses are available within multiple
marketplaces online, including AWS and Azure.
These are typically for a 30-day period, but can
be extended. - Link to free trial
- https://www.keyfactor.com/products/ejbcaenterprise-cloud/