Public Key Infrastructure PKI Services
Thales deliver highly assured Public Key Infrastructure (PKI) consultancy, managed services and solutions into UK Government, Defence and Critical National Infrastructure.
PKI deployments range from Design and Build solutions hosted in the cloud, on customer premises or in Thales secure locations, to High Assurance PKIaaS and cloud based SaaS.
Features
- Implementation and deployment of PKI including comprehensive testing
- Operation and support managed services as required
- Fully definable PKI architecture
- Certificate provision and certificate management as a service
- Certificate Lifecycle Management
- Option to host in Thales secure sites
- Real-time monitoring, robust data backup
- Keys stored in FIPS 140 HSMs
Benefits
- Provides scarce, security cleared, PKI expertise
- Solutions customised to exact service needs
- System availability and security monitoring
- Certificate Lifecycle status visibility
- Deploy faster and flexibly at scale
- HW & SW procurement minimisable through service models
- Multi-site redundancy
- PKI best practice
Pricing
£650 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 5 4 2 5 2 7 1 6 4 5 7 9 6
Contact
Thales UK Ltd
Phaedra Warnes
Telephone: 07974 011385
Email: fcmo@uk.thalesgroup.com
Service scope
- Service constraints
- Our solution offers a vendor agnostic solution where building blocks of the eco-system can leverage multiple vendors for different elements of the solution. e.g PKI software, HSM, database etc.
- System requirements
-
- Service Licensing
- Internet connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our Service Desk and Incident Management team are
- available 24x7x365
- accredited to ISO27001 and ISO20000 for Service Management
- all SC and NPPV3 cleared
Response is based on SLAs and service requirements agreed with the client. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is provided in line with customer specific SLAs. Service Delivery Managers are assigned to each client.
Support is available via phone, e-mail or face-to-face meetings when required. Typically, the contract of work shall specify the required frequency of meetings, and further arrangements can be made as appropriate. We work closely with our customers to ensure that they have the support they require throughout the project; the basis of the support will depend on the specific needs of the project, the services procured, and the customer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Thales provide assistance to customers for the design of their services which provides an assured / accredited and secure way of accessing information over different classifications of networks, and bearers of opportunity.
Thales offers assistance with implementation and transition to new services, including migration planning and training. This can be provided for green field sites where no previous solution is in place.
Thales can:
• Carry out Site Surveys.
• Develop Transition Plans / Strategies.
• Develop Implementation Plans against previously developed designs. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We will provide an extract of the data held by Thales to the customer in an agreed format.
- End-of-contract process
-
At the end of the contract the data is provided to the customer in an agreed format (CSV or xml) and then deleted from Thales systems.
For an additional fee, Thales can return the data in alternative formats or retain the data for an extended period if required.
Using the service
- Web browser interface
- No
- API
- Yes
- What users can and can't do using the API
-
API interfaces are available for a high number of PKI user and management tasks. APIs can be used to enrol, request, renew and revoke certificates.
Platform management APIs are also available to configure the underlying service from things such as virtual CAs, end entity and certificate profiles.
Our platform operates REST API interfaces. - API automation tools
-
- Ansible
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Infrastructure is monitored 24x7 for availability and capacity, in line with ISO27001 and ISO20000
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Number of active instances
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines: DEPENDENT ON HOSTING OPTION CHOSEN
- Database: DEPENDENT ON HOSTING OPTION CHOSEN
- Configuration: DEPENDENT ON HOSTING OPTION CHOSEN
- Backup controls
- Backups are provided according to PKI Service employed and where the solution is Thales hosted or provided through Thales shared service, Thales shall maintain responsibility and control of the backup solution.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
-
Data in transit with the solution itself is maintained through TLS encrypted connections. We advise customers on the best approach to meet their specific DIT requirements by assessing their connectivity methods.
• Encrypted traffic (VPN/TLS)
• Authenticated users - Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Thales employ data at rest and data in transit encryption within the boundaries of our network/platform. Once data exits our network we can work with customers to meet their specific requirements.
Availability and resilience
- Guaranteed availability
- SLAs for availability are agreed with the customer dependant on needs and services procured. Thales Services are delivered as a geo-graphically diverse high availability service designed to exceed 99.95% availability.
- Approach to resilience
- Available on request
- Outage reporting
-
Thales provides 24x7 monitoring at UK Network Monitoring Centre.
In the event of an outage, a Service Delivery Manager will inform customers, and a Major Incident Manager will be appointed. Outages will also be reported in the Service Delivery Management report.
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Access restrictions in management interfaces and support channels
-
For our aaS or fully managed services, client access to management interfaces is prohibited to ensure control of management and configuration.
Where the solution is customer operated, all management interface access is provided. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA
- ISO/IEC 27001 accreditation date
- 22 November 2023
- What the ISO/IEC 27001 doesn’t cover
- The Thales UK Information Security Management System (ISMS) incorporates the people, processes and technologies supporting the portfolio of network services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- PSNSP certifications up to OFFICIAL SENSITIVE
- Police Enhanced Regime
- ISO20000 Accreditation
- PASF
- List-X
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
ISO 20000
PSN services at OFFICIAL
Police Enhanced Regime
Cyber Essentials Plus
NCSC CCSC (Certified Cyber Security Consultancy)
NCSC CCP (Certified Cyber Professional)
Sector specific accreditation
List X
PASF
ISO9001 - Information security policies and processes
- Thales follows an ISMS (Information Security Management System) which consists of Thales UK policy, process and procedures in addition to ISO 27001 clauses. The ISMS is audited by independent 3rd parties annually. An annual IA (Information Assurance) schedule ensures that policies are implemented, assessed and effective. This includes internal audits, external audits, Security Working Groups, Security Awareness campaigns. The reporting structure is defined in the Thales IA Management Plan, along with incident management processes and RACI matrix.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All Requests for Change (RFC)’s are presented to a Thales’ Change Board (CAB). The CAB is attended by Business, Technical, Service Delivery and Information Assurance stakeholders along with the owner of the RFC’s. On receipt of a request to make changes to the service, an RFC will be generated and submitted to CAB prior to delivery. Changes will be notified to customer CABs where there is a change to the device(s) which may impact service.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Thales maintain relationships with vendors where we leverage COTS products and ensure any IoCs or vulnerability patches are identified and assessed as well as being communicated to customers for awareness.
For our aaS or Thales Platform solutions, these will be built into a maintenance plan or an emergency change raised and communicated.
For customer or Thales hosted solutions, we will work with the customer to ensure vulnerabilities are identified and assist in remediation where required. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Where Thales off a hosted product such as aaS or a Thales platform, monitoring is performed at both the infrastructure and application layers.
Alerts and notifications are configured to identify heuristics that deviate from standard operation. Logs and event IDs are also configured to provide alerting for specific types of traffic or user behaviour. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Thales operate an incident management plan which is not publically distributed.
Users are able to raise incidents through our helpdesk which will be logged in Thales ITSM tooling and managed as such.
Incident and RCA reports are available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
-
The environment has been built in line with NCSC security procedures and managed through appropriate policies. It is also subject to annual ITHC, maintaining GDS-A accreditation for operation. Segregation of traffic is achieved using secure tunnels and vlans. Separate appliances where required
Our PKIaaS solution is based on a multi-tenanted set of application servers. Tenants are segregated through dedicated virtual instances, supported with a full RBAC control for our support staff.
RBAC also controls user access to the web interface to ensure the relevant instances are presented to users for day job tasks.
All RBAC is controlled by Thales.
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
Thales UK has a clear focus on fighting climate change. Thales has set itself a target of becoming a Carbon Net Zero company by 2030, powered by cleaner energy used more efficiently at our sites and for our business, with renewable energy supplies.
There are several strategies that Thales and our Cyber offerings implement to fight climate change, including:
1) Sustainable future. Thales has put fighting climate change at the centre of its strategy, highlighted by the fact that tackling climate change is one of the 4 Thales strategic pillars. Thales Cyber security and consultancy offerings have enabled companies to develop secure and sustainable products, prevent product recalls, learn digital lessons and reduce rework that go towards meeting their strategic sustainability objectives and tackle climate change.
2) Travel reduction. Thales has introduced a Smart Working model to reduce the travelling required by the workforce. One pillar of this is arranging virtual meetings with Customers, Stakeholders and interested parties. Thales has also deployed numerous tools to enable Thales UK to effectively operate via remote / smart working. It is expected that meetings under G-Cloud could implement this methodology to offer the same benefits to the customer. Running on managed services means efficient use of shared and common infrastructure, allowing sustainable collaboration from existing infrastructure, where organisations or teams may once have had dedicated infrastructure are now allowed to work remotely, securely.
3) Carbon reduction. Thales strives to implement carbon reduction, through a series of targets to reduce carbon emissions annually. Smart working, championed by our Cyber Security Consultants and offerings has been a key enabler of this strategy. Additionally, services enabling secure collaboration mean that businesses do not need to procure additional new hardware, thereby having a positive environmental impact.Tackling economic inequality
For the theme of “Tackling Economic Inequality” Thales’s methodology centres on a number of Sub themes these included: Levelling up, Increasing productivity and Education & Training.
Levelling up - Geographical Challenges
Thales is committed to the UK prosperity as a whole and drives economic activity in all parts of the country. In 2020, Thales supported over 25,400 jobs in the economy, driving growth in all four nations of the UK.
Thales works with local government and institutions to provide opportunities for local people and to support redevelopment of deprived parts of the UK. A recent example includes:
Investing in Wales - In partnership with Blaenau Gwent Council, the Welsh Assembly and the University of South Wales, Thales established a £20m National Digital Exploitation Centre in EbbwVale. It’s generating new jobs in high-demand and high-skill areas for a region that has suffered from economic inequality.
Education and Training
Thales is committed to the professional development of the contract workforce and provides access to learning opportunities to ensure employees have knowledge and skills to keep up with the pace of technological change.
Thales has an established early careers programme that attracts both apprentices and graduates (A&G) from a diverse background. In 2023 we hired 154 A&G colleagues, with a 2025 objective of at least 10% of all new hires to be graduates/apprentices.
Where appropriate due to Security Aspects, Thales will enable A&Gs to work alongside projects teams to learn ‘on the job’ and gain valuable insights beyond academic lessons.
School STEM Workshops. Careers Fairs & Volunteering
Thales has an established partnership with the Smallpeice Trust to deliver STEM and careers workshops to members of underrepresented groups in schools/colleges serving disadvantaged communities.
All employees benefit from 24 hours yearly allowance for volunteering.Wellbeing
Thales considers the health and wellbeing of our people to be fundamental to our success as a business. We have a well-established health and wellbeing (H&W) support provision, which has enabled us to rapidly provide critical support to our employees where and when it is needed most.
In 2017, Thales signed the Time to Change pledge, publically stating our commitment to changing the way we think and talk about mental health in the workplace. We have trained 200+ of our people in Mental Health First Aid, a network of supporters who can recognise the early signs of mental ill health, listen whilst assessing for crisis, and provide information.
Help @ Hand
Thales provides every employee & their families access to an Employee Assistance Programme - A 24/7 helpline for in the moment emotional and practical support, or signposting onward resources, such as healthcare or local assistance.
In 2021 Thales developed a ways of working model to support and equip teams, individuals & people managers with resources and frameworks to promote our hybrid ways of working following the pandemic, the framework promotes a culture of wellbeing and psychological safety for teams to work effectively within the new working culture.
Sustained & continued support
Thales also has a dedicated Employee Relations team to provide specific and tailored interventions. Thales will work alongside Occupational Health, H&W providers and rehab services to establish adjustments and tailored programmes to enable employees to return to work in the manner that is safest for them.
Thales will track and monitor working patterns to ensure that all hours worked are booked in the ERP Systems to actively monitor loading on individuals so that individuals maintain a healthy work/life balance. Any significant deviations from the norm will be raised in sprint planning reviews to inform resource balancing actions.
Pricing
- Price
- £650 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No