Certificate Lifecycle Management - SaaS
Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.
Features
- Full Digital Certificate/TLS Certificate/x.509 Certificate Visibility
- Full Digital Certificate/TLS Certificate/x.509 Certificate Management
- Full Digital Certificate/TLS Certificate/x.509 Certificate Discovery
- Self Service Enrollment
- Granular Role Based Access Control (RBAC)
- Full Digital Certificate/TLS Certificate/x.509 Certificate Reporting
- Full Digital Certificate/TLS Certificate/x.509 Certificate Alerting
Benefits
- Easily discover & manage all of your digital certificates
- Multiple discovery methodologies allows all certificates to be discovered
- Prevent certificate related service outages
- Provide easy access to security-approved certificates
- Identify & reduce certificate related Shadow IT
- Simplify operations and stay ahead of unexpected outages
- Ensure continuous compliance for every certificate
Pricing
£50,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 9 4 7 0 6 4 6 6 9 2 6 1 9
Contact
Keyfactor
Keyfactor Sales Department
Telephone: +46 8 735 61 00
Email: Sales@keyfactor.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
EJBCA SaaS
EJBCA PKI Appliances - Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Any issues reported via email will be initially classified as Severity 2 or lower.
Standard Support:
Severity 2 - 2 Hours
Severity 3 - 6 Hours
Severity 4 - 1 Day
Premium Support:
Severity 2 - 1 Hour
Severity 3 - 4 Hours
Severity 4 - 8 Hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Standard Support 8-5 / Premium Support 24x7 (optional)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User documentation and project planning.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- User data is deleted at end of contract and cannot be taken with them.
- End-of-contract process
- User data is deleted at the end of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Keyfactor's Command comes with a web based console application that supports all modern web browsers. The Management Portal is the command and control center for Keyfactor Command. From here, you can get a quick glance at the health of your PKI and a sense of how it is being used by visiting the dashboard, or delve into details of certificates using the certificate search feature. The Management Portal is also used to configure workflow and email notifications, enroll for certificates, and configure options that are used across the whole of the Keyfactor Command product
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
-
Keyfactor complies with the WCAG key areas of compliance.
Perceivable
Text alternatives – All images have hover over text.
Time-based media - No video is used.
Adaptability – Keyfactor's UI is built on react and React-headings maintains the proper hierarchy of headings, no matter the component structure
Distinguishable – Dashboards and reports use color for charts and graphs. All components have hover over text.
Operable
Keyboard Accessible – Keyfactor can be navigated via a keyboard.
Enough Time – No moving or blinking content is used.
Seizures and Physical Reactions – No flashing is used.
Navigable – All links are clearly defined
Input Modalities – All navigation is single point and no multipoint gestures are used.
Understandable
Readable – All language is specified in the mark-up
Predictable – All actions are on button click
Input Assistance – All input errors are in text
Robust
Compatible – All HTML mark-up is properly formed and has proper start and end tags. - API
- Yes
- What users can and can't do using the API
-
The Keyfactor Command solution exposes an API to allow third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command in a secure manner and to provide a mechanism for automating routine or bulk tasks that would be cumbersome to perform through the browser-based user interface. The API complements the web components of Keyfactor Command and offer a number of HTTP method calls that provide similar functionality to that available within the Management Portal's user interface, but which can be accessed programmatically by any system capable of making web requests. The API has the following goals and constraints:
-Provide a simple interface to make integration easy for third parties.
-Develop interoperability between different technology frameworks and operating systems.
-Support common certificate enrollment and management tasks.
-Deliver a securable interface.
-Preserve backward-compatibility so that existing clients continue to work, where possible. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Keyfactor Command provides a highly-customizable dashboard that helps in identifying anomalies, security risks, and other administrator-specified criteria.
The Keyfactor Orchestrator is also built to serve as a framework for enabling custom automation to endpoints if necessary. There is an open source SDK available to help make building these integrations easy. Once built, the integration will be able to take advantage of the built in job management and scheduling functionality within the platform to schedule certificate management jobs and automated inventory processes.
Scaling
- Independence of resources
- Each Command customer is provisioned a Azure dedicated environment for their contracted service. One customer does not affect another customer from a load, operations or security perspective.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported by API and within the application.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- API
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- SLA Attached within the contractual documentation.
- Approach to resilience
- Command is completely hosted in Azure, and commonly understood multi availability zone (AZ) resiliency is fully leveraged by this Command service.
- Outage reporting
- Scheduled and unscheduled outages are communicated by Email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Roles are all custom designed within the system. Roles can be defined to control not only what the user is allowed to do within the system, but also what certificates they are allowed to perform actions on. There are many functions within the system can be added to a specific role. A full list of user capabilities that can be delegated within the system can be found in the Keyfactor Command Reference guide under "Security Role Permission".
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- IP Whitelisting
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Marcum
- ISO/IEC 27001 accreditation date
- 10/1/2023
- What the ISO/IEC 27001 doesn’t cover
- Security Scoped
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We follow the ISO27001 policy expectations. Keyfactor utilizes annual third-party auditing to validate compliance with our policies to the above standards.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Ticketing systems track any changes with approvals. A risk analysis is conducted on each change prior to approval.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Active monitoring of threats are conducted at the agent, network and application level. Patching is conducted monthly by the Keyfactor Cloud team. Keyfactor utilized multiple sources (CVE.org / SOC team) to ensure we maintain the security posture and awareness.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Alerting from SOC assets and network monitoring notify Keyfactor team members for investigation. If a compromise is detected, the incident response plan is started immediately via a call tree.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our predefined process is configured to be started when reported by a user, employee, or vendor. This can be done by a support ticket, email, or other communication tool. Incident reports are internal documents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Keyfactor strives to manage our climate impact within our corporate and commercial environmentsTackling economic inequality
Keyfactor engages in continual research, management, and training to ensure employees are treated fairly.Equal opportunity
Keyfactor engages in continual research, management, and training to ensure employees are treated fairly.Wellbeing
Keyfactor engages in continual research, management, and training to ensure employees are given access to multiple wellbeing tools.
Pricing
- Price
- £50,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No