Skip to main content

Help us improve the Digital Marketplace - send your feedback

Keyfactor

Signum SaaS

Protect the integrity of code, containers, and software with secure code signing as a service. With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes.

Features

  • SaaS based signing service
  • HSM backed keys
  • Policy enforement
  • Native agents for Windows and Linux
  • Key attestation
  • Code signing
  • Document signing

Benefits

  • Safeguard signing processes
  • Centralised signing key storage
  • 24x7x365 support to ensure minimal operational risk

Pricing

£100,625 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@keyfactor.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 1 5 8 2 1 6 0 2 9 4 0 6 0 0

Contact

Keyfactor Keyfactor Sales Department
Telephone: +46 8 735 61 00
Email: Sales@keyfactor.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
EJBCA Certificate Authority
Certificate Lifecycle Management (SaaS or On-Premises)
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
Signum SaaS provides Premium Support Responses. Severity Level 1 - 30 Minutes Severity Level 2 - 1 Hour Severity Level 3 - 4 Hours Severity Level 4 - 8 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support 8-5 / Premium Support 24x7 (optional)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users can get started with Signum SaaS using our extensive online documentation https://docs.keyfactor.com/Signum-SaaS.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Support request can be opened at https://support.keyfactor.com/hc/en-us to provide any and all data, including private keys.
End-of-contract process
The dedicated SaaS environment that was provisioned for the customer is stopped and enters a data retention period. During this period, a customer can request any and all data, including access to private keys.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
PKCS11 & KSP interfaces integrate directly with signing tools such as SignTool, Jarsigner, Cosign, OpenSSL, and more to enable local signing.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The administrator at the customer has full access to the Signum platform to fully customize the configuration.

Scaling

Independence of resources
Each Signum SaaS customer is provisioned on a cloud provider dedicated environment for their contracted service. Customers are siloed with dedicated virtual private networks, dedicated cloud managed database and cloud HSMs. One customer does not affect another customer from a load, operations or security perspective.

Analytics

Service usage metrics
Yes
Metrics types
The events section of the Signum Admin Web Console gives authorized users a detailed view of application and client activities . Anytime a remote user/agent attempts to access a certificate or perform an action in the Admin Web Console that usage is logged and displayed in the web console where it can be viewed or exported. The Signum Administrator will be able to view the Events and System logs. The Events log shows certificate usage events, and the System logs will show Admin Web Console activity.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
We inherit data at rest security from cloud provider managed database services such as Managed SQL by Azure.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
A customer can open a service request for a full transfer of the key material. https://support.keyfactor.com
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Signum SaaS offers 99.95% availability and SLA guarantees. Custom service based on customer design Customers receive service credits defined by our terms and conditions.
Approach to resilience
Signum SaaS is completely hosted in AWS and Azure, and commonly understood multi availability zone (AZ) resiliency is fully leveraged by EJBCA SaaS.
Outage reporting
Scheduled and unscheduled outages are communicated by Email and announcements in the customer SaaS portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Keyfactor uses NSGs and MFA to limit access of support personnel to proper channels while maintaining RBAC.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
IP Whitelisting

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SBS
ISO/IEC 27001 accreditation date
10/1/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Compliance answers to the CTO

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All cloud components within Signum are tracked for configuration changes. Alerting and monitoring are in place for security configuration reviews. Any changes to configuration and conducted after change management.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Threats, patches, and evolving threats are managed monthly per Keyfactor patching schedule. Current threats are reviewed by our SOC and SIEM alerting, threat hunting, or security teams.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Alerting and reviews. Compromises are managed by stopping the current process, quarantining the affected system, and ticket creation for management processes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All events are managed by our standard remediation process. Users can send an email to the compliance or information security teams to notify the teams to open a ticket and investigation. Incident reports are kept internally and not released.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

All Keyfactor products and services follow the DIVERSE Commitment at Keyfactor. Diversity and inclusion is something Keyfactor has always supported across our global team and communities. In a recent interview, our CEO, Jordan Rackie, was asked, “If you could inspire a movement that would bring the most amount of good to the greatest amount of people, what would that be?” His response – “…it would be the broad embrace of the value of diversity in people and opinions. I’ve always focused on collecting a variety of opinions from a variety of people and believe that having an eclectic approach for reaching decisions is important to achieving success…” With all the warranted attention D&I has received, we felt that while we already expressly promote diversity as part of our core values and in our actions, that creating a deeper and broader program and commitment tied to diversity was the appropriate next-level step. With this, we’re excited to introduce The DIVERSE Commitment, our holistic strategy to continually improve upon diversity in our current business, in our future business, and in society. At Keyfactor, we have laid out a triangular – three prong approach, illustrated in the diagram below, to support this mission. Our commitment title, DIVERSE, is an acronym that stands for: Diversity Internally Valued, Expansive Recruitment and Societal Education – envisioned by our CEO, Jordan Rackie. From a product perspective, Keyfactor has community and open-source versions of products to enable free-market access to the products, strengthening Keyfactor's commitment to its DIVERSE cause.

Pricing

Price
£100,625 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Sales@keyfactor.com. Tell them what format you need. It will help if you say what assistive technology you use.