SignServer for Azure and AWS
SignServer Enterprise is a server-side digital signature software used to sign any digital document, and more. SignServer offers high performance and high availability and is designed to perform automated signatures (and other cryptographic operations on digital documents).
Features
- Sign Code
- Sign Documents
- Time Stame Authority (TSA)
- EiDAS compliant signatures
- ETSI compliant
- Audit and Archive logging
- Multiple integration methods
- Remote client signing
- ePassports signer (MRTD)
Benefits
- Safeguard Signing processes
- Centralised signing key storage
- 24x7x365 support to ensure minimal operational risk
Pricing
£18,837 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 8 4 2 5 8 8 5 7 4 4 0 9 9 8
Contact
Keyfactor
Keyfactor Sales Department
Telephone: +46 8 735 61 00
Email: Sales@keyfactor.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- EJBCA Certificate Authority Certificate Lifecycle Management (SaaS or On-Premises)
- Cloud deployment model
- Public cloud
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SignServer provides Premium Support Responses. Severity Level 1 - 30 Minutes Severity Level 2 - 1 Hour Severity Level 3 - 4 Hours Severity Level 4 - 8 Hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Standard Support 8-5 / Premium Support 24x7 (optional)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Users can get started with SignServer Cloud using our extensive online documentation: https://doc.primekey.com/signserver-cloud/signserver-cloud-aws/aws-launch-guide. Instructor led virtual and onsite training is available upon request.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- https://support.keyfactor.com/hc/en-us to provide any and all data, including private keys.
- End-of-contract process
- Support request can be opened at https://support.keyfactor.com/hc/en-us to provide any and all data, including private keys. Refer to contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Client HTTP Interface, Client WS Interface, REST API, SignClient (remote signing) and admin web.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The administrator at the customer has full access to the SignServer platform to fully customize the configuration.
Scaling
- Independence of resources
- Each SignServer Cloud customer is provisioned a cloud provider dedicated environment for their contracted service. One customer does not affect another customer from a load, operations or security perspective.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Customers can access health check APIs, and application APIs to gather statistics
- Reporting types
-
- API access
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- We inherit data at rest security from cloud provider managed database services such as RDS in AWS and Managed SQL by Azure.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- A customer can open a service request for a full data base dump and transferring of Cloud HSM or Keyvaulted private key material to the customer's cloud account https://support.keyfactor.com/hc/en-us.
- Data export formats
- Other
- Other data export formats
-
- P12
- CloudHSM, AKV, KMS
- Data import formats
- Other
- Other data import formats
-
- P12
- XML
- EXE
- DLL
- MSI
- Container
- Jar
- Android
- SOD (MRTD)
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The service and optional cloud database is hosted by the cloud provider AWS or Azure. The purchaser is responsible for uptime, updates and monitoring of the SignServer service hosted on the platform.
- Approach to resilience
- SignServer is completely hosted in AWS and Azure, and commonly understood multi availability zone (AZ) resiliency is fully leveraged by this SignServer service.
- Outage reporting
- Scheduled and unscheduled outages are communicated by Email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Keyfactor uses NSGs and MFA to limit access of support personnel to proper channels while maintaining RBAC.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- IP Whitelisting
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SBS
- ISO/IEC 27001 accreditation date
- 10/1/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO Standards
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All cloud components within SignServer are tracked for configuration changes. Alerting and monitoring are in place for security configuration reviews. Any changes to configuration and conducted after change management.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threats, patches, and evolving threats are managed monthly per Keyfactor patching schedule. Current threats are reviewed by our SOC and SIEM alerting, threat hunting, or security teams.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Alerting and reviews. Compromises are managed by stopping the current process, quarantining the affected system, and ticket creation for management processes.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- All events are managed by our standard remediation process. Users can send an email to the compliance or information security teams to notify the teams to open a ticket and investigation. Incident reports are kept internally and not released.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
All Keyfactor products and services follow the DIVERSE Commitment at Keyfactor. Diversity and inclusion is something Keyfactor has always supported across our global team and communities. In a recent interview, our CEO, Jordan Rackie, was asked, “If you could inspire a movement that would bring the most amount of good to the greatest amount of people, what would that be?” His response – “…it would be the broad embrace of the value of diversity in people and opinions. I’ve always focused on collecting a variety of opinions from a variety of people and believe that having an eclectic approach for reaching decisions is important to achieving success…” With all the warranted attention D&I has received, we felt that while we already expressly promote diversity as part of our core values and in our actions, that creating a deeper and broader program and commitment tied to diversity was the appropriate next-level step. With this, we’re excited to introduce The DIVERSE Commitment, our holistic strategy to continually improve upon diversity in our current business, in our future business, and in society. At Keyfactor, we have laid out a triangular – three prong approach, illustrated in the diagram below, to support this mission. Our commitment title, DIVERSE, is an acronym that stands for: Diversity Internally Valued, Expansive Recruitment and Societal Education – envisioned by our CEO, Jordan Rackie. From a product perspective, Keyfactor has community and open-source versions of products to enable free-market access to the products, strengthening Keyfactor's commitment to its DIVERSE cause.
Pricing
- Price
- £18,837 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- POC/Test licenses are available within multiple marketplaces online, including AWS and Azure. These are typically for a 30-day period, but can be extended.
- Link to free trial
- https://www.keyfactor.com/products/signserver-enterprise/