PKIaaS operation
See below for a summary of the PKIaaS operational procedures.
For the PKIaaS terms and agreements, see https://www.entrust.com/legal-compliance/entrust-certificate-services-repository
Physical locations
In each region, Entrust has implemented two physical datacenters with failover between the two.
Region |
Datacenters |
US |
Dallas (TX), Denver (CO) |
EU |
Munich (Germany), Frankfurt (Germany) |
Cloud-based components use multiple availability zones for high availability and a second region for disaster recovery.
Access control and trusted roles
The HSM and Activation Data are located in either Tier III, SSAE-18 datacenters or a two-person controlled safe located in a facility. The personnel in Trusted Roles with access:
Can backup, store, and recover CA Private Keys using dual control in a physically secured environment.
Receive alarm notifications on any violation of the rules for accessing the HSM or a CA.
Are trained for their specific role and must undergo background investigations.
Cannot change the product code.
CA key management
When a customer requests to provision a new CA, an API-based process generates the CA key pair within HSMs in a physically secured environment.
Audit logging
Significant security events in the CAs are automatically time-stamped and recorded as internal audit logs. Audit logs are:
Periodically archived.
Constantly monitored by the Entrust Security Information and Event Management (SIEM) system.
Additionally:
The operations and security teams review the alerts generated by possible policy violations and other significant events.
You can see the basic audit logs related to your PKIaaS account in the Enterprise UI using the Reports function.
Disaster recovery
To mitigate the event of a disaster, PKIaaS utilizes:
Two data centers in each region (US and EU) with highly available HSMs
Secure on-site and off-site storage of backup HSMs containing copies of all CA private keys
Database replication between primary and secondary cloud regions and maintained in real-time.
Daily database backups within both the primary and secondary cloud regions and weekly backup of critical data to a secure off-site storage facility