4 - Processes and procedures

Proper and effective processes and procedures related to PKI operations and management are essential for the successful implementation of the PKI. The processes and procedures should be aligned with the overall organizational policies and statements.

Process is a set of activities that are performed in a specific order to achieve a specific goal. The process should be documented and measured. The process is also repeatable and can be improved over time, based on the evaluation, feedback, or risk assessment. The scope of the processes is defined by the policies.

Procedure is a set of instructions that describe how to perform a specific task. The procedure should be also documented and can be used as a reference for the process. Procedure can include specific instructions for the process, such as how to perform a specific task, or how to use a specific tool.

Processes and procedure typically cover (but are not limited to) the following areas:

  • infrastructure management
  • data privacy and security
  • business continuity, disaster recovery, contingency planning
  • supply chain management
  • physical security and access control
  • incident management
  • audit and compliance, evidence and reporting, archiving
  • risk management and assessment

Category maturity levels description

Maturity levelDescription
1 - InitialProcesses and procedures are not formally defined and documented. Ad-hoc reactions to the events.
2 - BasicProcesses and procedures are formally defined and documented, but not in the full scope and fully implemented and followed.
3 - AdvancedThe scope of the processes and procedures covers entire PKI implementation and policies, and is documented and followed.
4 - ManagedThe evidence from the processes and procedures is collected and maintained. Recurring activities are defined and executed by responsible roles.
5 - OptimizedThe processes and procedures, that are aligned with policies and organizational goals, are reviewed and updated on a regular basis. Evidence is properly managed and controlled.

Requirements

#RequirementWeight
1Scope of processes and procedure is aligned with policies4
2Processes and procedures are formally documented and followed3
3Recurring activities are executed on time5
4Evidence from procedures is collected and maintained3
5Processes and procedures are reviewed and updated2

Details

Scope of processes and procedure is aligned with policies

Guidance

The scope of the processes and procedures should be aligned with the policies and statements. Each implementation and use case can have different scope, but the scope should be defined and documented, with all applicable processes, procedures, and eventually instructions.

The alignment with the policies helps to ensure that the processes and procedures are aligned with the PKI implementation goals and needs, and can be effectively trusted over the time. A simple matrix can be used to ensure that all applicable policies and statements are covered by the processes and procedures.

The completeness of the processes and procedures can be evaluated by the risk assessment, audit, or by the feedback from the users.

Assessment

The following is a sample evidence and information that can be collected during the assessment:

  • Documented scope of the processes and procedures
  • Alignment with the PKI policies and statements
  • Interview with the PKI management

References

Processes and procedures are formally documented and followed

Guidance

Identified processes and procedures needs to be properly designed and documented with all relevant information like scope, purpose, inputs, outputs, roles and responsibilities, and other. The processes and procedures should be also reviewed and approved by the management.

Once the processes and procedures are published, appropriate training is required to ensure they are followed by the PKI management and staff. Without following the processes and procedures, the PKI can be exposed to the risks and threats, and eventually lose any established trust.

Assessment

The following is sample evidence and information that can be collected during the assessment:

  • Documented processes and procedures
  • Completeness of the processes and procedures documentation
  • Evidence of the processes and procedures usage
  • Interview with the PKI management and staff
  • Training materials covering the processes and procedures

References

Recurring activities are executed on time

Guidance

Recurring activities are the activities that are performed on a regular basis, such as certificate management operations, backup procedures, security reviews, risk assessment, reviews of logs and security events, and other.

Each activity should be tracked and have a frequency defined, for example, some activities may be performed daily, weekly, monthly, quarterly, or yearly. The activities should be performed on time, and any delays should be properly tracked and reported.

Recurring activities needs to be incorporated into the processes and procedures to support the PKI implementation.

Assessment

The following is sample evidence and information that can be collected during the assessment:

  • Documented business as usual activities
  • Evidence of the business as usual activities execution
  • Business as usual activities tracking and reporting
  • Calendar of activities
  • Interview with the PKI management and staff

References

Evidence from procedures is collected and maintained

Guidance

Each process, procedure, instruction, or activity would not be effective without evidence confirming that it was performed. The evidence should be descriptive with all relevant information, such as date and time, who performed the activity, what was the result, and other information, if needed.

The evidence can be collected and maintained in various forms, such as logs, reports, notes, screenshots, etc. The evidence should be collected and maintained for the defined period of time, and should be available for the audit or other purposes.

Assessment

The following is sample evidence and information that can be collected during the assessment:

  • Evidence of the execution of the processes and procedures
  • Interview with the PKI management and staff
  • Logs, reports, notes, screenshots, and other evidence

References

Processes and procedures are reviewed and updated

Guidance

The processes and procedures should be reviewed and updated on a regular basis, based on the feedback, risk assessment, audit, or other. The review should be performed by the management, and the updates should be approved by the management.

The review and update of the processes and procedures helps to keep the PKI implementation up to date, and helps to ensure that the processes and procedures are effective and efficient.

Assessment

The following is sample evidence and information that can be collected during the assessment:

  • Documented review and update process
  • Evidence of the review and update of the processes and procedures
  • Interview with the PKI management and staff

References

Participate in our community discussions and/or join the consortium