Categories

The following categories of the PKI maturity model are defined with the appropriate weight based on the applicability and importance:

#CategoryDescriptionWeight
1Strategy and visionResponsible for the PKI management and strategy. Includes alignment with organizational goals and requirements, risk management, and policy decisions.5
2Policies and documentationFormal policies and practice statements for supported PKI services and use-cases. Formal management of agreements between parties involved in the PKI.4
3ComplianceAdherence to standards and applicable regulations and requirements for the PKI and trust services. Standards and regulations may be internal or external, country specific or purpose specific.2
4Processes and proceduresProcesses and procedures related to PKI management tasks and operational activities. This includes also the supply chain procedures and processes that includes acceptance or receipt of the HW and SW related to the PKI.3
5Key ManagementKey management policy and procedures related to PKI cryptographic keys and its lifecycle. Inventory of cryptographic keys. Secure and trusted key ceremonies. Key escrow and key recovery if applicable.4
6Certificate ManagementCertificate management policy and lifecycle. Inventory of certificates. Definition of the certificate profiles and supported states of the certificate including the transitions between the states. Proper validation fo the certificates.4
7Infrastructure ManagementAvailability of the PKI services, infrastructure setup to achieve availability goals. PKI continuity testing and infrastructure recovery. Infrastructure security controls.2
8Change Management and AgilitySecure and controlled process for the change management. Formal process to request changes in the PKI, approval, staging, roll-back.3
9ResilienceQuickly respond to potential attack and unavailability of the PKI services or other related resources.4
10AutomationAutomation of certificate lifecycle management. Technology and tools for the automation. Monitoring of automated certificate operations.2
11InteroperabilityInteroperability between applications, implementations, and technologies. Application of interoperable protocols and standards. Transparency and vendor lock avoidance strategy.2
12Monitoring and AuditingMeasurement of the PKI metrics, collecting evidence, monitoring and alerting of relevant issues, including references to incident response management.2
13SourcingAvailability of skilled resources to manage PKI. Processes and procedures to maintain the required resources in time, monitoring of the skills.4
14Knowledge and TrainingEducation of people and continuously gathering required knowledge and skills to manage PKI. Training plans and improvement.3
15AwarenessProviding awareness about the PKI in the organization and its purpose. Awareness how to apply the PKI in a trusted and secure way.3

For more information on categories, please refer to the Categories description.

The weights of the categories are used to calculate the overall maturity level of the PKI.

Participate in our community discussions and/or join the consortium