Unsung provide expert consultancy and advice wherever you are on your PKI journey
Secure your digital operations with our PKI Health Check. Benefit from minimised disruptions, enhanced security, regulatory compliance, secure communications, and streamlined processes.
- Our team are PKI experts.
- We cover all aspects of PKI including system design, HSMs, certificate management software, and procedures & policies.
- All consultants are backed by decades of experience in multiple fields.
- Security best practices are always employed.
What is a PKI Health Check?
A PKI Health Check is a full review of your Public Key Infrastructure (PKI) identifying risks, issues, deviations from common practise and areas for improvement.
This activity ensures your PKI is secure, efficient, performant and compliant with industry standards.
Why is a PKI Health Check important?
PKI is a critical security control in the prevention of breaches and protection of your critical systems, data and communications. Therefore, regular health checks help keep your PKI working efficiently, proactively addressing errors and identifying opportunities to improve service performance and compliance posture. Additionally, this activity will provide valuable information and data to inform future investment cases and align the functionality of your PKI service with strategic technology outcomes and business priorities.
Risk Review & Recommendations
Low Risk Items & Recommendations
Resolving inefficiencies and manual processes that could lead to errors.
Medium Risk Items & Recommendations
Fixing items that impact security posture or operational excellence.
High Risk Items & Recommendations
Addressing critical issues that could cause significant harm to the organisation.
Identify Improvement Areas
Our health check finds risksa nd ighlights improvement activities.
Our PKI Health Check Services
· Architecture: We will review your PKI design and structure. This is to ensure it meets best practices and security standards.
· CA Configuration: Evaluation of your Certificate Authority setup and configuration.
· Revocation Check Systems: Analysis of the systems in place for certificate revocation.
· Certificate Templates: Examination of certificate templates for appropriate configuration.
· Active Directory: Assessment of Active Directory integration and dependencies.
· Backups: Verification of backup procedures for PKI components.
· Documentation and Process: Review of existing documentation and operational processes.
· Certificate Enrolment and Issuance: Evaluation of certificate issuance and enrolment processes.
· Certificate Monitoring and Discovery: Analysis of monitoring systems for certificate lifecycle management.
· Revocation Processes: Review of processes for certificate revocation.
· Monitoring and Alerting: Assessment of monitoring and alerting mechanisms.