Podcast
Root Causes 355: Should a Managed PKI Provider Do Whatever the Customer Wants?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 19, 2024
In this episode we explore whether a managed PKI provider should give complete control over PKI decisions to the end customer or enforce certain minimum standards and principles regardless of what the customer asks for.
Podcast Transcript
Lightly edited for flow and brevity.
So, in the world of public CAs, the public CA, somebody like Sectigo, has to follow a very specific set of rules and these rules are clarified in a few different ways. They're in the CA/Browser Forum and the ETSI requirements and browser root store requirements basically. And these rules are intended to ensure at a high level that that PKI is reliable, that the encryption is reliable, that the authentication methods are reliable, the physical network security is reliable - all these various things that in the end of the day mean that a relying party and a subscriber, that both subscribers and relying parties can trust that the PKI is doing what it's supposed to do. That it's authenticating the identity of a digital actor, that it's ensuring encryption and non-repudiation. And that's the basic, that's the basic reason that those rules exist at a very high level. So does that make sense so far?
In a private CA scenario, it's long been considered that you get to do whatever you want. You're building the PKI. You're building the CA. It's your code. It's your network. It's your risk. It's your use case, and you get to decide what you want to do. If you want to issue shorter lived certificates because you want them to turn out faster, that's up to you. If you want to issue longer lived certificates, that's also up to you. Right? And it makes perfect sense.
If we wanted to use an analogy, if I'm, let's say if I'm selling packaged food goods in the grocery store, there's a lot of regulation and testing and inspectors and stuff to make sure it meets certain standards of quality. But if I'm cooking at home, then nobody is watching to see if I give myself botulism, right? Because that's the nature of the beast. I'm cooking at home. No one is watching. And the same was considered to be true for a private CA setup. If I'm a private CA, and I want to make decisions that somebody else feels are overly risky or are overly risk averse, that's fine. That's my decision to make and everybody else just gets to be quiet about it. Once again, so far, do you agree?
So a managed PKI provider is a third party technology provider who is expert in the realm of PKI or CA. And this typically is a SaaS service. You operate a SaaS service, you say, I'll stand up your CA for you. It's running using my tech off of my infrastructure in my cloud, but you're using it. You're the user. So the customer, the enterprise, or government entity, or NGO, or whoever it is, or school, is using it, but the technology provider is owning and operating that infrastructure and that service and the reason you do that as a managed PKI provider is because you're focusing and you're specializing on something that you can get expert at, and you're taking the burden of that expertise off of these other organizations. So that university doesn't have to sit and develop its own internal PKI, which is, as you've pointed out on many occasions, Jason, not for everyone, right? But you can get an organization - and Sectigo is one of those - that can offer this as a service and then you can build a center of excellence inside that organization, do it right, and make it available as a service. And that's a real market that really exists today that people really use.
So now, the question is should a managed PKI provider - who is in principle expert in this - give that customer, that end using entity, complete latitude on the choices that it makes around its PKI or should the managed PKI provider itself, impose certain rules and requirements and say I will do this, but I won't do that, even though you're the paying customer, because my role in this is to be your expert advisor. Just as my doctor won't just prescribe anything I want. My doctor is supposed to be my expert advisor. And there will be rules and requirements around what the doctor was willing to give me or do for me. So that's the question. And I think it's probably not as simple yes, no answer. It's probably nuanced and complex. And I thought it would be fun to get into it today. So, Jason, react.
Now, of course, if I were to say no, and my competitor were to say, yes, I might be chasing business to my competition. But I think your point is that, as an expert advisor in a pretty esoteric, and foundational aspect of an organization security, a managed PKI provider has a responsibility to kind of stick with certain standards that they're not really willing to compromise. Is that right?
I would hope all of our competitors would think in lockstep. We're all, you know, long term professionals in this industry. And, we all, you know, we don't say an oath the way doctors do but there's almost like an unwritten oath I think amongst ourselves that it's like, eh, not sure I would give that kind of implementation to a customer.
I would say the advice, the proper advice, to give now is, hey, with CLM, certificate lifecycle management, and automation, and better ways of handling these things, let's architect your security in such a way, where we can go to something that's a lot more reasonable. Just like the CA/Browser Forum with its rules about roots not lasting past a certain period of time. Even those things are shortened, right?
So one of the reasons you want to have long roots is because there's some dentist office somewhere that needs the old root, right? We are picking on dentists today, I'm not sure why. And so, that would be the direction that that takes.
In a typical enterprise, in just a company, you have enormous control over the devices that actually need to be able to connect to your network and you don't want just any random device connecting and in fact, you do want everything to be something that you have and is blessed and you cycle these assets out after a certain amount of time and you don't really want a 7 or 10 year old asset in the mix to begin with.
So under those circumstances, it feels like shorter roots, probably most of the time, are more tolerable. And we may even go the opposite direction. We might argue that a private PKI setup should encourage, let's say, even shorter root lifespans than you see in the public. PKI today.
It's interesting, isn't it? Because it's like, here we are, you know, we're ultra scrutinizing just, you know, managed PKI, when in reality, other forms of asymmetric based secrets, when they're implemented without those kinds of expertise, is quite often the source of just an absolute nightmare. And so, hey, enterprises, oh, my goodness, let's look at when there are no rules or experts or - - it's a disaster.
So what I'd like to argue here is, I see the same issue of what we're talking about, is, guys, you have very dirty floors, very dirty laundry rooms, with all your other security aspects and yet you hold, you know, your managed PKI to this incredible level and some of you want to dictate the terms below what experts tell you to use. And I can tell you, whether it happened by default because of an open source or whatever - anytime enterprises were just allowed to choose their own thing, it was a disaster.
And we've almost seen it all. Right? There will be new stuff as quantum comes and new use cases come about within the cloud and etc. etc. That's fine.
You know, on and on and on. And so listen to your experts. Please, please, please, please go to the experts and listen carefully. And on a use case by use case basis we’ll do the right thing with you.
You know, and with quantum…multiply everything by 100. So it's gonna be a very interesting time to be alive over the next X number of years.

