CA Maturity Model
CA Maturity Model
Publication
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
This document has been developed to propose a model to assess the maturity level of a Certification
Authority and may be updated from time to time as public discussion progresses.
Third party sources are quoted as appropriate. ETDA is not responsible for the content of the external
sources, including external websites, nor their continued availability, referenced in this document.
Where specific vendors or product names are given, those do not mean endorsement from ETDA, but serve
as examples only.
This document presents a proposed model and is intended for educational and information purposes only.
Neither ETDA nor any person acting on its behalf is responsible for the use that might be made of the
information contained in this document. All information contained herein is provided on an “As Is” basis
with no warranty whatsoever. NRCA/ETDA does not promise any specific result, effects, or outcome from
the use of the information herein.
This document is published under a Creative Commons Attribution-
NonCommercial-ShareAlike 4.0 International License1.
Copyright © Electronic Transactions Development Agency, 2023
Written by Martijn van der Heide
1
Creative Commons License: <https://creativecommons.org/licenses/by-nc-sa/4.0/>
Publication
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
Table of Contents
1 INTRODUCTION ...............................................................................................................................................................2
1.1 INTENDED AUDIENCE .............................................................................................................................................................................2
1.2 RATIONALE ...........................................................................................................................................................................................3
1.2.1 Existing maturity models ....................................................................................................................................................3
1.2.2 The SIM3 approach..............................................................................................................................................................3
1.3 DEFINING THE MATURITY MODEL .........................................................................................................................................................5
1.3.1 Basic level ..............................................................................................................................................................................5
1.3.2 Intermediate level................................................................................................................................................................5
1.3.3 Advanced level .....................................................................................................................................................................5
1.4 INTENDED USE ......................................................................................................................................................................................5
1.5 NEXT STEPS .........................................................................................................................................................................................6
1.6 ACRONYMS ...........................................................................................................................................................................................6
2 METHODOLOGY USED...................................................................................................................................................7
2.1 SOURCES..............................................................................................................................................................................................7
2.1.1 SIM3..........................................................................................................................................................................................7
2.1.2 CA/B Forum Network and Certificate System Security Requirements ...................................................................8
2.2 SCORE MAPPING ON THE MATURITY LEVELS ...........................................................................................................................................9
2.2.1 Basic level ..............................................................................................................................................................................9
2.2.2 Intermediate level............................................................................................................................................................. 10
2.2.3 Advanced level .................................................................................................................................................................. 11
2.2.4 Further score creation...................................................................................................................................................... 11
3 PROPOSED MATURITY MODEL ................................................................................................................................. 12
APPENDIX A: REFERENCES ................................................................................................................................................. 19
-1-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
1 Introduction
[For those unfamiliar with the field, a quick introduction into Public Key Infrastructure (PKI) and the specific
role of the Certification Authorities (CAs) s in it, can be found in our “Establishing a Certification Authority
(CA)” handbook2.]
CAs must be highly trusted and secure organizations, as they are at the core of the PKI the world depends
on for secure communication and transactions.
The CA/B Forum3 created and maintains a set of Baseline documents a CA should implement as a minimum,
depending on the types of certificates being issued.
To assist in the validation of the Certification Policy (CP) and Certificate Practice Statement (CPS), the
Common CA Database (CCADB)4 provides a self-assessment sheet.
Public CAs that require international recognition must be audited annually by certified WebTrust (or ETSI
equivalent) auditors. The audit scope depends on the types of certificates the CA issues: all CAs must pass
the main “WebTrust Principles and Criteria for Certification Authorities” audit, if they issue SSL/TLS or
S/MIME certificates, they are required to also be audited for these additional scopes. These additional
scopes also include specific network security and Certificate System security requirements.
Both the Baseline, Self-assessment and Audit requirements documents are listed in Appendix A for
reference.
This document proposes to create a maturity model for CAs using the SIM3 model philosophy. How we
created the proposed set of parameters is explained in chapter 2. The proposed resulting model is provided
in chapter 3.
4 CCADB: https://www.ccadb.org/
-2-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
1.2 Rationale
Public CAs come in all shapes and sizes:
They can be dedicated Root CA organizations.
They can be dedicated external Subordinate CA organizations operating under a common Root CA.
They can exist as a department of a larger organization, such as an Internet Service Provider that
also provides SSL/TLS certificates in their web hosting package.
In all cases, the existing Baseline, Self-assessment and Audit requirement documents are very helpful to
ensure the CA is set up in a way to be trustworthy and secure, but they don’t really measure the maturity
of the organizations, as they generally only state that specific things must exist, without taking into account
how well established they are. Was a document created just by an individual employee, or has it been
signed into policy by management, maybe even reviewed regularly?
maturity-model-c2m2
7 PKI Maturity Model: https://pkic.org/pkimm/
-3-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
1) O: Organizational
The organizational (‘O’) parameters focus on aspects that together describe the foundation and
extent of the CSIRT’s activities (i.e. the mandate, setup and services of the CSIRT, and the
framework connecting all organizational aspects).
2) H: Human
The human (‘H’) parameters in the framework focus on important aspects related to the CSIRT’s
staff (this refers not only to technical staff but to all staff members). Together, these parameters
reflect how the team views its staff in relation to the work of the team and how this is organized.
3) T: Tools
The tools (‘T’) parameters refer to the tools and technologies that are used by the CSIRT to reach
its objectives and offer its services to its constituency. A ‘tool’ in this context can be a list, an excel
sheet or, in most advanced cases, an actual implementation of advanced tooling.
4) P: Processes
The processes (‘P’) parameters focus on a set of processes that should be well organized in order
for a CSIRT to perform its tasks. The word ‘process’ is meant in a generic way – it includes not only
processes in the sense of a logical set of sequential or parallel steps, but also policies, both of the
more fundamental kind as well as very basic policies. Some of the Process parameters are
connected with parameters from the other categories (Organization, Human and Tools), where the
description or list is found more in those other categories, and the P-parameters focus on the steps
that need to be taken.
Each parameter’s answer is a score of 0-4:
-4-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
-5-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
1.6 Acronyms
This document uses the following acronyms:
Acronym Term
CA Certification Authority, or Certificate Authority
CP Certification Policy
CPS Certificate Practice Statement
CSIRT Computer Security Incident Response Team
PKI Public Key Infrastructure
SIM3 Security Incident Management Maturity Model
Table 2: List of acronyms
-6-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
2 Methodology used
As explained in the Rationale chapter, we are aiming to create a CA Maturity Model based on the philosophy
as set forth in the SIM3 model.
2.1 Sources
CA organizations are not dedicated CSIRT organizations (they may have a CSIRT team, of course), but they
should be highly trusted and secure. There is therefore significant overlap, and many of the requirements
are the same, while additional requirements exist that are audited as well. We chose to use the CA/B Forum
Network and Certificate System Security Requirements as secondary source to create the resulting list of
parameters.
2.1.1 SIM3
SIM3 contains 45 parameters across 4 quadrants (Organization, Hunan, Tools, and Processes).
The official published standard is v1, last updated in 201911. Development is currently in progress for v2, so
we decided to use the online SIM3 Self-assessment Tool12 as it uses a v2 interim version.
We selected 26 of the 45 parameters as always useful to assess a CA organization. The parameter
descriptions have been slightly modified to suit a CA rather than a CSIRT.
-8-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
-9-
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
- 10 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
Baseline
requirements
Intermediate
Advanced
Basic
Param Name Description
Organization
Though often information security and business continuity are treated
separately, it is more logical in the context of IT/cyber to have business
continuity as an integral part of a good security policy, and that is the
approach we take here. So, when we say 'security policy' this includes such
important aspects as 'availability', and how to get back to normal after
CA-O-1 Security Policy 3 4 4
disruptions - but the landscape is even broader than that, thought also needs
to be given to site security and resilience, and workspace security and
resilience.
Does your organization have a security policy, or set of security policies
(including BCM aspects)?
An infrastructure security architecture defines and describes the segmentation
of the network into different zones based on their functional or logical
relationship, with a specific Secure Zone for the CA platform. Production and
office networks should be strictly separated. Each network boundary must be
enforced (firewall, switch, router, gateway, or other network control device or
CA-O-2 Infrastructure security architecture 3 4 4
system) with rules that support only the services, protocols, ports, and
communications that the CA has identified as necessary to its operations.
Internet-facing systems, such as the CRL and OCSP Responders, may need
additional protection against tampering (e.g., DDoS attacks.)
Does your organization have an infrastructure security architecture?
Change management is the process of planning, implementing, and solidifying
changes in an organization and encompasses all different types, whether
CA-O-3 Change management policy those are changes in policies, procedures, configurations, and hardware or 3 3 4
software products.
Does your organization have a change management policy?
Vulnerability management is a continuous risk-based process that aims to
CA-O-4 Vulnerability management policy identify vulnerabilities and other potential weaknesses in the infrastructure, 3 3 4
followed by evaluating, prioritizing, treating, and reporting. Any remaining
- 12 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
Human
Does your organization provide guidance, guidelines or sets of rules for its
staff on how to behave professionally, in an ethical manner? Often called a
'Code of Conduct (CoC)' a 'Code of Practice (CoP)' or 'Ethics guideline', it can
provide golden rules on confidentiality, trustworthiness, and other key human
qualities expected from staff. Note that in most cases the CA's host
organization will have some kind of ethics code, but such codes are of a
generic nature and have nothing to do with the specific work that the CA
does - therefore such generic codes are not valid to satisfy this parameter
CA-H-1 Code of Conduct/Practice/Ethics The CA regularly deals with highly sensitive data, and communicates not just 2 3 3
inside the host organization, but also outside. Also, responsible behavior of
CA staff is not limited to the work context, but also relevant in private circles
where security is concerned. The Trusted Introducer CSIRT Code of Practice
(TI CCoP) can be used as CoP baseline, which was written specifically for
CSIRTs; another excellent starting point is 'EthicsFIRST' made by FIRST, which
has its own website. Do note that proper alignment with the security policy is
always necessary.
Does your organization support such a code of conduct/practice/ethics?
Does your CA have enough staffing to deal with planned or unexpected staff
members' unavailability? Such cases include illness, holidays, quitting of job ...
CA-H-2 Staff Resilience Note that staff resilience is also an aspect of Business Continuity Management 2 3 4
(BCM).
What about the staff resilience of your organization?
Does your organization have a description of the skills needed for all
employee positions related to the CA roles? All positions must be defined,
and include a description of expected staff’s skills: this includes technical,
CA-H-3 Skillset Description 2 2 3
knowledge, experience, and soft skills - e.g., communication, team spirit,
working under stress, etcetera.
Has your organization described the skillsets needed?
Does your organization have a policy for the professional development of
their staff? This parameter is about staff development as a whole, probably
including but not limited to a training plan for new staff members, personal
development planning and a catalogue of trainings for existing staff members,
team building/education schemes, and etcetera.
CA-H-4 Staff Development 2 3 4
Staff development can take the shape of on-the-job-coaching, internal or
external trainings, but also includes peer mentoring schemes (colleagues
helping each other to get better at their jobs), management evaluation
interviews, and team meetings and internal workshops.
Does your organization have such a staff development policy?
- 13 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
Tools
The availability of an up-to-date and sufficiently detailed list of what kind of
computer/networking/OT resources the organization uses is very important for
efficient security incident management. Such a list should include information
about hardware, software, and OT. This should include relevant
configurations: such more detailed information (including software versions in
CA-T-1 IT Assets and Configurations 2 3 3
use) is necessary to deal with threats more effectively. Some organizations
use IT assets management (ITAM) for this purpose, and maintain a
configuration management database (CMDB).
Does your organization maintain an overview of all IT assets and
configurations?
This is about having a well-defined and implemented set of tools that help
with incident prevention. These tools are part of the first line of defense for
the organization.
CA-T-2 Incident Prevention Toolset 2 3 3
Examples of prevention tools: intrusion prevention systems, antivirus
software, spam filters or vulnerability scanners.
Does your organization have a well-defined incident detection toolset?
This is about having a well-defined and implemented set of tools that help
with incident detection. These tools are like the ears and eyes of the
CA-T-3 Incident Detection Toolset organization- they bring information about threats and incidents, from 2 3 3
potential to exploited.
Does your organization have a well-defined incident detection toolset?
CA-T-4 Incident Resolution Toolset This is about having a well-defined and implemented set of tools that help 2 3 3
with incident resolution: the stage where a detected incident is being
- 14 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
addressed.
Does your organization have a well-defined incident resolution toolset?
All system activity logs created by the CA platform must be reviewed
regularly, as well as the integrity of the log files themselves. Critical events
CA-T-5 Log review and alerting automation should be alerted to (multiple) qualified staff for immediate review in an 3 3 3
automated way.
Does your organization have an automated log review and alerting method?
Processes
Each organization must be able to escalate critical incidents to the
appropriate management levels, including the highest level of governance
(e.g., board of directors, regulator, or minister) in case of potential crises or
incidents that are at least a significant threat to the reputation of the
organization.
Such escalations triggered by security incidents or other events should be
CA-P-1 Escalation to Governance Level 3 4 4
defined in accordance with the Incident Classification, which allows logically
basing the escalation on e.g., impact and priority. It is critical that the means
to escalate must be available at all times - even though the feedback or
reaction will not always be as immediate, as this is defined by higher
governance levels in the organization.
Can your organization escalate in the way meant here?
Handling the press and public media is required. In case most or all CA staff
have been tasked to not talk with the press themselves, press requests in
regard security incidents must still be handled effectively, wherever they
come in. Therefore, the staff must be able to reach out to appropriate
spokespersons who normally handle press inquiries. To avoid
miscommunication and delays that might impact on the organization’s
reputation, the staff need to be able to reach such press contacts directly
CA-P-2 Escalation to Press Function and also outside business hours, in order to give them the necessary 1 2 3
situational awareness. It is advisable that the organization itself designates a
limited amount of staff members to also be able to talk with the press, e.g.,
together with an official spokesperson - as such designated staff members will
be able to give more insight into the technical aspects of a given situation;
when such a choice is made it's advisable to give such staff members a
suitable training.
Can your organization escalate in the way meant here?
Handling legal issues including requests from law enforcement is required.
Such requests to the organization must be handled very effectively in order
to avoid that evidence is destroyed or no longer available, e.g., as a result of
automated processes removing data routinely - but also, because handling
such issues wrongly could lead to reputation damage and financial losses.
CA-P-3 Escalation to Legal Function The organization must therefore be able to reach out directly and also 2 3 3
outside business hours, to legal experts in their organization (e.g. lawyers) to
inform them about relevant issues, including but not limited to incoming law
enforcement requests or orders. The legal experts can then either handle
these issues themselves directly, or in consultation with the staff.
Can your organization escalate in the way meant here?
From a risk management perspective, incidents must be avoided, therefore
the organization should support appropriate prevention processes internally.
Examples of processes that prevent incidents from happening are: the
CA-P-4 Incident Prevention Process creation and dissemination of advisories about new security vulnerabilities; 2 3 4
port scan activities; the spreading of threat intel; the sharing of lessons learnt
from the analysis of incidents. Usually, tools are used to support these
processes, and then how to do that will be part of the process.
- 15 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
- 16 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
- 17 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
- 18 -
Thailand National Root Certification Authority: Thailand NRCA
Electronic Transactions Development Agency CA Maturity Model
Appendix A: References
Publisher Document
CA Baseline Documents
CA/B Forum CA/Browser Forum Network and Certificate System Security Requirements Link
CA/B Forum CA/Browser Forum Baseline Requirements Certificate Policy for the Issuance and Link
Management of Publicly-Trusted Certificates (SSL/TLS Server Certificates)
CA/B Forum CA/Browser Forum Baseline Requirements for the Issuance and Management of Link
Publicly-Trusted S/MIME Certificates
CA Self-assessments
CCADB CCADB Self Assessment Link
CA Audit documents
CPA Canada WebTrust Principles and Criteria for Certification Authorities Link
CPA Canada WebTrust Principles and Criteria for Certification Authorities – Network Security Link
CPA Canada WebTrust Principles and Criteria for Certification Authorities – SSL Baseline with Link
Network Security
CPA Canada WebTrust Principles and Criteria for Certification Authorities – S/MIME Certificates Link
CSIRT Documents
Open CSIRT Security Incident Management Maturity Model (SIM3) Link
Foundation
Table 7: References
- 19 -