CERTInext Security Model
CERTInext is designed with a defense-in-depth security model that addresses platform security, data protection, access control, and trust operations across both SaaS and integrated CA environments. The model aligns with what enterprise Infosec teams typically evaluate for cloud-based CLM and PKI platforms.
1) SaaS Security Assurance and Certifications
In the SaaS deployment model, CertiNext operates under independently validated security frameworks:
SOC 2 Type II certified, covering security, availability, and operational controls over time
ISO/IEC 27001 certified at the organizational level, ensuring a formal Information Security Management System (ISMS) with continuous risk management, controls, and audits
These certifications provide assurance that CertiNext follows structured, repeatable, and audited security practices.
2) Data Protection and Encryption
CertiNext enforces strong data protection controls across storage and transit:
PII and sensitive data are encrypted at rest in the database
When Bring Your Own Key (BYOK) is enabled, customer data is encrypted using the customer-provided encryption key
All data in transit between users, APIs, bots, and services is encrypted using TLS 1.2 or higher
This ensures confidentiality of certificate metadata, audit records, and operational data.
3) Application and Infrastructure Security
At the application and infrastructure layers, CertiNext applies multiple security controls:
Web Application Firewall (WAF) to detect and block malicious traffic, abuse patterns, and common attack vectors
Regular Vulnerability Assessment and Penetration Testing (VAPT) covering:
Application layer
Infrastructure layer
Network exposure
Findings are tracked and remediated as part of secure development and operations processes
These controls reduce exposure to both automated and targeted attacks.
4) Access Control and Least Privilege
Access to CertiNext systems and infrastructure is governed by the principle of least privilege:
Administrative and operational access is tightly restricted
Privileged access is granted only where required and reviewed periodically
Strong authentication controls are enforced for system and platform access
This minimizes the risk of unauthorized access and lateral movement.
5) In-Application Role-Based Access Control (RBAC)
Within the CertiNext application, customers control access using fine-grained RBAC:
Roles define what actions a user can perform
Groups and tags define where those actions can be performed
Separation of duties can be enforced between requestors, approvers, operators, and auditors
This allows customers to align platform access with internal security and governance policies.
6) Public Trust Security – emSign
Public trust operations integrated with CertiNext are provided by emSign, which operates as a WebTrust-accredited Certificate Authority.
Key aspects include:
Trust operations aligned with WebTrust principles and controls
Annual independent WebTrust audits covering CA operations, key management, issuance, revocation, and incident handling
Secure, audited environments for all public trust services
This ensures that publicly trusted certificates managed through CertiNext are issued and operated within globally accepted trust frameworks.
7) Additional Security Controls Relevant to Infosec Teams
CertiNext also incorporates the following security measures commonly assessed by enterprise security teams:
Audit logging for all administrative and certificate lifecycle actions
Change tracking for policies, roles, and configurations
Secure SDLC practices, including code reviews and security testing
Segregation of environments (sandbox, staging, production) in SaaS deployments
Monitoring and alerting for abnormal activity and operational anomalies
Regular backups and resilience controls aligned with HA/DR objectives
Security as a Foundational Design Principle
Security in CERTInext is not treated as an add-on—it is embedded across platform architecture, operations, and trust services. By combining certified controls, strong encryption, layered defenses, strict access governance, and audited public trust operations, CertiNext meets the security expectations of enterprise Infosec teams while enabling scalable, automated certificate lifecycle management.
Last updated
