Key Handling and Storage

Key Handling and Storage

Secure key handling and storage are fundamental to the security of certificate lifecycle management and public/private trust operations. In CertiNext, cryptographic keys are treated as high-value security assets and are protected using strong controls across their entire lifecycle—from generation and storage to usage and retirement.

The platform’s design aligns with enterprise security expectations, audited trust frameworks, and modern cryptographic best practices.


Key Generation

Cryptographic keys used within CertiNext are generated using approved algorithms and key sizes aligned with industry standards.

  • Keys are generated in secure, controlled environments

  • For CA and trust-critical operations, keys are generated inside Hardware Security Modules (HSMs) to prevent exposure

  • Key generation policies enforce approved cryptographic standards and key lengths

This ensures keys are created with strong entropy and never exposed in plaintext form.


Key Storage and Protection

Private keys are never stored in application memory or file systems.

Key storage follows these principles:

  • Keys are stored exclusively within secure key stores or HSMs

  • Access to keys is tightly restricted and role-controlled

  • Keys are protected against extraction, tampering, or unauthorized use

In SaaS deployments, CertiNext uses FIPS 140-2 Level 3 compliant HSMs hosted and operated by eMudhra in secure data centers. These HSMs provide hardware-enforced key protection, secure execution, and auditability.


HSM Isolation and Partitioning

To ensure strong tenant separation and cryptographic isolation:

  • Dedicated HSM partitions can be provisioned per customer on request

  • Each partition enforces logical separation of keys and cryptographic operations

  • Access to partitions is strictly controlled and audited

This model ensures that one customer’s keys cannot be accessed or impacted by another.


Key Usage Controls

Key usage is governed by strict policies that define:

  • Permitted cryptographic operations (signing, encryption, decryption)

  • Allowed certificate types and trust contexts

  • Validity periods and rotation requirements

Keys can only be used through approved workflows and APIs. Direct key access or export is not permitted, significantly reducing the risk of compromise.


Key Rotation and Lifecycle Management

CertiNext supports controlled key lifecycle management, including:

  • Scheduled or policy-driven key rotation

  • Replacement of keys during certificate renewal or reissuance

  • Decommissioning and secure retirement of obsolete or compromised keys

These processes support crypto-agility and long-term security hygiene.


Access Control and Auditability

All key-related operations are:

  • Restricted using least-privilege access controls

  • Logged in tamper-evident audit logs

  • Traceable to specific users, roles, or system processes

This supports accountability, forensic analysis, and compliance audits.


On-Premises Deployments

In on-prem deployments:

  • Key handling and storage integrate with customer-managed HSMs or key management systems

  • Customers retain full control over key custody, backup, and recovery

  • CertiNext interacts with keys only through approved cryptographic interfaces

This allows alignment with existing enterprise PKI and security architectures.


Security and Compliance Alignment

CertiNext’s key handling and storage practices align with:

  • WebTrust principles for public trust operations

  • Enterprise security frameworks such as ISO 27001 and SOC 2

  • Industry best practices for PKI and cryptographic key management


Summary

CertiNext treats cryptographic keys as the root of trust. By combining secure key generation, hardware-based storage, strict usage controls, HSM isolation, lifecycle management, and full auditability, CertiNext ensures that keys remain protected, compliant, and resilient—supporting both public trust and private PKI environments with enterprise-grade security.

Last updated