BT PLC

BT Managed PKI Security

Managed PKI Security is a fully-integrated enterprise Public Key Infrastructure (PKI) solution that allows organisations to establish a robust PKI, Root and Issuing Certificate Authorities (CAs) with total control over security policy, authentication models and certificate lifecycle management.

Features

  • tScheme and ISO27001 approved
  • Self-service policy configuration
  • Automated approval mechanisms
  • Support for multi-level PKI hierarchies
  • Key backup to support archive of encryption keys
  • Secure Root CA management including key signing ceremonies
  • Certificate status checking through CRLs and OCSP
  • Certificate status checking through CRLs and OCSP

Benefits

  • Quick to deploy - Service can be operational in days
  • Low Cost of Ownership – compared with standalone PKI software
  • Scalable – service scales from tens to millions of users
  • Open Standards based
  • Secure, Reliable Operations – supported by binding service-level agreements

Pricing

£0.30 to £9.67 per user per month

Service documents

G-Cloud 9

631112935573392

BT PLC

Neil Harmes

0800 3288077

ccsframeworks@bt.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Customers operating Certification Authorities (CAs) under a Symantec Trust Network (STN) Root CA must comply with the BT SN CPS (see https://www.trustwise.com/repository/CPS/cps.htm)
System requirements
  • User - Windows 7/8.1/10 with IE or Firefox
  • User - Mac OS X with Safari
  • Administrator - Windows 7, 8.1 or 10 with IE

User support

User support
Email or online ticketing support No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide telephone and email support for the Managed PKI Security service Administrators between 08:00 and 17:00 Monday to Friday, excluding UK Public Holidays. 24x7 and onsite support can be provided at additional cost.

The Service Desk aims to answer 95% of calls within 30 seconds and resolve Priority 1 and 2 issues with 5 hours. A priority 1 issue would be one that results in a total loss of service or serious impairment to the service. A priority 2 issue is one that involves some loss of functionality.

Monthly service availability, excluding scheduled downtime, will be at least 99.5%.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All orders are owned and managed through to completion by the Project Office. A Project Manager is assigned, who will agree a Project Implementation Plan, with the customer and manage the delivery of the service.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction There is no data to extract when the contract ends. The only data held by the service is a copy of the certificate and data on the status of that certificate.
End-of-contract process Any certificates issued by the Customer CAs are revoked.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service It is not possible to enrol for a certificate directly from a mobile device. This has to be enrolled for from a desktop then imported onto the mobile device.
Accessibility standards None or don’t know
Description of accessibility The service is accessed via a browser and makes use of the standard Accessibility/Ease of Access configurations in the desktop OS. Additionally, a SCEP (Simple Certificate Enrolment Protocol) interface is provided that enabled direct interaction with the platform from compatible devices such as Cisco routers, and a web services interface to enable easy integration with bespoke customer systems.
Accessibility testing None.
API Yes
What users can and can't do using the API - Issue a certificate either singularly or in bulk;
- Suspend a certificate either singularly or in bulk;
- Un-suspend a certificate either singularly or in bulk;
- Revoke a certificate either singularly or in bulk; and
- Issue & suspend a certificate either singularly or in bulk.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Customers can choose what extensions are used in certificates, set the text for renewal and other emails and configure when these are sent out and to who. Customers using the Local Hosting option can also create their own certificate enrolment pages.

Scaling

Scaling
Independence of resources The Managed PKI Security platform has been dimensioned to be able to be able to issue ~1m certificates each day and each CA is logically separated from the others to ensure that the demand on one individual CA doesn't impact on the others.

Analytics

Analytics
Service usage metrics Yes
Metrics types The Customers Administrator is able to access a Full and Current Status Report through the PKI Control Centre. The Full Report reports the status of all certificates and all certificate requests for the date range specified and the Current Status Report the current status of all certificates. Additional reports can be produced on request.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach CSV file containing the serial numbers of all issued certificate, their expiry dates and the current status can be provided at the end of the contact.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability The monthly Service Availability target for the Managed PKI Security is 99.5%.
Approach to resilience The service is replicated in a secondary site and a Business Continuity Plan is place.
Outage reporting All customers are notified of service outages by email as soon as they become known to BT.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Management interface and support channels required by BT people to support the service are blocked from customer access by firewalls and routing. BT support access is restricted to traffic originating from the relevant secure management platform. This have two factor authentication in place.
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 LRQA
ISO/IEC 27001 accreditation date 27/11/2015
What the ISO/IEC 27001 doesn’t cover Nothing. The ISO 27001 certification covers the entire provision of the Managed PKI Security service.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations TScheme

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The Managed PKI Security service is certified to ISO27001:2013 and is tScheme accredited.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configuration changes are managed in accordance with BT IT Change Management Process.
Vulnerability management type Supplier-defined controls
Vulnerability management approach BT has a documented vulnerability management process that assesses potential threats, and determines how quickly these need to be patched. The service is patched quarterly by routine, but individual patches may be applied more quickly if the threat requires this.

The BT Managed PKI Security vulnerability management process is reviewed as part of our ISO27001;2013 certification.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Network event monitoring is carried out via the BT Threat Monitoring Teams who manage the IDS/IPS appliances associated with the service.

Monitoring of OS audit logs is performed manually by the Application Support team responsible for the service.
Incident management type Supplier-defined controls
Incident management approach The Managed PKI Security Administrators can report incidents via telephone and email to the Managed PKI Security Service Desk. The Service Desk will provide the Administrator with a reference number for the incident and provide regular updates until the incident is closed.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £0.30 to £9.67 per user per month
Discount for educational organisations No
Free trial available Yes
Description of free trial The free service allows customers to issue test certificates with a 60-day validity period from shared Test CA.
Link to free trial https://testdrive.trustwise.com/

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑