This document is under active development and has not been finalized.
Skip to content

Key Management & Certificate Management

Key Lifecycle

PhaseRequirements
GenerationCryptographically secure random number generators (CSPRNG), minimum key lengths per BSI TR-02102
DistributionEncrypted channel, personalized handover, no plaintext transmission
StorageEncrypted storage, need-to-know access control, audit trail
UsageOnly for defined purpose, no repurposing
RotationScheduled per rotation intervals, unscheduled upon suspected compromise
ArchivalEncrypted, time-limited, only for decryption of legacy data
DestructionSecure deletion (cryptographic erasure or physical destruction), documented

Rotation Intervals

Key TypeRotationNotes
TLS certificates90 days (Let's Encrypt automated)Automated renewal
SSH keysAnnually or upon personnel changePersonalized keys
API keysAnnually or upon suspected compromiseAutomated where possible
Backup keysOn every full backupArchive old key for restore
Database keysAnnuallyPlanned rotation during maintenance window

Certificate Management

Inventory

All certificates are tracked centrally:

AttributeDescription
Domain / Common NameWhich domain the certificate covers
IssuerCA (Let's Encrypt, internal CA)
Expiry dateAutomatic monitoring
Renewal processAutomatic / Manual
Responsible partyAssigned administrator

Monitoring

CheckIntervalAction on Finding
Expiry date checkDaily (automated)Alert 30 days before expiry, escalation 7 days before expiry
Certificate chain validationWeeklyAlert on invalid chain
Revocation status (OCSP/CRL)On every connection (client)Reject connection for revoked certificate

Revocation Process

Upon compromise of a certificate:

  1. Immediate revocation at the CA
  2. Issue and deploy a new certificate
  3. Verify whether the compromised key was used elsewhere
  4. Document the incident and incorporate into risk analysis

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT