Microsoft Windows graphic

Best practices

Plan your public key infrastructure (PKI) before deploying certification authorities (CAs)

Place database and transaction log files on separate hard drives

Keep the root certification authority offline and secure its signing key by hardware and keep it in a vault to minimize potential for key compromise

If you are going to use a custom policy module for a Microsoft CA, install Certificate Services using stand-alone policy and then replace stand-alone policy with your custom policy

When changing security permissions for the certification authority (CA), always use the Certification Authority snap-in

Do not issue certificates to users or computers directly from the root certification authority

Back up the CA database, the CA certificate, and the CA keys

Ensure that key lifetimes are long enough to avoid renewal issues

Review the concepts of security permissions and access control, since enterprise certification authorities issue certificates based on the security permissions of the certificate requester

Use Secure Sockets Layer (SSL) when using Web-based certificate enrollment