Post

Threat Model - 2 Tier PKI for Web Server Certificates

Learn essential security practices to protect your Linux system from cyber threats and attacks.

System: Two-Tier Public Key Infrastructure (PKI)
Version: 1.0
System: Two-Tier Public Key Infrastructure (PKI)
Scope: PKI issuing and validating X.509 certificates for internal web servers.

1. System Overview

The PKI enables secure TLS authentication for corporate web servers.
It uses a two-tier architecture:

  • Offline Root CA (Trust Anchor)
    • Kept completely offline (air-gapped)
    • Signs the Intermediate CA certificate only
    • Publishes Root CA CRL periodically
  • Online Intermediate CA
    • Hosted on a hardened server
    • Issues and revokes end-entity (web server) certificates
    • Publishes CRL and/or OCSP responses
  • Web Server (End Entity)
    • Requests and installs its certificate
    • Uses the certificate for TLS authentication
  • Relying Party (Client / Browser)
    • Validates the certificate chain and revocation status
  • CRL/OCSP Distribution Point
    • Provides certificate status information for revocation checking

2. Architecture Diagram

1
2
3
4
5
6
flowchart TD
    A -->[Offline Root CA] -->(Signs) B[Online Intermediate CA]
    B -->(Issues) C[Web Server Certificate]
    B -->(Publishes CRL/OCSP) D[CRL/OCSP Server]
    C -->(Presents Cert) E[Relying Party]
    E -->(Validates via CRL/OCSP) D

3. Assets and Trust Boundaries

CategoryAssetDescriptionTrust Boundary
Root CARoot private keyUltimate trust anchor; compromise is catastrophicOffline / Air-gapped
Intermediate CAIntermediate private keyUsed to issue all operational certsOnline CA boundary
Web ServerEnd-entity private keyUsed for TLS authenticationWithin server boundary
CertificatesX.509 chainProof of identity and trust chainCrosses network
CRL/OCSPRevocation dataUsed to validate certificate statusPublicly accessible
ConfigurationOpenSSL config, policiesDefines certificate profiles and validityCA management zone
Audit LogsEvent recordsRecord issuance, revocation, accessCA operational zone

4. Trust Boundaries

  • Offline Root Boundary – Air-gapped, only accessible during key ceremonies.
  • CA Management Boundary – Restricted zone where Intermediate CA operates.
  • Network Boundary – Between CA and CRL/OCSP publication endpoints.
  • Public Boundary – Between web server and external clients.
  • Each boundary crossing introduces confidentiality and integrity risks.

5. Threat Enumeration (STRIDE)

Threat CategoryExample ThreatsAffected AssetsMitigations
SpoofingFake intermediate CA or web server impersonationCertificates, keysChain validation, CA pinning, HSM-protected keys
TamperingUnauthorized modification of CRL or certsCRL, DB, cert filesSigned CRLs, integrity checks, digital signatures
RepudiationCA operator denies issuing/revoking a certLogs, issuance recordsAudit trails, signed logs, secure timestamps
Information DisclosureExposure of private keys or internal CA detailsPrivate keys, config filesEncryption at rest, strict access control, air-gapped root
Denial of ServiceCRL/OCSP unavailability, CA overloadCRL/OCSP serverLoad balancing, caching, redundant distribution
Elevation of PrivilegeCompromise of CA operator or system accountCA host, keysMFA, least privilege, HSM-based signing, OS hardening

6. Risk Assessment

Threat Impact Likelihood Risk Level Mitigation Summary Root key compromise Critical Rare High Offline root, HSM, multi-person control Intermediate CA compromise Critical Possible High HSM, network isolation, MFA CRL tampering High Low Medium Signed CRL, integrity checks Unauthorized certificate issuance High Medium High Role separation, issuance policy enforcement OCSP outage Medium Medium Medium Redundant responders, failover mechanisms Audit log tampering High Low Medium Immutable storage, signed logs Weak crypto algorithms High Low Medium Enforce RSA 4096 / ECDSA P-384, SHA-256+ Misconfigured web server certs Medium Medium Medium Automated validation, linting, cert monitoring

7. Mitigation Recommendations

  • Root CA
    • Keep offline at all times except during signing ceremonies.
    • Use multi-person control (M of N) and HSM protection.
    • Periodically issue Root CRLs to support revocation of intermediate certs.
  • Intermediate CA
    • Harden OS and isolate from other networks.
    • Store private key in HSM or TPM.
    • Enforce certificate policies and approval workflows.
    • Regularly rotate and review access credentials.
  • CRL/OCSP
    • Ensure redundancy and synchronization.
    • Digitally sign all responses.
    • Use short-lived OCSP responses to reduce risk exposure.
  • Operational Controls
    • Maintain immutable, centralized logs.
    • Perform periodic key ceremonies and audits.
    • Use internal monitoring for unauthorized issuance or access.

8. Assumptions and Dependencies

  • Relying parties trust the Root CA certificate.
  • Private keys are generated securely and never exported in plaintext.
  • Network time (NTP) is synchronized for cert validity checking.
  • OpenSSL is configured with FIPS-compliant algorithms.

9. References

This post is licensed under CC BY 4.0 by the author.

© n2r. Some rights reserved.

❤️ Thanks for dropping by! ❤️ | 🛡️ Stay secure, Stay savvy 😎