Certificate Lifecycle Management Reading Time: 8 minutes

Best Practices for Certificate Authority (CA) Certificates Renewal

In the Public Key Infrastructure (PKI) environment, Certificate Authorities (CAs) are the most important components that act as the source of security and integrity of digital communications. Renewal of Root and Issuing Certificate Authorities (CAs) is a critical process that ensures continuity and security in digital identity management.  

In this blog, we will learn the best practices for renewing Root and Issuing CAs, including considerations for CA lifetimes, Certificate Revocation List (CRL) publication timelines, and other key considerations.

Definitions of Root and Issuing CAs 

Before diving into the renewal process, let’s have a quick look at the roles of Root and Issuing CAs: 

  • Root CA: Root CA is the topmost CA in the PKI hierarchy. It is responsible for issuing certificates to Issuing CAs (also known as subordinate CAs). The Root CA’s certificate is self-signed, meaning it signs its own certificate. Root CA is typically kept offline, non-domain joined to minimize the risk of compromise. 
  • Issuing CA: Issuing CAs are subordinate to Root CA and are responsible for issuing end-entity certificates (e.g., SSL/TLS certificates, email certificates, Web server certificates, etc.). Issuing CAs are online to facilitate the certificate issuance to the end-entities (users, systems, devices, applications, etc.)  

Before deep diving into the CA renewal strategy, let’s understand what Certificate Revocation List (CRL), Distribution point (CDP), and Authority Information Access (AIA)

What is CA Certificate Renewal?

In simple language, Certificate Authority (CA) Certificate Renewal involves generating a new CA certificate before the existing certificate expires. This process is necessary for a seamless transition and continuity of trust. While renewing a certificate, it is always recommended that a new key pair be generated for the new certificate.  

Best Practices for Renewal of Root and Issuing CAs Certificates 

CA Lifetimes

When you design your PKI Hierarchy, it is also important that you define the CA lifetime. The lifetime determines how long a CA can issue certificates before they need to be renewed. Below are some best practices for determining CA lifetimes:

  • Root CA Validity: Root CAs typically have longer lifetimes compared to Issuing CAs. A common practice is to set a Root CA lifetime of 10-15 years. The longer lifetime is justified because Root CA is kept offline, reducing the risk of compromise. However, a balance must be struck between security and operational efficiency. A very long lifetime may make it difficult to respond to cryptographic advancements (e.g., the need to switch to a new cryptographic algorithm). 
  • Issuing CA Validity: Issuing CAs should have shorter lifetimes, typically ranging from 3-5 years. The shorter lifetime is due to the higher risk associated with Issuing CAs being online. Additionally, shorter lifetimes allow for more frequent updates to cryptographic algorithms and key sizes, ensuring that the PKI remains secure against evolving threats.

Ensure the renewed Root CA and Issuing CA certificates use strong cryptographic algorithms such as (RSA 4096 or Post Quantum Cryptographic (PQC) algorithms as recommended by NIST).  

Validate compliance with Industry standards and best practices such as NIST SP 800 57 and FIPS 140-2/ 140-3.  

The table below is an example, which lists the key lengths, lifetimes, and renewal strategies for the CA certificates for a two-tier PKI hierarchy. 

CA NameAlgorithms/Key LengthCertificate ValidityRenewal Strategy
Root CASHA256, RSA/4096 bit10 yearsRenewal after 5 years to issue certificates to the Issuing CAs. 
Issuing CA 1SHA256, RSA/4096 bit5 yearsRenewal after 2 years to issue end-entity certificates.
Issuing CA 2SHA256, RSA/4096 bit5 yearsRenewal after 2 years to issue end-entity certificates.
Table 1: Key length and validity period of Root and Issuing CA certificates
CA Renewal Strategy
Fig: CA Renewal Strategy

What is Certificate Revocation?

Each certificate has a defined validity period, after which the certificate is no longer considered valid. In some cases, the organization may need to invalidate (revoke) certificates prior to the end of their validity period. This need may be due to the key being lost or compromised, the relationship with the subject end, or simply the certificate being superseded with a new one before the expiration date.

Certificate Revocation Lists (CRLs)

CRLs are files signed by a CA that contain a list of certificate serial numbers that have been revoked. Clients download CRLs to check the validity of a certificate. The Microsoft Crypto API caches retrieved CRLs until the next CRL update time. Therefore, clients may not recognize out-of-band updates of CRLs that are published before the next CRL update time. 

In this situation, Delta CRLs are recommended. Delta CRLs are issued between publications of the full (or base) CRLs and contain only the certificates that have been revoked since the last CRL publication. A client computer can thus combine the base CRL and the latest delta CRL to determine the revocation status of the certificate, thereby reducing the impact on the network infrastructure.

CRL Publication Timeline/Interval

Certificate Revocation Lists (CRLs) are used to inform users about certificates that have been revoked before their expiration date. Proper management of CRLs is important for maintaining the security of the PKI.  

The CRL publication interval must be determined by considering the certificate trust requirements and the impact created across the network infrastructure. A more frequent CRL publication schedule allows short-term certificate revocation, which can be beneficial for authentication certificates. However, this also increases network traffic and administrative overhead, affecting system uptime and recovery timeframes.  

In addition to the publication interval, another parameter that affects the validity period of a CRL is the overlap period. The overlap period is the time interval between the next scheduled publication time and the actual expiration of the CRL. The total CRL validity period is equal to the sum of the CRL publication interval and the overlap period. The same concept applies to delta CRLs.

The below figure illustrates the relationship between the CRL publication interval and the overlap period. Having a publication interval of 5 days (B) and an overlap period is set to 3 days, giving a total validity period of 8 days (C). 

The total CRL validity period is equal to the sum of the CRL publication interval and the overlap period. The same concept applies to delta CRLs. 

CRL Publication Interval

Total CRL Valid period
CA NameCertificates Issued By CACRL Publication IntervalCRL Overlap Period
Root CAIssuing CA certificates1 Year1 month
Issuing CA1Issuing machine certificates5 days3 days
Issuing CA2Issuing user certificates5 days3 days

CRL Distribution Point

Certificate revocation information needs to be reachable by any client computer that relies on the certificates for trust. This information should be readily available whenever a certificate status needs to be verified. To meet these requirements, multiple Certificate Distribution Points (CDPs) are usually defined to distribute the CRLs. These CDPs use internal and external (internet) URLs and, often, different access protocols such as http://and LDAP. 

AIA Extension

The AIA extension is a pointer to CA’s most currently published CA certificate. The AIA extension helps client computers find CA certificates dynamically during chain building. The Windows PKI implementation uses this extension to assist in the building of trust chains to validate certificates. The major advantage is that only the root CA needs to be trusted; all the sub-CA certificates are retrieved from the AIA locator to build the certificate chain.

Documentation and Communication

Proper documentation and communication are essential for a smooth CA renewal process. It is recommended that the entire CA renewal process be documented, including key generation, certificate issuance, CRL publication, and end-entity certificate re-issuance. This documentation should be detailed and include step-by-step instructions. Communicate the renewal plan with all stakeholders, including IT teams, security teams, and relying parties. Ensure that everyone is aware of the timeline and any potential impact on services. Before executing the renewal process in production, test it in a staging environment. This testing helps identify any issues and ensures that the process runs smoothly in production. 

Monitoring and Auditing

Continuous monitoring of the publication of CRLs to ensure that CRLs are being published on time and that clients can access them. Any delays or failures in CRL publication should be investigated and resolved promptly. 

With Regular audits, the PKI ensures that it complies with security policies and industry standards. The audit should cover key management, certificate issuance, CRL publication, and other aspects of PKI operations.

It is also recommended and essential to log all activities related to the CA, including certificate issuance, revocation, and renewal. Regularly review these logs to detect any suspicious activities or potential security incidents. 

How can Encryption Consulting help?

Encryption Consulting LLC (EC) can help you automate the certificate lifecycle management process by deploying CertSecure Manager – a certificate lifecycle management solution in your environment to track and automate the CA renewals. CertSecure Manager can be integrated with ITSM tools like ServiceNow for automated alerts and renewal workflows.

Conclusion 

The renewal of Root and Issuing CAs is a critical process in PKI management. By following the best practices outlined in this blog, organizations can ensure that their PKI remains secure, compliant, and resilient against evolving threats. Proper planning, automation, and communication are key to a successful CA renewal process. Additionally, staying up-to-date with cryptographic advancements and continuously monitoring the PKI will help maintain the trust and integrity of digital communications.

Free Downloads

Datasheet of Certificate Management Solution

Download our datasheet and discover the power of seamless certificate management with our CertSecure Manager

Download

About the Author

Parnashree Saha's profile picture

Parnashree Saha is a cybersecurity professional passionate about data protection, including PKI, data encryption, key management, IAM, etc. She is currently working as an advisory services manager at Encryption Consulting LLC. With a specialized focus on public key infrastructure, data encryption, and key management, she is vital in guiding organizations toward robust encryption solutions tailored to customers' unique needs and challenges. Parnashree leverages her expertise to provide clients comprehensive advisory services to enhance their cybersecurity posture. From conducting thorough assessments to developing customized encryption strategies and implementing relevant data protection solutions, She is dedicated to assisting organizations in protecting their sensitive data from evolving threats.

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo