Microsoft Windows Security Resource Kit

Securing Certificate Services

To prevent the likelihood of these threats, you can take the following measures:

Implementing Physical Security Measures

Physical security measures prevent attackers from gaining physical access to the computer running Certificate Services. When an attacker gains physical access to a computer, any number of attacks can take place. Physical security measures can include the following:

Implementing Logical Security Measures

In addition to physical security measures, modifying the configuration of Certificate Services can increase the security of a CA. Logical security measures can include these:

Modifying CRL and CA Certificate Publication Points

Publish CRLs and Authority Information Access (AIA) to locations accessible by all users. The certificate chaining engine must have access to the CRL and CA certificate for each CA in the certificate chain. If any CA in the certificate chain s CRL or CA certificate is not available, the chaining engine will prevent that certificate from being used if certificate revocation is enabled.

Enabling CRL Checking in All Applications

When you enable CRL checking in all applications, you ensure that every presented certificate is validated. Doing so confirms that the certificate has not been revoked, is time valid, and meets any constraints defined for the application. If an application does not perform CRL checking, it is possible for an attacker to use a certificate that was revoked for authentication or encryption purposes.

Managing Permissions of Certificate Templates

You can modify the default permissions for any certificate template so that only specific security groups have the necessary Read and Enroll permissions. If the permissions of a certificate template are modified, attackers could acquire a certificate with special privileges, such as an Enrollment Agent certificate that allows the subject to request certificates on behalf of other users.

Категории