Jellyfish and the Approvals Process

An effective approvals process is central to the success of a robust Credential Lifecycle Management (CLM) System. By implementing a structured and policy-driven framework, approvals ensure that certificate requests and revocations undergo thorough scrutiny to meet organizational security objectives. This process brings administrators and operators together, ensuring accountability, policy adherence, and enhanced security oversight in Public Key Infrastructure (PKI) environments.

Approvals processes assign team members specific roles to request, review, and authorize actions based on pre-established templates. Notifications and workflows maintain operational efficiency and enforce rigorous security protocols, aligning actions with both organizational objectives and regulatory standards.

Key features of an approvals process include policy-driven enforcement to ensure compliance with organizational standards, granular permissions that limit actions to authorized personnel, enhanced accountability through logs and audits, real-time notifications to keep all stakeholders informed, and scalable workflows that adapt to diverse organizational needs.

Security Objectives Augmented by Approvals Processes

The approvals process directly strengthens several core security objectives.

Confidentiality is enhanced by ensuring only authorized personnel have access to sensitive certificate requests and protecting data throughout the request and approval lifecycle using encrypted communications. Integrity is maintained by preventing unauthorized changes through multiple layers of review and safeguarding against errors or malicious actions via expert validation. Availability is ensured through timely review and action on certificate requests, with redundancy in approver roles to avoid bottlenecks. Accountability is upheld by tracking every action within the process and linking it to specific individuals, supported by an auditable trail of decisions to ensure transparency. Policy adherence is reinforced by automatically checking requests against established templates and standards, enforcing compliance with regulatory and organizational requirements.

Compliance Requirements

Often an organisation must meet external compliance requirements such as ISO/IEC 9594-8 (X.509) and local regulations, such as the EU’s eIDAS or Australia’s Gatekeeper framework. This compliance frameworks often require manual approval processes for some digital credentials based on certain use cases and desired security outcomes.

Key Components of the Approvals Process

Role-based access control (RBAC) restricts actions to designated roles. Requestors initiate certificate signing or revocation requests, approvers review these requests to ensure alignment with policies, and administrators oversee the entire process to maintain compliance and efficiency.

Notifications ensure that approvals are facilitated through real-time alerts, keeping stakeholders informed about request submissions and approval status updates.

The approvals process includes multi-level approvals, where organizations define the number of required approvals for each request based on its criticality. Low-risk requests may require a single approver, while high-risk or sensitive requests mandate multiple approvers and potential escalations.

Detailed Approvals Workflow

Certificate issuance begins with an operator submitting a Certificate Signing Request (CSR) based on predefined templates. Approvers are then alerted to review the pending request. They confirm compliance with organizational and regulatory policies before granting approval. Once the requisite number of approvals is achieved, the certificate is issued, and the requestor is notified that their certificate is ready for retrieval.

For certificate revocation, operators submit a revocation request and provide a justification. Approvers are notified to review and validate the revocation request, assess its reason, and ensure compliance. The certificate is revoked upon achieving the required approvals, and the requestor is informed of the successful revocation.

Oversight and Compliance Through Approvals

Approvals processes are deeply integrated with policy enforcement. Template validation ensures all requests align with certificate templates, while automated checks validate adherence to key security parameters before approvals proceed. Oversight mechanisms include real-time monitoring, where administrators track approval progress and identify bottlenecks, escalation paths for critical or disputed requests, and comprehensive audit logs that provide a record of all activities to support accountability and compliance.

Benefits of a Robust Approvals Process

The approvals process enhances security by implementing multiple layers of review, minimizing the risk of errors or breaches. It improves operational efficiency by streamlining workflows and reducing administrative overhead. Policy compliance is ensured as every action aligns with established standards, while transparency is provided through a clear audit trail of all actions.