Start Here: Security Leads & Architects#

Audience: CISOs, Security Architects, Security Engineers, Compliance Officers
Prerequisites: Understanding of enterprise security concepts, PKI, and identity management
Outcome: Evaluate Kleidia’s security architecture, trust model, and compliance capabilities

Your Role#

As a security lead, you’re responsible for evaluating whether Kleidia meets your organization’s security requirements. You need to understand the architecture, trust boundaries, key management model, and how Kleidia supports compliance with frameworks like NIS2 and ISO 27001.

1. Understand the Architecture#

Start with a high-level understanding of how Kleidia works:

  • Overview - What Kleidia does and its deployment model (self-hosted, no SaaS)
  • Architecture Overview - Components, data flows, and deployment topology

2. Deep Dive on Security#

Understand the security model and trust boundaries:

3. PKI Integration#

Understand how Kleidia integrates with your existing PKI:

  • PKI Integration Patterns - Integration with AD CS, EJBCA, and existing Vault infrastructure
  • Key ownership model: who controls which keys

4. Compliance Considerations#

Review how Kleidia supports compliance:

5. Operations Overview#

Understand day-2 security operations:

Key Questions Answered#

QuestionWhere to Find Answer
Where do private keys reside?Security for Auditors - Keys stay on YubiKey hardware
How does Kleidia integrate with our CA?PKI Integration Patterns
Is there a SaaS dependency?Overview - Fully self-hosted, no external dependencies
What gets logged for compliance?Compliance Considerations
How are secrets protected?Vault and Secrets

Next Steps#

After completing your security review:

  1. Technical Evaluation: Work with your operations team to deploy a POC
  2. Production Planning: Review Deployment Prerequisites
  3. Contact Us: Reach out to discuss your specific security requirements