The ever evolving and expanding enterprise infrastructure has made it extremely important that every organization has its own mature and robust Public Key Infrastructure (PKI) set up that establishes trust between the systems, applications, devices, and users on untrusted networks, in this article we explain the process of designing a PKI Certification Authority Hierarchy and best practices.