6.4 Implement PKI, certificate management, and associated components
- Certificate authorities and digital certificates
- Recovery agent
- Public key
- Private keys
- Key escrow
- Trust models
There is not a clear distinction between the core concepts and the implementation of PKI in relation to how the Sec+ exam handles these issues. These topics are therefore discussed together in the previous Section 6.3.
There are numerous ways in which a PKI implementation could be configured. That said, here is one example of a PKI setup. Let’s say that an organization has decided to use PKI. For brevity’s sake, we will assume that they have incorporated all necessary standards, regulations, and guidelines into their local security policy. ...