6.4 Implement PKI, certificate management, and associated components

  • Certificate authorities and digital certificates
    • CA
    • CRLs
  • PKI
  • Recovery agent
  • Public key
  • Private keys
  • Registration
  • Key escrow
  • Trust models

There is not a clear distinction between the core concepts and the implementation of PKI in relation to how the Sec+ exam handles these issues. These topics are therefore discussed together in the previous Section 6.3.

There are numerous ways in which a PKI implementation could be configured. That said, here is one example of a PKI setup. Let’s say that an organization has decided to use PKI. For brevity’s sake, we will assume that they have incorporated all necessary standards, regulations, and guidelines into their local security policy. ...

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.