Skip to Content
Practical Internet of Things Security - Second Edition
book

Practical Internet of Things Security - Second Edition

by Brian Russell, Drew Van Duren
November 2018
Intermediate to advanced
382 pages
11h 20m
English
Packt Publishing
Content preview from Practical Internet of Things Security - Second Edition

Key escrow

Key escrow is frequently a necessary evil. Given that encrypted data cannot be decrypted if the key is lost or otherwise destroyed (in a process called data shredding), many entities opt to store and back up cryptographic keys—frequently offsite—to use at a later time, often as part of a disaster recovery or business continuity plan. Risks associated with key escrow are simple: making copies of keys and storing them in other locations increases the attack surface. A compromised, escrowed key is just as impactful as compromising the original copy. Key escrow systems may be online or offline. Like other elements of key management systems, they should be operated in secure enclaves and use HSMs for all key storage.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Industrial Internet of Things Security

Practical Industrial Internet of Things Security

Sravani Bhattacharjee
Core Software Security

Core Software Security

James Ransome, Anmol Misra
IoT Security

IoT Security

Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila

Publisher Resources

ISBN: 9781788625821Other