Book description
This book provides a no-nonsense approach for operating a public key infrastructure (PKI) system. In addition to discussions on PKI best practices, it warns against bad PKI practices. Scattered throughout the book are anonymous case studies that illustrate both good and bad practices. The highlighted bad practices, based on real-world scenarios from the authors' experiences, demonstrate how bad things are often done with good intentions but can end up causing bigger problems than the original one being solved. This book offers the insight readers need to avoid these types of problems.
Table of contents
- Preface
- Authors
- Chapter 1: Introduction
- Chapter 2: Cryptography Basics
- Chapter 3: PKI Building Blocks
-
Chapter 4: PKI Management and Security
- 4.1 Introduction
- 4.2 Publication and Repository Responsibilities
- 4.3 Identification and Authentication
- 4.4 Certificate Lifecycle Operational Requirements
- 4.5 Facility, Management, and Operational and Physical Controls
- 4.6 Technical Security Controls
- 4.7 Certificate, CRL, and OCSP Profiles
- 4.8 Compliance Audits and Other Assessments
- 4.9 Other Business and Legal Matters
- Chapter 5: PKI Roles and Responsibilities
- Chapter 6: Security Considerations
- Chapter 7: Operational Considerations
-
Chapter 8: Incident Management
- 8.1 Areas of Compromise in a PKI
- 8.2 PKI Incident Response Plan
- 8.3 Monitoring the PKI Environment Prior to an Incident
- 8.4 Initial Response to an Incident
- 8.5 Detailed Discovery of an Incident
- 8.6 Collection of Forensic Evidence
- 8.7 Reporting of an Incident
- Chapter 9: PKI Governance, Risk, and Compliance
- Chapter 10: Advanced PKI
- Bibliography
Product information
- Title: Security without Obscurity
- Author(s):
- Release date: February 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781498788212
You might also like
book
Security without Obscurity
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the …
book
Securing DevOps
Securing DevOps explores how the techniques of DevOps and security should be applied together to make …
book
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered …
book
Core Software Security
Introducing users to existing software development life cycle (SDLC) models, this book explains their weakness and …