Chapter 6
Security Considerations
This chapter discusses security considerations that might affect the operational environments of the CA and the RA, and ultimately the subscriber or relying party. The security considerations in this chapter are organized into four control areas: physical controls, logical controls, audit logs, and cryptographic modules. Let the reader be forewarned that there is some overlap among these areas, so it is difficult when discussing one area to not mention another. We have attempted to separate these topics into discrete thoughts, but again these controls have interdependencies that reflect the real world. As we dig deeper into each area, the reader will discover that at some level, things tend to become uncertain ...
Get Security without Obscurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.