O'Reilly logo

Security without Obscurity by W. Clay Epstein, Jeff Stapleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8

Incident Management

This chapter discusses where and how a public key infrastructure compromise might occur and the steps necessary to prepare for such an incident. Incident management includes preparing a PKI incident response plan and executing the plan in the event of a breach. Thus far in this book, we have alluded to security incidents in a variety of ways:

  • Chapter 2, “Cryptography Basics,” identified key compromise as a type of incident.
  • Chapter 4, “PKI Management and Security,” addressed incidents in the certificate policy and certificate practice statement.
  • Chapter 5, “PKI Roles and Responsibilities,” discussed incidents and separation of duties.
  • Chapter 6, “Security Considerations,” mentioned incidents relating to physical and logical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required