O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Key Management

The issues of key management make managing encryption and creating policies difficult. Not only are the issues complicated, but they change depending on whether your organization is using hardware accelerators or software-only systems. There are also differences between symmetric and asymmetric encryption.

When there are questions as to how to work with technology, the answer is usually to use the standards. However, if your organization is using public key cryptography and trying to create a public key infrastructure (PKI), the standards are in flux, making it difficult to find answers. Vendors can provide guidance, but be careful as to not allow them to influence the policy in such a way that your organization is locked into ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required