Security without Obscurity A Guide to PKI Operations
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography X. 509 certificates certificate authority (CA) hierarchies or certificate policy (CP) and certificate practice statements. While algorithms certificates and theoretical policy are all excellent discussions the real-world issues for operating a commercial or private CA can be overwhelming. Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices. The highlighted bad practices based on real-world scenarios from the authors’ experiences illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved. This book offers readers the opportunity to benefit from the authors’ more than 50 years of combined experience in developing PKI-related policies standards practices procedures and audits as well as designing and operating various commercial and private PKI systems. | Security without Obscurity A Guide to PKI Operations