Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or
Introduction. Cryptography Basics. PKI Building Blocks. PKI Management and Security. PKI Roles and Responsibilities. Security Considerations. Operational Considerations. Incident Management. PKI Governance, Risk, and Compliance. Advanced PKI. Bibliography. Index.