Summary

This chapter looked at the significance of operational considerations with respect to the deployment of a PKI. It discussed the importance of designing or choosing the appropriate architectural model for the environment to be protected. It also gave a brief overview of a number of topics, including client-side software, on-line requirements, physical security, hardware components, end-entity key compromise, and disaster preparation and recovery.

Supplementary material that can lead to a deeper understanding of this area includes the following topics:

  • A good understanding of the legal framework for PKI operation (This subject, although itself a PKI operational consideration as defined at the beginning of this chapter, is discussed separately ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.