Business Case Considerations

As discussed in Chapter 3, "The Concept of an Infrastructure," a PKI is a comprehensive security infrastructure, not myriad point solutions. A PKI offers a single security infrastructure that can be used across multiple applications in the most heterogeneous of environments. Specifically, a PKI can be used to enable confidentiality, integrity, authentication, and non-repudiation services in numerous contexts, including one or more of the following:

  • Secure e-mail

  • Secure Electronic Data Interchange (EDI)

  • Secure electronic forms

  • Secure desktop (for example, encryption of sensitive information on a laptop or PC)

  • Secure intranets

  • Secure extranets

  • End-entity access control

  • Secure remote access (for example, in support of mobile ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.