Personnel Requirements

As Chapter 21 "Benefits (and Costs) of a PKI," mentioned and as the "In-Source Versus Out-Source" section of this chapter alluded to, qualified personnel are required to maintain and operate the aspects of the PKI that fall under the direct control of the enterprise. The enterprise should determine the number and skill level of the appropriate personnel, which will depend on the scale of the PKI as well as how much of the PKI is in-sourced. The types of personnel that may be required include

  • Security officers responsible for enforcing the security policies dictated by the enterprise

  • Operators to perform system installs, backups, reboots, and so on

  • Administrators to perform day-to-day operations such as end-user registration ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.