Key Recovery

As Chapter 7, "Key and Certificate Management," discussed, key recovery deals with the secure storage and distribution of encryption keys to recover corporate data that would otherwise be rendered unrecoverable. A given organization must assess the need for this functionality and determine the requirements associated with its implementation if required.

Note

Legal restrictions or legal mandates associated with key recovery may exist in some countries. Although not devoted solely to the topic of key recovery, The Limits of Trust [LOT] identifies existing legislation pertaining to confidentiality and digital signatures on a country-by-country basis.

It is possible to implement a key recovery facility as part of a CA or to implement ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.