Disaster Planning and Recovery

While careful planning and the implementation of redundant components can minimize the risk associated with many sources of disaster, it is important to consider worst-case scenarios and to make sure that the best possible contingency plans are in place; this will expedite the recovery of the PKI in the event that a serious disaster does occur.

As Chapter 12 discussed, perhaps one of the most serious disasters that can occur with respect to the PKI is when a CA's key is compromised (or even suspected that it has been compromised). An organization should ensure that the appropriate safeguards are in place to minimize the risk of this event, and that the technology vendor understands the problem and is able to provide ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.