Preface |
|
ix | |
Authors |
|
xi | |
|
|
1 | (18) |
|
|
3 | (3) |
|
|
6 | (5) |
|
1.3 Standards Organizations |
|
|
11 | (8) |
|
|
19 | (42) |
|
|
22 | (4) |
|
|
26 | (7) |
|
|
33 | (3) |
|
|
36 | (10) |
|
2.5 Cryptographic Modules |
|
|
46 | (15) |
|
|
61 | (40) |
|
3.1 PKI Standards Organizations |
|
|
62 | (21) |
|
3.2 PKI Protocols: SSL and TLS |
|
|
83 | (7) |
|
|
90 | (1) |
|
|
91 | (1) |
|
3.5 PKI Methods: Legal Signatures and Code Sign |
|
|
92 | (2) |
|
3.6 PKI Architectural Components |
|
|
94 | (7) |
|
4 PKI Management and Security |
|
|
101 | (62) |
|
|
109 | (11) |
|
4.2 Publication and Repository Responsibilities |
|
|
120 | (3) |
|
4.3 Identification and Authentication |
|
|
123 | (7) |
|
4.4 Certificate Lifecycle Operational Requirements |
|
|
130 | (13) |
|
4.5 Facility, Management, and Operational and Physical Controls |
|
|
143 | (7) |
|
4.6 Technical Security Controls |
|
|
150 | (5) |
|
4.7 Certificate, CRL, and OCSP Profiles |
|
|
155 | (2) |
|
4.8 Compliance Audits and Other Assessments |
|
|
157 | (1) |
|
4.9 Other Business and Legal Matters |
|
|
158 | (5) |
|
5 PKI Roles and Responsibilities |
|
|
163 | (20) |
|
5.1 Certificate Authority |
|
|
163 | (8) |
|
|
165 | (2) |
|
|
167 | (3) |
|
|
170 | (1) |
|
5.2 Registration Authority |
|
|
171 | (2) |
|
|
173 | (2) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (6) |
|
5.6.1 Certificate Authority Agreements |
|
|
178 | (3) |
|
5.6.2 Registration Authority Agreements |
|
|
181 | (1) |
|
5.6.3 Subscriber Agreements |
|
|
181 | (1) |
|
5.6.4 Relying Party Agreements |
|
|
182 | (1) |
|
6 Security Considerations |
|
|
183 | (30) |
|
|
185 | (7) |
|
|
192 | (11) |
|
|
203 | (4) |
|
6.4 Cryptographic Modules |
|
|
207 | (6) |
|
7 Operational Considerations |
|
|
213 | (30) |
|
|
216 | (8) |
|
7.2 Security Architectures |
|
|
224 | (3) |
|
7.3 Certificate Management |
|
|
227 | (3) |
|
|
230 | (5) |
|
|
235 | (5) |
|
|
240 | (3) |
|
|
243 | (26) |
|
8.1 Areas of Compromise in a PKI |
|
|
244 | (8) |
|
|
244 | (1) |
|
8.1.2 Online Issuing CA That Has Multiple CA Subordinates |
|
|
245 | (1) |
|
8.1.3 Online Issuing CA That Does Not Have Subordinate CAs |
|
|
246 | (1) |
|
|
246 | (1) |
|
8.1.5 Online CRL Service HTTP or HTTPS Location for Downloading CRLs |
|
|
246 | (1) |
|
|
247 | (1) |
|
8.1.7 End User's Machine That Has a Certificate on It |
|
|
247 | (1) |
|
8.1.7.1 Private Key Compromise |
|
|
247 | (5) |
|
8.1.7.2 Private Key Access |
|
|
252 | (1) |
|
8.1.7.3 Limited Access to the Private Key |
|
|
252 | (1) |
|
|
252 | (1) |
|
8.2 PKI Incident Response Plan |
|
|
252 | (4) |
|
8.3 Monitoring the PKI Environment Prior to an Incident |
|
|
256 | (3) |
|
8.4 Initial Response to an Incident |
|
|
259 | (2) |
|
8.5 Detailed Discovery of an Incident |
|
|
261 | (2) |
|
8.6 Collection of Forensic Evidence |
|
|
263 | (2) |
|
8.7 Reporting of an Incident |
|
|
265 | (4) |
|
9 PKI Governance, Risk, and Compliance |
|
|
269 | (38) |
|
|
269 | (2) |
|
9.2 Management Organization |
|
|
271 | (3) |
|
9.3 Security Organization |
|
|
274 | (3) |
|
|
277 | (3) |
|
|
280 | (1) |
|
|
280 | (7) |
|
9.6.1 Aging Algorithms and Short Keys |
|
|
282 | (2) |
|
9.6.2 Modern Algorithms and Short Keys |
|
|
284 | (1) |
|
9.6.3 Aging Protocols and Weak Ciphers |
|
|
284 | (3) |
|
9.6.4 Aging or Discontinued Products |
|
|
287 | (1) |
|
|
287 | (4) |
|
|
288 | (1) |
|
|
288 | (1) |
|
9.7.3 Framework Implementation Tiers |
|
|
288 | (3) |
|
|
291 | (3) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
295 | (5) |
|
|
300 | (4) |
|
|
304 | (3) |
|
|
307 | (14) |
|
10.1 Industry Initiatives |
|
|
308 | (3) |
|
10.2 Certificate Trust Levels |
|
|
311 | (2) |
|
|
313 | (2) |
|
10.4 Short-Term Certificates |
|
|
315 | (2) |
|
10.5 Long-Term Certificates |
|
|
317 | (4) |
Bibliography |
|
321 | (10) |
Index |
|
331 | |