Published: 23 October 2018
Summary
Public-key infrastructure (PKI) and digital certificates are hard to manage. Organizations are also expanding the use of PKI within IoT and DevOps pipelines. Technical professionals need to transform the perception — and the deployment — of PKI to establish an automated management regime for PKI.
Included in Full Research
- Certificate Management — Find, Control and Automate
- DevOps — Integrate PKI Into the Development Pipeline
- Continuous Integration/Continuous Delivery
- Microservices
- Containers
- Code Signing
- The Internet of Things — Target the Heterogeneity of Devices
- Usage of PKI Throughout an IoT Device Life Cycle
- PKI Vendor Support for IoT
- A PKI Strategy That Bends in the Right Ways
- Fit for Purpose
- Out of Sight
- Efficiently Validated
- Disruptors
- Strengths
- Weaknesses
- Establish a Strict PKI Management Regime, and Use Certificate Management Tools
- Divide and Conquer PKI
- Prepare for the Cryptopocalypse
- Don’t Expect Certificates and PKIs to Be Free
- Choose the Right Level of Vetting for Your SSL/TLS Certificates
- Don’t Rely on Let’s Encrypt to Solve All of Your PKI Needs
- Give Preference to “Real” CAs in the DevOps Pipeline
- Carefully Model IoT Identity Needs
- Consider Microsoft, but Be Realistic
- Deploy PKI, and Treat It as Foundational to Your IAM Infrastructure
- PKI Usage Within Mobility
- PKI Usage Within the IoT
- Manufacturing
- Introduction
- Validation
- Managing
- Sunsetting
- Modern Validation and CA Monitoring Technologies
- Dissecting PKI Disruptors
- Quantum Computers
- SSL Everywhere, SSL/TLS and Let’s Encrypt
- Blockchain and Decentralized PKI
- The OAuth 2.0 Framework and Proof-of-Possession Mechanisms
- FIDO Alliance
- Traditional Use Cases for PKI
- Deployment Options for PKI
- PKI Vendors