Presentation is loading. Please wait.

Presentation is loading. Please wait.

Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam

Similar presentations


Presentation on theme: "Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam"— Presentation transcript:

1 Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam BienNT@mtechpro.com

2 Agenda About RSA Business Drivers Implementation Considerations Technology Considerations Project process PKI enabled applications

3 About RSA

4 RSA, The Security Division of EMC EMC is the world leading information infrastructure company enabling organizations to bring the power of their information to life RSA is the world leader in securing information infrastructure ensuring that information is always an asset and never a liability Add Intelligence Virtualize & Automate Store Protect Information

5 RSA Security Leadership Inventors of RSA algorithm 1 st year legacy 25 + organizations protected 35K + phishing attacks shut down 175K + 250M + online identities protected 1B + products shipped with RSA BSAFE ® encryption World’s Largest information security industry event year legacy 25 +

6 Business Drivers

7 Organizations leverage e-business to: Enable users to access information Improve relationships with customers, suppliers, partners… New/enhanced revenue generation opportunities Reduce costs Enhance compliancy Big question: “How can we do this securely?”

8 e-Business Transformation Unlocking the Potential of e-Business Trusted e-business require parties to know: Who they are doing business with Communications are confidential Transactions cannot be altered in transit Support for non-repudiation is available

9 Implementation Considerations

10 Setting up a PKI Long process Mainly organisational and business Establishing a PKI service Business cases Business drivers Implementing the CA Secure and highly available infrastructure Operations team to support 24*7*365 PKI-enabled applications

11 Technology Considerations

12 RSA Digital Certificate Management Products & Solutions Products RSA Certificate Manager Industry leading CA RSA Validation Solution Ensure high-levels of trust & protection for organizations RSA Root Signing Service Solutions Web Server SSL Enables cost effective trusted server authentication Secure Digital Signing Enables trusted transactions and communications for streamlining processes Secure e-Mail Enables trusted messaging for streamlining processes Secure VPN Cost effectives, easy to use strong authentication of users and devices

13 RSA Digital Certificate Management Components User RSA Certificate Manager RSA Key Recovery Manager Web Server RSA Root Signing Service RSA Validation Clients RSA Validation Manager RSA Registration Manager

14 RSA Keon Root Signing Service RSA Root Signing Service Extending the Value of Digital Certificates Company ABC End User Browser Company ABC Certificate Authority External Business Partner Actions Invisible to the End User End User Certificate Signed e-Mail / Web transaction

15 RSA Key Recovery Manager “ m of n” Collaborative Encryption Key Recovery RSA Certificate Manager RSA Key Recovery Manager Smart Cards nCipher HSM Key Recovery Mgr Key Recovery Operators Key Recovery Server

16 Other considerations Infrastructure Secure network Operating platforms (Windows/Solaris systems) System LDAP Public LDAP RA Stations Secure computer centre Systems and security monitoring

17 RSA BSAFE Cryptographic toolkits Java C / C ++

18 Project Process

19 Business Project set-up Define project organisation Business control Security Operations Administration Define RSA project organisation Define organization business cases, operational processes, etc.

20 Business Discovery and Analysis, Planning Requirements collection and analysis Business Information Security Project planning PKI operations department Processes and policies development

21 PKI project set-up Requirements collection Infrastructure/CA/RA IT Security Project planning PKI operations Processes and policies WebTrust

22 Solution design Architecture Systems Infrastructure Security

23 Physical Security

24 Development Test plan and test cases Policies and Processes Information Security CP & CPS Operations

25 Pre-Production Infrastructure Installation of test system System and integration testing according to test plan System documentation Test run

26 Production Infrastructure Installation of production system Testing according to test plan WebTrust Boot strap Root sign Pilot

27 PKI-enabled Applications

28 Using PKI with existing and new applications

29 Digital Signatures and Document Security PKI-enabled Applications

30

31 Thank you!


Download ppt "Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam"

Similar presentations


Ads by Google