Download presentation
Presentation is loading. Please wait.
Published byDarren Moore Modified over 9 years ago
1
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam BienNT@mtechpro.com
2
Agenda About RSA Business Drivers Implementation Considerations Technology Considerations Project process PKI enabled applications
3
About RSA
4
RSA, The Security Division of EMC EMC is the world leading information infrastructure company enabling organizations to bring the power of their information to life RSA is the world leader in securing information infrastructure ensuring that information is always an asset and never a liability Add Intelligence Virtualize & Automate Store Protect Information
5
RSA Security Leadership Inventors of RSA algorithm 1 st year legacy 25 + organizations protected 35K + phishing attacks shut down 175K + 250M + online identities protected 1B + products shipped with RSA BSAFE ® encryption World’s Largest information security industry event year legacy 25 +
6
Business Drivers
7
Organizations leverage e-business to: Enable users to access information Improve relationships with customers, suppliers, partners… New/enhanced revenue generation opportunities Reduce costs Enhance compliancy Big question: “How can we do this securely?”
8
e-Business Transformation Unlocking the Potential of e-Business Trusted e-business require parties to know: Who they are doing business with Communications are confidential Transactions cannot be altered in transit Support for non-repudiation is available
9
Implementation Considerations
10
Setting up a PKI Long process Mainly organisational and business Establishing a PKI service Business cases Business drivers Implementing the CA Secure and highly available infrastructure Operations team to support 24*7*365 PKI-enabled applications
11
Technology Considerations
12
RSA Digital Certificate Management Products & Solutions Products RSA Certificate Manager Industry leading CA RSA Validation Solution Ensure high-levels of trust & protection for organizations RSA Root Signing Service Solutions Web Server SSL Enables cost effective trusted server authentication Secure Digital Signing Enables trusted transactions and communications for streamlining processes Secure e-Mail Enables trusted messaging for streamlining processes Secure VPN Cost effectives, easy to use strong authentication of users and devices
13
RSA Digital Certificate Management Components User RSA Certificate Manager RSA Key Recovery Manager Web Server RSA Root Signing Service RSA Validation Clients RSA Validation Manager RSA Registration Manager
14
RSA Keon Root Signing Service RSA Root Signing Service Extending the Value of Digital Certificates Company ABC End User Browser Company ABC Certificate Authority External Business Partner Actions Invisible to the End User End User Certificate Signed e-Mail / Web transaction
15
RSA Key Recovery Manager “ m of n” Collaborative Encryption Key Recovery RSA Certificate Manager RSA Key Recovery Manager Smart Cards nCipher HSM Key Recovery Mgr Key Recovery Operators Key Recovery Server
16
Other considerations Infrastructure Secure network Operating platforms (Windows/Solaris systems) System LDAP Public LDAP RA Stations Secure computer centre Systems and security monitoring
17
RSA BSAFE Cryptographic toolkits Java C / C ++
18
Project Process
19
Business Project set-up Define project organisation Business control Security Operations Administration Define RSA project organisation Define organization business cases, operational processes, etc.
20
Business Discovery and Analysis, Planning Requirements collection and analysis Business Information Security Project planning PKI operations department Processes and policies development
21
PKI project set-up Requirements collection Infrastructure/CA/RA IT Security Project planning PKI operations Processes and policies WebTrust
22
Solution design Architecture Systems Infrastructure Security
23
Physical Security
24
Development Test plan and test cases Policies and Processes Information Security CP & CPS Operations
25
Pre-Production Infrastructure Installation of test system System and integration testing according to test plan System documentation Test run
26
Production Infrastructure Installation of production system Testing according to test plan WebTrust Boot strap Root sign Pilot
27
PKI-enabled Applications
28
Using PKI with existing and new applications
29
Digital Signatures and Document Security PKI-enabled Applications
31
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.