Solved

Public Key Infrastructure (PKI) maintenance and support

Posted on 2010-11-27
2
610 Views
Last Modified: 2012-05-10
It is related to a job opening. I want to know what the scope of PKI maintenance and support is. What are job duties? I have some experience with PKI but just don't know whether they are within the scope to apply for this job.
0
Comment
Question by:gs_kanata
2 Comments
 
LVL 1

Accepted Solution

by:
mik0s earned 250 total points
ID: 34224887
The duties should include the issuance and registration of certificates, revocation of compromised or are no longer used certificates. Consultations with the use of certificates.
0
 
LVL 4

Assisted Solution

by:shudman
shudman earned 250 total points
ID: 34227048
Maybe "simply" Cert server management, like issuance and revocation.
However, it could extend into CRL, DRA/KRA renewal or key recovery and even (depending on company size) HSM (hardware security module) maintenance operations. Don't discount any applications that have cert reliance, like SSLVPN or smartcard management.

0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Firewall report connections 8 69
Encrypting Windows 7 directories: general questions 5 28
Server 2012 R2 Encrypted Backup 5 37
How do You Stop a DDoS Attack 7 26
With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now