Export (0) Print
Expand All

Securing Public Key Infrastructure (PKI)

Published: June 12, 2014

Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

For a downloadable version of this PKI content, see http://aka.ms/securingpki

This content contains recommendations for establishing a robust, secure PKI to help organizations provide basic security controls such as confidentiality and integrity to key business processes. When properly implemented, a PKI becomes a foundational component used to build effective information security controls over information resources. PKI plays a critical role in the protection of sensitive business data and is an enabling technology that enhances information systems security and promotes secure electronic commerce.

This content contains guidance and recommendations necessary for establishing a Certification Authority (CA), an understanding of the physical controls for securing a PKI, the processes vital to establishing a PKI, the technical controls for securing a PKI, procedures for planning certificate algorithms and their usages, procedures for protecting CA Keys and critical artifacts, monitoring the PKI, and compromise response. Information security and risk management practitioners will find the policies, procedures, and recommendations to be a significant contribution to their understanding in the practical implementation of a robust PKI.

This content contains the following sections:

See Also

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft