Crypto-agility is a complex topic at scale and working towards it requires a multifaceted approach. Changes need to be made to security setups in organizational policy, operating methods, and core technology and processes. Your PKI may need to be upgraded and enhanced to support rapid swaps of cryptography, and software development procedures may need to be revamped to incorporate a nimbler approach to cryptography – as opposed to being bolted on top of finished software.
Despite the complexity, enterprises can no longer afford to take a wait and see attitude toward crypto-agility. Below are three pillars that if adopted will put your organization on the right path toward withstanding whatever the future holds:
Pillar #1 – Automate discovery and reporting. At the push of a button, you should be able to produce a full reporting of all your cryptographic assets. This will allow you quickly identify vulnerable cryptography and to report anomalies. There are any number of tools available to help you do this, but ideally certificate reporting should just be incorporated into an automated PKI solution.
Pillar #2 – Automate PKI operations at scale.The ideal solution here is a fully automated Certificate Management Systems (CMS) that will manage the entire lifecycle of a certificate from creation to renewal.When the CMS is used to create a certificate, it should have all the data it needs to not only monitor the certificate for expiration but automatically provision a replacement certificate without human intervention.
Pillar #3 – Be nimble. At an organization and management level, your IT organization from DevOps through to day-to-day operations staff, needs to be ready for threats and change. You should carefully evaluate and rethink all aspects of your PKI to identify areas that may lock you into a particular vendor or technology. Remember too, that the rate of threats and change is accelerating.
Join the Futurex Tech Talk on September 16
If your organization manages its own CA and still relies on manual certificate provisioning and renewal processes, I encourage you to attend the Tech Talk taking place at noon ET on Wednesday, Sept. 16 to learn more about automating certificate provisioning and renewal across your entire network at scale.
In this Tech Talk entitled “How to Unify Certificate Management On All Your Devices and Applications,” Adam Cason, Vice President, Global and Strategic Alliances at Futurex, will join me for an interactive discussion on how you can improve the automation and security of your organization’s PKI.
By attending the webinar, you will:
- Learn how to streamline certificate automation for Linux/UNIX/Mac computers from Microsoft ADCS and eliminate manual processes
- Learn how applications can be automatically provisioned with certificates that are fully managed
- Learn how to improve data and key protection with a FIPS 140-2 Level 3 validated platform
- Learn how to overcome common hurdles in deploying enterprise certificate authority environments
For those of you who are new to Revocent, we provide innovative PKI products to organizations on a global basis. Our premier CertAccord Enterprise product provides X.509 certificate automation to enable customers to extend their existing Microsoft Enterprise CA to Linux, Mac, and UNIX platforms. Full life-cycle management of certificates allows customers to significantly reduce ongoing labor costs, improve security, and simplify their PKI.
We hope you’ll join us on Sept. 16 for what I’m confident will be a lively and engaging discussion. Head over to the registration page now to reserve your spot.