December 18, 2020
By Riaan De Villiers
In today's post we will list 5 common Public Key Infrastructure (PKI) mistakes to avoid.
Implementing and operating a PKI solution is not easy. Small mistakes can turn into big catastrophe's if not caught early enough.
It might sound obvious, but, if your root-signing certificate authority resides on a virtual machine and it goes dormant - you do not want your I.T. operations team to delete it during a routine clean up operation!
Wildcard certificates are easy to use, so organisations tend to use them a lot. So much, that operators might forget where all of the certificates are located. When the time comes to renew the certificates the operators might not be able to find all of them and you could experience downtime while you hunt for a needle in a haystack.
Although it might speed up the development process, using production certificates in the development environment can lead to some serious security issues.
If an attacker manages to obtain a certificate, they can use that certificate to gain access to other parts of your organisation's network.
This is an old issue with cybersecurity in general. People write down their passwords to not forget them. Once those written down passwords fall into the wrong hands, they can cause all sorts of trouble.
Implementing and maintaining a governance process takes a lot of hard work and discipline. Do not brush it aside, without a good governance program your PKI team might find it hard or even impossible to get a holistic view of your PKI security. This might lead to some serious security problems.

Do you want to learn more about PKI? LAWtrust's PKI webpage is a good place to start.
Pretoria
Tel: +27 (12) 676 9240 | Fax: +27 (12) 665 3997
Cape Town
Tel: +27 (12) 676 9240 | Fax: +27 (12) 665 3997
EMAIL
General: info@lawtrust.co.za
Sales: sales@lawtrust.co.za
Support: support@lawtrust.co.za