Story image

Four Major Misunderstandings about public key infrastructure (PKI)

21 May 2018

There’s a misconception that public key infrastructure (PKI) is dead. While some circles believe we’ve grown beyond it, the reality is actually quite the opposite. PKI is not only still relevant, it will become more crucial in the future.

This is especially true as we explore more ways to manage and secure communications across an exploding number of new machines and applications.

Overall, it’s frustrating that PKI has been getting criticised for a while now, and it’s time someone set the record straight. Here are four major misunderstandings about PKI and why it’s needed for our future security:

#1: PKI technology is too old

Simply put, there is not a suitable replacement for PKI. As we adopt more cloud and DevOps infrastructure, we need PKI more than ever. Cloud and DevOps technologies use large numbers of certificates that are needed for short periods of time.

Only PKI can authenticate these certificates effectively and verify that data hasn’t been changed. Plus, it only costs a few cents. No one has been able to develop an alternative that offers these benefits.

#2: PKI is too complicated

Some people believe that PKI is incredibly complex. However, it’s often the management of PKI assets—keys and certificates—that’s causing the real pain. As a result, certificate issues can arise and take up large amounts of scarce, highly skilled resources.

You can avoid nearly all of these difficulties by simplifying PKI via automation of the management and workflow of the certificate life cycle. And don’t worry; this isn’t nearly as difficult as it seems.

#3: PKI is a back-office support technology

PKI was created for a specific purpose, and then it kind of went dormant for a while. “PKI 2.0” started about four or five years ago. That’s when certificates started being used on smart cards and other devices to identify humans as well as machines. Now our networks are exploding with machines that need unique identities. And PKI is still the only effective way you can tame, authenticate and protect all of these machines.

#4: PKI is an administrative tool

Executives often perceive PKI costs as unnecessary. But unmanaged machine identities can seriously impact your organisation. If a certificate and its corresponding keys are stolen, attackers can use them to feign trust. Once they’ve done this, they can move around inside your network completely undetected and do all kinds of malicious things. On the positive side, effective PKI management will alleviate these dangers.

So, what’s next for PKI?

Ultimately, PKI management is going to become a more critical component. The explosion of machines means that we’re putting a substantial number of keys and certificates on our networks. If you’re not consistently managing PKI, then you could be the victim of an attack by bad actors targeting keys and certificates.

As it is the foundation of all secure internet transactions, make PKI your best friend, not your worst enemy. It’s here for the long haul.

Click here to find out how Venafi can help you secure your PKIs.

Article by Venafi's regional director of Asia Pacific, Terrie Anderson.

Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Ensign and IronNet partner to create cyber analytics capabilities
The Singapore-based joint venture will form a Cyber Analytics Center for Excellence focused on securing regional enterprises from sophisticated cyber threats.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.