More
The importance of encryption key management

The importance of encryption key management

20-01-2014 10:16:22
Encryption key management for SSL is the process of successfully securing and managing the private key. The private key is the tool that is used to decrypt the information that is received from anyone who has access to the public key. For example if an end-user purchases an item from amazon.com their browser would encrypt the personal information (credit card, address etc.) using the Amazon’s public key, and once that information is received by the Amazon server it would be decrypted by their private key. Because of the unique feature of the private key essentially the most important aspect of SSL and therefore should be securely stored and managed. Below I have discussed a few ways to success store and manage a private key.
 
First there are generally two places that a hacker would be able to access the private key, on the server that is using the certificate or any other place that the private key file is saved. It is important to obviously create a very strong username and password for the server but to also limit the amount of employees that can log-in/ the employees that can log-in should also have unique access and passwords. Second make sure that you enable a CAPTCHA and/or Time-Out feature to limit a brute-force attack. Finally for companies that have hired third parties to manage and run their sites you should always check to make sure that they have the appropriate accreditations (ISO).
 
After you have secured your server make sure that the back-up private key is also securely stored. Do not store the back up on the same server that is using the private key because occasionally servers have been known to crash. I would also recommend not storing the back-up on a cloud (personal reasons). I would recommend password protecting (encrypting) the file and storing it either on your VPN, an encrypted flash drive, or other place that can only be accessed by your company.
 
For more information about SSL Certificate’s please visit our site www.sslguru.com. We also offer free SSL tools to help correctly manage your certificates and the largest SSL store with over 100 different products. For a free consultation give us a call at (626)377-9979 or email us at USA@sslguru.com
 
Source: SSLGuru.com

Recent Posts

Comodo / Sectigo is changing its Root CAs
28-12-2018 11:23:52

Sectigo, formerly known as Comodo CA, is entering the next phase of its transition: it’s replacing Comodo CA roots with USERTrust roots on January 14, 2019. Why it happens and what it will mean to Sectigo customers?

Comodo / Sectigo is changing its Root CAs
Comodo is now Sectigo
09-11-2018 12:54:30

According to previous announcements, a year after the acquisition of Comodo Group by Francisco Partners, on November 1 Comodo CA announced that from now on it is changing its brand to Sectigo [pronounced. sec-tee-go]. The goal of rebranding is consistency in company communication and better dedication to what Comodo is doing now.

Comodo is now Sectigo
European Cyber Security Month 2018
27-09-2018 10:46:21

The European Union Agency for Network and Information Security (ENISA), which is the center of knowledge about cyber security in Europe, organizes as every year in October the European Cyber Security Month. The campaign is starting in a few days. What is its purpose and how can you participate in it?

European Cyber Security Month 2018
more posts

cyber_Folks S.A. – Cookie settings

Do you like good cookies? We too! Some cookies are required for the website to function properly. Also accept additional cookies related to service performance, social networking and marketing. Cookies are also used to personalize ads. Thanks to them, you will get the best experience of our website, which we are constantly improving. The consent granted voluntarily may be withdrawn or modified at any time. More information about the cookies used can be found in our privacy policy. If you prefer to specify your preferences precisely - see the types of cookies below.

Functional (always active)

These are cookies that are necessary for the website to function. The website will not function fully properly without accepting these types of cookies. Example: A cookie that saves your consent or objection is needed so that we know if we have your consent for certain actions on the website, they will also allow you to log in to the Customer Panel, place an order or contact us via chat.

Analytical and performance

They will make it possible to collect information on how to use the website. These files will allow us to count visits and traffic sources to our site, so we can measure and improve its performance, as well as find out which pages are the most and least popular, and understand how visitors navigate our site. They help us analyze website performance and collect synthetic information. Example: We can make heatmaps, so we know which content is readable and which is not, and this allows for better website design. Thanks to them, we can also see which blog entries were read more often and which less often, which allows us to develop more interesting content. The main tool we use is Google Analytics.

Social

It is social platform cookies that will enable you to be associated with your social media accounts. You can share content from our website there. Social network files (from third parties, such as Facebook) collect information to provide personalized advertising content. For example: Ads on your social media are better suited to you and you reduce the chance of seeing excess ads for already purchased services or products.

Marketing

These are files related to the operation of marketing automation systems and ad accountability. Thanks to them, we limit, for example, the number of views of a given advertisement. They also allow us to perform comparative tests, thanks to which we constantly improve the operation of our website. By testing multiple page layouts, it is easier to get one that provides the best readability for users. Communication also becomes more personalized. For example, we may give you an article on how to find a domain name when we see that you are looking for a domain and it is difficult for you to find a suitable name. We can also, for example, show you a hint about logging in, if we see several unsuccessful attempts in a row. Based on the information from these cookies and activity on other websites, your interest profile is built. We mainly use the Google and Facebook advertising network.