Story image

Four Major Misunderstandings about public key infrastructure (PKI)

21 May 18

There’s a misconception that public key infrastructure (PKI) is dead. While some circles believe we’ve grown beyond it, the reality is actually quite the opposite. PKI is not only still relevant, it will become more crucial in the future.

This is especially true as we explore more ways to manage and secure communications across an exploding number of new machines and applications.

Overall, it’s frustrating that PKI has been getting criticised for a while now, and it’s time someone set the record straight. Here are four major misunderstandings about PKI and why it’s needed for our future security:

#1: PKI technology is too old

Simply put, there is not a suitable replacement for PKI. As we adopt more cloud and DevOps infrastructure, we need PKI more than ever. Cloud and DevOps technologies use large numbers of certificates that are needed for short periods of time.

Only PKI can authenticate these certificates effectively and verify that data hasn’t been changed. Plus, it only costs a few cents. No one has been able to develop an alternative that offers these benefits.

#2: PKI is too complicated

Some people believe that PKI is incredibly complex. However, it’s often the management of PKI assets—keys and certificates—that’s causing the real pain. As a result, certificate issues can arise and take up large amounts of scarce, highly skilled resources.

You can avoid nearly all of these difficulties by simplifying PKI via automation of the management and workflow of the certificate life cycle. And don’t worry; this isn’t nearly as difficult as it seems.

#3: PKI is a back-office support technology

PKI was created for a specific purpose, and then it kind of went dormant for a while. “PKI 2.0” started about four or five years ago. That’s when certificates started being used on smart cards and other devices to identify humans as well as machines. Now our networks are exploding with machines that need unique identities. And PKI is still the only effective way you can tame, authenticate and protect all of these machines.

#4: PKI is an administrative tool

Executives often perceive PKI costs as unnecessary. But unmanaged machine identities can seriously impact your organisation. If a certificate and its corresponding keys are stolen, attackers can use them to feign trust. Once they’ve done this, they can move around inside your network completely undetected and do all kinds of malicious things. On the positive side, effective PKI management will alleviate these dangers.

So, what’s next for PKI?

Ultimately, PKI management is going to become a more critical component. The explosion of machines means that we’re putting a substantial number of keys and certificates on our networks. If you’re not consistently managing PKI, then you could be the victim of an attack by bad actors targeting keys and certificates.

As it is the foundation of all secure internet transactions, make PKI your best friend, not your worst enemy. It’s here for the long haul.

Click here to find out how Venafi can help you secure your PKIs.

Article by Venafi's regional director of Asia Pacific, Terrie Anderson.

A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
How to keep network infrastructure secure and available
Two OVH executives have weighed in on how network infrastructure and the challenges in that space will be evolving in the coming year.
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.