One of the most important
thoughts an ISSAP has to keep in mind when designing a network is that
choosing cryptography as a solution always means adopting a key
management problem. Keys need to be changed, distributed and recovered,
but at the same time, they need to be maintained in a secure fashion.
Availability can be seriously impacted by a forgotten or destroyed key,
but confidentiality will suffer if there is a breach of the key recovery
solution.
No hay comentarios:
Publicar un comentario