{"id":14,"date":"2014-06-11T11:06:14","date_gmt":"2014-06-11T11:06:14","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2014\/06\/11\/new-guidance-for-securing-public-key-infrastructure\/"},"modified":"2023-05-15T23:07:02","modified_gmt":"2023-05-16T06:07:02","slug":"new-guidance-for-securing-public-key-infrastructure","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2014\/06\/11\/new-guidance-for-securing-public-key-infrastructure\/","title":{"rendered":"New Guidance for Securing Public Key Infrastructure"},"content":{"rendered":"

Public Key Infrastructure (PKI) is used as a building block to provide key security controls, such as data protection and authentication for organizations. Many organizations operate their own PKI to support things like remote access, network authentication and securing communications. The threat of compromise to IT infrastructures from attacks is evolving. The motivations behind these attacks are varied, and compromising an organization\u2019s PKI can significantly help an attacker gain access to the sensitive data and systems they are after. To help enterprises design PKI and protect it from emerging threats, Microsoft IT has released a detailed technical reference document – \u201cSecuring Public Key Infrastructure<\/a><\/strong>.\u201d The document provides recommendations for numerous aspects of PKI, including:<\/p>\n