התחל במצב לא מקוון עם האפליקציה Player FM !
112. Managing Public Key Infrastructure within an Enterprise
סדרה בארכיון ("עדכון לא פעיל" status)
When? This feed was archived on December 12, 2020 08:26 (
Why? עדכון לא פעיל status. השרתים שלנו לא הצליחו לאחזר פודקאסט חוקי לזמן ממושך.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 294560458 series 2501898
This episode features a conversation between Robert Blumen, DevOps engineer at Salesforce, and Matthew Myers, principal public key interface (PKI) engineer at Salesforce. Matthew shares his experience running a certification authority (CA) within the Salesforce enterprise. He shares the rationale for the decision to take CA in-house, explaining that becoming a certificate authority means you can become the master of your universe by establishing internal trust. A private or in-house CA can act in ways not dissimilar to a PKU but can issue its own certificates, trusted only by internal users and systems.
Using a public certificate authority can be expensive at scale, particularly for enterprises with millions (or even billions) of certificates. However, an enterprise CA can be an important cost-saving measure. It adds a granular level of control in certificate issuing, such as naming conventions and the overall lifecycle. You can effectively have as many CAs as you can afford to maintain as well as the ability to separate them by use case and environment.
Further, having the ability to control access to data and to verify the identities of people, systems, and devices in-house removes the cybersecurity challenges such as the recent SolarWinds supply chain attack. Matthew notes that Information within a PKI is potentially insecure “as the information gets disclosed to the internet and printed on the actual certificates which leave them vulnerable to experienced hackers.” Matthews shares the importance of onboarding and people management and the need to ensure staff doesn’t buy SSL certificates externally.
Myerss offers some thoughts for businesses considering the DIY route discussing the advantages and limitations of open source resources such as OpenSSL and Let's Encrypt. Identity mapping and tracking are particularly important as you’re giving certificates to people, systems, and services that will eventually expire. Matthew shares the benefits of a central identity store, its core features, and how it works in tandem with PKI infrastructure. There’s also the need to know how many certificates you have in the wild at any given time.
As a manager, the revocation infrastructure for PKI implementation means that you're inserting yourself in the middle of every single deal, because if you’re doing it correctly everything needs to validate that the certificates are genuine. When you have a real possibility of slowing down others’ connections, you want to ensure that your supporting infrastructure is positioned in such a way that you are providing those responses as quickly as possible. Network latency becomes a very real thing.
Auditability and the ability to trust a certificate authority are paramount. The service that creates and maintains a PKI should provide records of its development and usage so that an auditor or third party can evaluate it.
Links from this episode
Salesforce
Wikipedia page on Public Key Infrastructure
Wikipedia page on Certificate Authorities
OpenSSL
Let’s Encrypt
132 פרקים
סדרה בארכיון ("עדכון לא פעיל" status)
When?
This feed was archived on December 12, 2020 08:26 (
Why? עדכון לא פעיל status. השרתים שלנו לא הצליחו לאחזר פודקאסט חוקי לזמן ממושך.
What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.
Manage episode 294560458 series 2501898
This episode features a conversation between Robert Blumen, DevOps engineer at Salesforce, and Matthew Myers, principal public key interface (PKI) engineer at Salesforce. Matthew shares his experience running a certification authority (CA) within the Salesforce enterprise. He shares the rationale for the decision to take CA in-house, explaining that becoming a certificate authority means you can become the master of your universe by establishing internal trust. A private or in-house CA can act in ways not dissimilar to a PKU but can issue its own certificates, trusted only by internal users and systems.
Using a public certificate authority can be expensive at scale, particularly for enterprises with millions (or even billions) of certificates. However, an enterprise CA can be an important cost-saving measure. It adds a granular level of control in certificate issuing, such as naming conventions and the overall lifecycle. You can effectively have as many CAs as you can afford to maintain as well as the ability to separate them by use case and environment.
Further, having the ability to control access to data and to verify the identities of people, systems, and devices in-house removes the cybersecurity challenges such as the recent SolarWinds supply chain attack. Matthew notes that Information within a PKI is potentially insecure “as the information gets disclosed to the internet and printed on the actual certificates which leave them vulnerable to experienced hackers.” Matthews shares the importance of onboarding and people management and the need to ensure staff doesn’t buy SSL certificates externally.
Myerss offers some thoughts for businesses considering the DIY route discussing the advantages and limitations of open source resources such as OpenSSL and Let's Encrypt. Identity mapping and tracking are particularly important as you’re giving certificates to people, systems, and services that will eventually expire. Matthew shares the benefits of a central identity store, its core features, and how it works in tandem with PKI infrastructure. There’s also the need to know how many certificates you have in the wild at any given time.
As a manager, the revocation infrastructure for PKI implementation means that you're inserting yourself in the middle of every single deal, because if you’re doing it correctly everything needs to validate that the certificates are genuine. When you have a real possibility of slowing down others’ connections, you want to ensure that your supporting infrastructure is positioned in such a way that you are providing those responses as quickly as possible. Network latency becomes a very real thing.
Auditability and the ability to trust a certificate authority are paramount. The service that creates and maintains a PKI should provide records of its development and usage so that an auditor or third party can evaluate it.
Links from this episode
Salesforce
Wikipedia page on Public Key Infrastructure
Wikipedia page on Certificate Authorities
OpenSSL
Let’s Encrypt
132 פרקים
כל הפרקים
×![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 118. Why Writing Matters for Engineers
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 117. Open Source with Jim Jagielski
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 115. Demystifying the User Experience with Performance Monitoring
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 114. Beyond Root Cause Analysis in Complex Systems
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 113. Principles of Pragmatic Engineering
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 112. Managing Public Key Infrastructure within an Enterprise
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 111. Gift Cards for Small Businesses
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 109. Meditation for the Curious Skeptic
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 108. Building Community with the Wicked CoolKit
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 I Was There: Stories of Production Incidents II
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 107. How to Write Seriously Good Software
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
1 106. Growing a Self-Funded Company
![Code[ish] podcast artwork](https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/32.png 32w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/64.png 64w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/128.png 128w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/256.png 256w, https://cdn.player.fm/images/23686112/series/BR0PSa6K222OMf3v/512.png 512w)
![Code[ish] podcast artwork](/static/images/64pixel.png)
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.