This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Certification

How to build your public critical infrastructure

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

How to build your public critical infrastructure

Yes. I can make the foundation.

A public infrastructure requires massive security layers, and defence mechanism will guarantee secure communication and reliable protocols within the system. This borrows the internal certificates authorities that are held by the organization owning the platform.

The security is done through the provision of a protection layer. Web services may contain various complex services that use a single application (Sullivan, 2015). The app is separated from offering multiple sections of the enterprise’s critical information on various computers. In a case where the services provided are service-service communications in a datacenter by use of internet connection, the network type to be used becomes the next question. This part is critical since a simple mistake in the configurations may result in leakage of data to other untrusted destinations through the internet (Sullivan, 2015). Therefore, designing the system should be done in a manner that ensures the security of messages is guaranteed. This process may require specific steps;

Application of TLS

One of the best ways of ensuring the safety of the words shared through the internet is through data encryption and authentication measures. The article applies this technique by using Transport Layer Security protocols, which will ensure that inter-service communications are secured (Sullivan, 2015). The choice was based on the fact that current de facto standardization of the encryption application layers which works flawlessly with RESTful services. To reinforce the encryption, authentication is used alongside it. Although authentication does not protect data when being sent, trust among the two parties must be ensured before the communication process. This process prefers PKI due to its ability to offer confidence in communication. The details provided under this section provides the reader with enough data to go on when creating encryption and the type of encryption to use in the process.

Don't use plagiarised sources.Get your custom essay just from $11/page

Various tools can be used in creating public key cryptography. First is the certificate, which allows the website to prove itself. A document can be defined as a file that carries identify data regarding its owner. A public key with each key containing a private key that is securely stored within the control of the certificate owner (Sullivan, 2015). The private key provided in the public key is used in creating a digital signature, which is verifiable through Associated Public Key. A certificate, on the other hand, contains such details as;

Data regarding the firm being issued with the certificate

A public key

Data of the certificate issuer

Rights are given to the issuer

The period under which the license will be valid

The Certificates hostnames

The uses of the receipt, for instance, authentication both for the server and the customer.

Lastly is the digital signatures of the issuer’s private key.

Creation of a CA

The creation of a CA is often an involving process. Certificates can be found in two types; obtaining beside the operating CA. There are various tools used in the creation of documents. In the article, universal SSL was used to create a CA. This is a PKI toolkit that can be found from an open-source and contains all the capabilities required for the certificate authority creation. Also, the software is fast enough when using a publicly trusted certificate authority.

Key protection

Running a CA requires both the CA certification besides the corresponding private key. The key used in this process is highly critical. This is because any person who knows or holds the key may act in the capacity of the CA as well as the issued certificate. Browser-trusted CA needs to store private keys within the particular hardware called the Hardware Security Modules. There are several mechanisms compatible with SSL which may be used in protecting the keys;

Hardware Security Modules. SSL enables Ca servers to apply HSM in computing digital signatures. Most HSM applies PKCS#11 interfaces in interacting with the SSL and supporting the interfaces. The use of HSM guarantees that private keys live outside memory, together with the provision of physical disasters.

Red October

A red October cannot be decrypted without various principal owners, thus guaranteeing essential protection (Sullivan, 2015). The software necessitates that the owners of the key authorize the private essential application. Also, the red October prevents the CA from being unencrypted on a disk, source control or by use of configuration management.

Plaintext

SSL can accept unencrypted private keys. This allows the use of a machine-generated private key that runs in SSL. In a case where the security is intensive, the model can easily compromise between security, costing as well as usability. This aspect can be applied during the development mode by enabling users to test any infrastructural design changes.

Generation of CA key and certificates

In the creation of CA keys, data regarding the type of metadata to be included should be acquired. This can be done through the creation of csr_ca.json that contains the necessary information.  The file will allow the creation of a CA using a single call.

The private key; ca-key.pem, the corresponding certificate ca. pem and lastly, the certification signings: ca.csr.

Certificate policies

Upon creation of CA besides the key, the CA software should understand the certificates to be issued. This will be based on the SSL configuration file signing policy unit.

Certificate issuance

Certificate authorities use not only need public keys in creating certificates but also the use of metadata in populating the certificates information faculties. The information, however, can only be communicated through the certificate’s signing requests (Sullivan, 2015).

Requesting certificates

Though the primary purpose of this paper was to explain why and how it is possible to create an organization’s public critical infrastructure, upon the creation of a certificate, a request should be made for the issuance of the same license.

The CA, upon receiving a request to issue the certificate, it applies two commands to simplify the process. The controls can be found on the JSON API command line. This process requires a binary configuration file. The first is the identification of the CA, together with the authentication request. The second is the CSR configuration, which is applied in populating the CSR.

Application of PKI for services

Upon completing the certificate creation that is compatible with TLS, the application process will kick-in. Two methods can be used in distributing PKI services (Sullivan, 2015). The first method is the centralized distribution. Under this method, the certificates are created at one point before forwarding them to every server for use. Under this approach, keys are retained and secured by the designer. This design is complex beside has a broader topology and thus is preferred only when the CA is stateless and can also generate a series of logs.

Through the explanation from the blog, the author provided a detailed guide oh how to develop and create a PKI. The information provides a detailed description of how the steps are followed and the necessary actions which ensure the security of the information on the platform. By following this criterion, I was able to understand how the security features, for instance, the certificates and public keys are used in ensuring security and data protection. Therefore, the answer to the question is yes, I was able to read and, based on the data, build a complete and secure PKI.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference

Sullivan, N. (2015). How to build your critical public infrastructure. Retrieved 17 March 2020, from https://blog.cloudflare.com/how-to-build-your-own-public-key-infrastructure/

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask