YoVDO

PKI at Scale Using Short-Lived Certificates - USENIX Enigma 2016

Offered By: USENIX Enigma Conference via YouTube

Tags

USENIX Enigma Conference Courses Cloud Security Courses Public Key Infrastructure Courses TLS Courses

Course Description

Overview

Explore the challenges and solutions of deploying Public Key Infrastructure (PKI) at scale for cloud applications in this 21-minute conference talk from USENIX Enigma 2016. Dive into the world of PKI deployments, focusing on protecting internally facing microservices using TLS with mutual authentication. Learn about the pros and cons of using short-lived certificates, operational challenges in scaling certificate authority services, handling certificate reloading at runtime, and determining instance trustworthiness for credential renewal. Gain insights into high-profile attacks, revocation methods, OCSP challenges, and the "Penny Analogy" for understanding short-lived certificates. Discover how chaos engineering and AWS keys play a role in PKI management at scale.

Syllabus

Intro
High profile attacks
PKI at scale
What do people do today
Revocation
OCSP
OCSP Challenges
OCSP Staple
The Problem
Penny Analogy
Shortlived Certificates
Chaos
AWS Keys


Taught by

USENIX Enigma Conference

Related Courses

Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX
Ethical Hacking: Cryptography
LinkedIn Learning
Learning SSL/TLS
LinkedIn Learning
Blockchain Deep-Dive: from Bitcoin to Ethereum to Crypto
Udemy
Systems and Usable Security
NPTEL via Swayam