🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

Security Advanced

What is PKI (Public Key Infrastructure)?

A framework of policies, hardware, and software for creating, managing, distributing, and revoking digital certificates.

PKI enables secure communication through digital certificates that bind public keys to identities. Certificate Authorities (CAs) issue certificates, Registration Authorities verify identities, and Certificate Revocation Lists (CRLs) track revoked certificates.

PKI underpins HTTPS, email encryption (S/MIME), code signing, VPNs, and document signing. Enterprise PKI manages internal certificates for servers, users, and devices. Let's Encrypt democratized PKI by offering free, automated DV certificates.

Related Terms

Data Loss Prevention (DLP)
A strategy and set of tools that detect and prevent unauthorized transmission of sensitive data outside an organization.
JWT (JSON Web Token)
A compact, self-contained token format used for securely transmitting information between parties as a JSON object.
Security Hardening
The process of reducing a system's attack surface by disabling unnecessary services, applying patches, and configuring security controls.
Hashing
A one-way function that converts input data into a fixed-size string of characters, used for data integrity and password storage.
Principle of Least Privilege
A security principle where users and programs receive only the minimum access rights needed to perform their specific tasks.
Security Headers
HTTP response headers that instruct browsers to enable security features like XSS protection, framing prevention, and content type enforcement.
View All Security Terms →