Download Publication
Who it's for:
- Cybersecurity professionals
- Software developers
- Decision-makers
- IT auditors
- Network security engineers
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Release Date: 11/05/2024
- The role of asymmetric cryptography in Zero Trust
- The role of key management in cryptography
- Methods for effective key management, including key generation, distribution, storage, rotation, revocation, and hardware security modules (HSMs)
- How to use asymmetric cryptography in various scenarios, including authentication methods like SSH keys, OAuth2.0, and Kerberos
- Computational overheads and risks associated with asymmetric cryptography
- Zero Trust principles relevant to asymmetric cryptography
Download this Resource
Acknowledgements
Ryan Gifford
Research Analyst, CSA
Shruti Kulkarni
Information Security Architect, Elexon
I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Heinrich Smit
CISO & Risk Management at Semperis
Heinrich is a recognized Information Protection and Zero Trust expert who started out in Law, and pivoted to his love of technology during the Tech Boom. He has led teams at software innovators and large financial institutions, has authored entire Information Security Policy stores, and has protected data at both 280,000 seat regulated enterprises and SAAS-based startup unicorns. He is passionate about Privacy and Zero Trust, as well as Def...
Hani Raouda
Cybersecurity Professional at Google
Paul Simmonds
CEO at Global Identity Foundation & Board Member of CSA UK Chapter
Paul is the CEO of the Global Identity Foundation and formerly the global CISO of AstraZeneca, ICI and prior to that Motorola Cellular Infrastructure. He is twice listed as one of Network World’s “most powerful people in networking”. He is a director of the Cloud Security Alliance (Europe), co-founded the Jericho Forum, and sits on the advisory boards of a number of global tech companies.
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA
Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).
I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.
Linke...
Interested in helping develop research with CSA?
Related Certificates & Training
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more