๐Ÿ“˜ PKI (CISSP Exam Survival)

๐Ÿ“˜ PKI Crash-Memory Guide (CISSP Exam Survival)

✅ Designed for test day memorization
๐Ÿง  Anchored to CISSP Domains
๐ŸŽฏ Focused on key exam facts


๐Ÿ” What is PKI?

Public Key Infrastructure (PKI) is the framework that manages digital certificates and asymmetric key pairs to enable secure communication.

Appears in:

  • Domain 3: Security Architecture and Engineering

  • Domain 5: Identity and Access Management (IAM)

  • Domain 7: Security Operations (for revocation, incident response)


๐Ÿ”‘ 1. Public/Private Key Basics

Action Key Used Purpose
Encrypt Receiver’s Public Key ๐Ÿ”’ Confidentiality
Decrypt Receiver’s Private Key
Sign Sender’s Private Key ✍️ Integrity, Non-repudiation
Verify Signature Sender’s Public Key ๐Ÿงพ Authentication

๐Ÿ’ก Mnemonic:
"Public encrypts, private decrypts. Private signs, public verifies."


๐Ÿ› 2. PKI Core Components

Component Function CISSP Domain
CA (Certificate Authority) Issues and signs digital certs D3, D5
RA (Registration Authority) Verifies identity before cert issuance D5
CRL (Certificate Revocation List) Publishes revoked certificates (slow) D7
OCSP (Online Cert Status Protocol) Real-time cert validation (fast) D7
X.509 Certificate Digital ID containing subject, public key, issuer, etc. D3

๐Ÿง  Certificate = Signed statement binding a public key to an identity.


๐Ÿ”„ 3. Trust Models in PKI

Model How It Works Common Use
Hierarchical Root CA → Intermediate CA → End Entity Most secure (e.g., TLS)
Web of Trust Peer-to-peer trust, manual signing PGP
Bridge CA Links multiple CAs together Gov/military cross-certification

Appears in: Domain 3, Domain 5


⛔ 4. Revocation vs Expiration

Concept Description Domain
Expiration Cert is no longer valid after date D7
Revocation Cert is invalidated before expiration (compromised) D7
CRL List published by CA — checked by clients D7
OCSP Real-time API check for revocation D7

⚙️ 5. PKI in Practice

  • Digital Signature:

    • Signed with private key

    • Verified with public key

    • Provides authentication, integrity, non-repudiation

  • Confidential Message:

    • Encrypted with receiver’s public key

    • Decrypted with receiver’s private key

Appears in: Domain 3 (crypto), Domain 5 (IAM), Domain 7 (incident response)


๐Ÿง  6. Symmetric vs Asymmetric (Quick Recap)

Feature Symmetric Asymmetric
Keys Same key Key pair (public/private)
Speed Fast Slower
Use Case Encrypt bulk data Key exchange, signatures
Algorithms AES, DES RSA, ECC

๐Ÿ” 7. Memory Drill: One-Minute Recall

Say this out loud 3x:

"Public encrypts, private decrypts.
Private signs, public verifies.
CA issues, RA validates, CRL revokes.
Trust the chain or it breaks."


๐Ÿงพ 8. Flashcard Summary (Exam Ready)

Question Answer
What does PKI manage? Asymmetric key pairs and digital certificates
What does a CA do? Issues and signs certificates
What provides real-time revocation status? OCSP
What is the standard format for certs? X.509
What provides non-repudiation in PKI? Digital signatures (private key used to sign)
Which key encrypts data sent to someone? Their public key
Which key is used to verify a digital signature? The sender’s public key

Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards