๐ PKI (CISSP Exam Survival)
๐ PKI Crash-Memory Guide (CISSP Exam Survival)
✅ Designed for test day memorization
๐ง Anchored to CISSP Domains
๐ฏ Focused on key exam facts
๐ What is PKI?
Public Key Infrastructure (PKI) is the framework that manages digital certificates and asymmetric key pairs to enable secure communication.
Appears in:
✅ Domain 3: Security Architecture and Engineering
✅ Domain 5: Identity and Access Management (IAM)
✅ Domain 7: Security Operations (for revocation, incident response)
๐ 1. Public/Private Key Basics
| Action | Key Used | Purpose |
|---|---|---|
| Encrypt | Receiver’s Public Key | ๐ Confidentiality |
| Decrypt | Receiver’s Private Key | |
| Sign | Sender’s Private Key | ✍️ Integrity, Non-repudiation |
| Verify Signature | Sender’s Public Key | ๐งพ Authentication |
๐ก Mnemonic:
"Public encrypts, private decrypts. Private signs, public verifies."
๐ 2. PKI Core Components
| Component | Function | CISSP Domain |
|---|---|---|
| CA (Certificate Authority) | Issues and signs digital certs | D3, D5 |
| RA (Registration Authority) | Verifies identity before cert issuance | D5 |
| CRL (Certificate Revocation List) | Publishes revoked certificates (slow) | D7 |
| OCSP (Online Cert Status Protocol) | Real-time cert validation (fast) | D7 |
| X.509 Certificate | Digital ID containing subject, public key, issuer, etc. | D3 |
๐ง Certificate = Signed statement binding a public key to an identity.
๐ 3. Trust Models in PKI
| Model | How It Works | Common Use |
|---|---|---|
| Hierarchical | Root CA → Intermediate CA → End Entity | Most secure (e.g., TLS) |
| Web of Trust | Peer-to-peer trust, manual signing | PGP |
| Bridge CA | Links multiple CAs together | Gov/military cross-certification |
Appears in: Domain 3, Domain 5
⛔ 4. Revocation vs Expiration
| Concept | Description | Domain |
|---|---|---|
| Expiration | Cert is no longer valid after date | D7 |
| Revocation | Cert is invalidated before expiration (compromised) | D7 |
| CRL | List published by CA — checked by clients | D7 |
| OCSP | Real-time API check for revocation | D7 |
⚙️ 5. PKI in Practice
-
Digital Signature:
-
Signed with private key
-
Verified with public key
-
Provides authentication, integrity, non-repudiation
-
-
Confidential Message:
-
Encrypted with receiver’s public key
-
Decrypted with receiver’s private key
-
Appears in: Domain 3 (crypto), Domain 5 (IAM), Domain 7 (incident response)
๐ง 6. Symmetric vs Asymmetric (Quick Recap)
| Feature | Symmetric | Asymmetric |
|---|---|---|
| Keys | Same key | Key pair (public/private) |
| Speed | Fast | Slower |
| Use Case | Encrypt bulk data | Key exchange, signatures |
| Algorithms | AES, DES | RSA, ECC |
๐ 7. Memory Drill: One-Minute Recall
Say this out loud 3x:
"Public encrypts, private decrypts.
Private signs, public verifies.
CA issues, RA validates, CRL revokes.
Trust the chain or it breaks."
๐งพ 8. Flashcard Summary (Exam Ready)
| Question | Answer |
|---|---|
| What does PKI manage? | Asymmetric key pairs and digital certificates |
| What does a CA do? | Issues and signs certificates |
| What provides real-time revocation status? | OCSP |
| What is the standard format for certs? | X.509 |
| What provides non-repudiation in PKI? | Digital signatures (private key used to sign) |
| Which key encrypts data sent to someone? | Their public key |
| Which key is used to verify a digital signature? | The sender’s public key |
Comments
Post a Comment