Weak PKI Implementation is a Major Cyber Risk

Weak PKI Implementation is a Major Cyber Risk
kdobieski
Thu, 11/08/2018 – 14:35

How can an enterprise maintain control over their PKI without clear ownership? In order for responsibilities to be taken care of, someone or some entity must be made responsible. This is a challenge for most of the organizations that Ponemon surveyed. About 69.5% of survey respondents said that there’s no clear ownership of their PKI. 

There are also related concerns. About 36% of organizations say that they have a lack of visibility of the applications that will depend on PKI. Organizations have an average of about eight applications which use PKI such as network authentication, VPN, device authentication and email. What can’t be seen can’t be kept secure! Could the lack of clear ownership have something to do with that? 

As far as PKI implementation challenges are concerned, an average of 46.5% cite insufficient skills, and about 44.5% cite insufficient resources. These sound like problems that can be solved with investments in training and increases in IT budgets. 

About 39.5% of respondents say their PKI deployment faces too much change or uncertainty. I can see specific staff training programs as part of the solution. It’s worth it to have your workers learn in depth about how to maintain and modify PKI to suit both current and future security needs. Frequent security testing by internal cybersecurity professionals and external third parties can also help an organization learn how to adjust and improve their PKI implementation. When a new PKI-dependent application is deployed, it becomes especially important to test its security. Also, having PKI application visibility is an absolute must in order to adapt to change. A lot of the problems discovered in this study are related to and directly affect each other. 

Secure PKI implementation usually also requires visibility and control of all of an organization’s Certificate Authorities. That’s because 56% of respondents deploy enterprise PKI through internal corporate CAs, and 40% of respondents use externally hosted private CAs. 33% of respondents use a public CA service, and 23% use a private CA running within a public cloud. An organization may have a hybrid network that exists both in the cloud and on premises, and some organizations have CAs from multiple types of sources. Organizations use an average of eight separate issuing CAs, with an average of eight distinct applications that need PKI. A lack of visibility in all of that can have serious consequences! Cyber attackers may be able to easily bypass the encryption of your data. 

Ponemon Institute’s 2018 Global PKI Trends Study reveals some startling data. The good news is that these are solvable problems. Your organization ought to review how you deploy PKI, and if further training, a larger budget, and greater visibility is required. Such efforts will be well worth it. When cyber attackers can intercept your sensitive data, the financial and reputational damage to an organization can be rather serious. 

Related posts

PKI Cyber Risk
Guest Blogger: Kim Crawley

Public Key Infrastructure is the backbone of your network’s security. As much of your data in transit as possible should be encrypted! Your PKI helps to make sure that your certificates are used and distributed in a secure way. But if your PKI is poorly implemented, it can be easy for cyber attackers to access your sensitive data.  

Venafi is proud to be a sponsor of Ponemon Institute’s recently released 2018 Global PKI Trends Study. For the study, Ponemon surveyed 1,688 IT professionals in regions around the world including the United States, Australia, Brazil, France, Germany, India, Japan, Russia, and the United Kingdom. Ponemon’s research reveals some worrisome findings about how organizations worldwide implement and deploy PKI.



*** This is a Security Bloggers Network syndicated blog from Rss blog authored by kdobieski. Read the original post at: https://www.venafi.com/blog/weak-pki-implementation-major-cyber-risk