Abstract
Public Key Infrastructure (PKI) and Entitlement (Identity & Access Management) are considered core elements of Information Security Management which have been adopted by many organizations in public and private sectors.
In this paper we will derive on a strategic level how PKI and Entitlement can be deployed to meet IT needs of business and ensure compliance to regulatory and corporate policies.
In the second part we will describe how PKI and Entitlement solutions are successfully deployed at Siemens. The Siemens PKI and Entitlement infrastructure ranks among the largest private PKI and Entitlement implementations worldwide.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Glaeser, Martin: Strategy and Implementation of a PKI Rollout in an International Company. ISSE 1999.
von der Heidt, Guido: Marhoefer, Michael; Oeser, Thomas: The Siemens PKI — Implementation and Evolution of a Large Scale Enterprise PKI. ISSE 2001.
[vdH03] von der Heidt, Guido: The Siemens PKI — Implementation of PKI Self Services. Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2003 Conference, Vieweg, 2004, S. 204–209.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2007 Friedr. Vieweg & Sohn Verlag | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Heidt, G.v.d., Schoepf, R. (2007). PKI and Entitlement — Key Information Security Management Solutions for Business and IT Compliance. In: ISSE/SECURE 2007 Securing Electronic Business Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9418-2_40
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9418-2_40
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0346-7
Online ISBN: 978-3-8348-9418-2
eBook Packages: Computer ScienceComputer Science (R0)