Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to the Cyber. A video Siri's in the Company of Security Plus 5 +01 Certification and Exam.
00:07
I'm your Instructor, Round Warner.
00:09
The security plus requirement for section 6.4 is given a scenario. Implement public key infrastructure,
00:17
Public Key Infrastructure or P K I is widely used to provide the secure infrastructure for applications and networks,
00:25
including access control. Resource is for Web browsers, secure email and much more.
00:31
P. K I is a large collection of varying technologies and policies for the creation and use of digital certificates.
00:40
A P K I encompasses digital certificates, certificate authorities and the tools, systems and processes needed to bring it all together.
00:50
In this video, I'll cover P K I components such as keys,
00:54
certificates and certificate management.
00:58
P k. I concept
01:00
types of certificates and certificate formats.
01:03
Before we jump into P K I. Let's have a quick review of asymmetric encryption and the use of public and private keys. You need to have this down for both security plus and understand P k I to encrypt a document. You do it with the recipients public key
01:23
on Lee. The recipient can decrypt it with his or her private key.
01:27
The sign. A message. I would sign it with my private key than anyone. Comm prove. I signed it with my public key.
01:37
Review this material. Make sure you have it down.
01:41
Let's quickly review some of the P K I components. This is a review from section 6.1
01:48
p. K. I consists of an infrastructure, hardware, software policies and processes.
01:53
These components provide for management and use of digital certificates.
01:57
Core components include certificate authorities, certificate policies, digital certificates and certificate practice statements. P k i. Is that process off working with all of these certificates and uses X 509 for its standard,
02:14
we'll dive into this in a lot more detail throughout this video.
02:17
As I explained in previous videos,
02:21
digital certificates are critical component to provide secure systems.
02:25
EEP and wireless networks requires digital certificates to verify the identity of the client or server.
02:32
Digital certificates are digitally signed data blocks, which provides several potential functions but most notably are used for identification and authentication purposes.
02:45
A digital certificate includes information about the key information about the identity of the owner, also called the subject
02:53
and the digital signature of the entity that has been verified
02:58
that has verified the certificates. Contents called the Issuer
03:02
X 509 V three is the standard, and it defines certificate formats and fields for public keys.
03:10
Your screen shows the components of a digital signature, including the version serial number.
03:19
The issue of the Sea, eh? We'll talk about C is in a moment.
03:23
How long is it valid
03:25
subjects? Public key information issuers Unique. I D
03:30
Subject also has a unique I. D. In any extensions. Let me show you an actual example from the Internet.
03:38
On your screen is the nest website.
03:42
Let's check out its digital certificate.
03:44
Do so by clicking on secure green lock
03:49
certificate. Showing the certificate is valid
03:52
on the general screen.
03:53
Insurers the identity of both the remote computer and improves my identity as well.
04:00
To click on details, it actually shows the contents of the digital certificates I briefly mentioned earlier,
04:06
and you can look into these contents. I highly recommend. Pull up your favorite website review the digital certificate as you're walking through. This topic
04:20
will now explain different X 509 certificates.
04:25
First of all is the root certificate. This is for root authorities. These air usually self signed by that authority
04:32
he kept offline.
04:34
The Devi, or domain validator, is the quickest and least expensive option for a certificate because it on Lee the ownership of a specific don't main name is validated.
04:46
Organizational validation or oh, Weise certificates provide stronger assurance over just domain verification
04:55
because the organization has not just domain verified.
04:59
Finally, evey is tthe e extended validation, and it's the certification that provides the highest level of trust and security features.
05:09
X 509 uses different types of certificates
05:13
based on the circumstance and organization.
05:16
For example, a wildcard certificate allows for those sub domains for single registered domain. You saw that with the NIST example.
05:25
Yes, a N or subject alternate name. It's a special X 509 certificate that allows additional items such as I P addresses, domain names, et cetera,
05:35
code signing certificate used to sign computer code so developed code you could sign with their certificate
05:43
to prove that it is valid.
05:46
There's also machine or computer certificates that are assigned to a specific computer machine.
05:53
Email certificates used with s mine. I could use this as part of my secure email strategy
06:00
and then user certificates assigned to specific users.
06:05
Certificates can have various file extension types.
06:10
Some extension types are interchangeable, but not all are.
06:14
Be sure to determine whether the certificate is binary or based. 64. Ask e and coded chart on the screen shows the differences with the format and the including along with the systems that are used with it, then the extensions you'll find on your computer.
06:30
The most common format an extension for certificates is P M, which is mostly associated with Apache Web servers. Servers.
06:40
The pen format is based. 64 asking coded text file, which makes copying the contents from one document toe. Another
06:47
very easy.
06:49
Another base 64 encoded certificate format is P seven B, also known as P K CS number seven.
06:59
This format uses the got P seven B or dot p seven C file extension,
07:04
which is commonly supported on the Windows operating system, and Java Tomcat.
07:10
The binary form of a PEM certificate is D. E R.
07:14
In addition to the dot d e r extension dot c e r and dot C R T extensions can be used for D are encoded certificates
07:23
D are included. Certificates are common on Java platforms.
07:28
Be familiar with these different types of certificate formats.
07:31
Earlier in this video and mentioned certificate, authorities
07:35
C ays are trusted entities within P K I.
07:41
The CIA's role is to issue certificates,
07:44
verify the holder of a digital certificate and ensure holders of certificates are who they claim to be.
07:50
A common analogy is to compare See a tow, a passport issuing authorities for me to get my passport. Have to take some other type of identity of my birth certificate. Driver's license
08:03
to the post office. Who's that authority to give me a passport?
08:09
Then the passport office can issue my document.
08:13
This is similar to how a C A works
08:16
an organization can establish its own. See a typically for use on Lee. Within that organization,
08:22
you can also use an external or third party. See a such a semantic go daddy et cetera.
08:28
You see on the screen the additional duties associated with certificate authorities. As previously mentioned, this is a key component of P K. I
08:37
since see Ace 10 to be quite busy, they have a helper. None is tthe e r registration authority
08:45
registration Authorities provide authentication to the sea A on the validity of a client certificate request.
08:52
In addition, the are a serves as an aggravator of information.
08:56
For example, a user contacts in Ouray, which then verifies the user's identity before issuing the request of the C A.
09:07
To go ahead and issue a digital certificate.
09:09
Note. Our ace. Do not issue digital certificates themselves. That is the role of the C. A.
09:18
Let's look at some of the P K I components.
09:20
The first is a certificate signing request or CSR
09:26
A. C s. Ours requested from the applicant to the c A.
09:31
To install a digital certificate. A specific request needs to be generated and submitted to the CIA.
09:37
This request to apply for a digital certificate is known as the CSR.
09:43
Included within the request is the applicants public he along with the information about the applicant.
09:50
Typical information includes a fully qualified domain name,
09:54
legally incorporated name of the company,
09:56
maybe a department name, city, state, country or email address.
10:03
Before submitting a CSR, the applicant generates a key pair consisting of a public and private key.
10:11
The public he is provided with the request and the applicant signs the request with their private key.
10:18
If all is successful, the CIA returned a digital certificate that it's signed with the sea, a CZ private key
10:26
Digital certificates can also be revoked.
10:31
Revocation happens for several reasons. For example, a private key might become compromised,
10:37
maybe lost or the identifying credentials might no longer be valid.
10:41
Other reasons for revocation include fraudulently obtained certificates or change in the holder status,
10:48
which could indicate less trustworthiness.
10:52
Revoking a certificate is not enough.
10:56
The community that trust these certificates must be notified that that the certificate is no longer valid.
11:01
This is accomplished with a certificate revocation list or C r L.
11:07
You could search for CR l's within your own Web browser.
11:11
They also may use an online certificate status protocol.
11:16
I'll explain each of these.
11:18
The three basic status levels exist in most peak I solutions.
11:24
Valid, suspended or revoked.
11:28
You can check the status of a certificate by going to the sea A that issued the certificate or tow an agreed upon directory server that maintains a database indicating the status level for the set of certificates.
11:41
The certificate revocation list is the method for distributing that certificate revocation information from that see a server
11:50
down to clients must be updated very often.
11:56
A certificate is in compared against the sea Earl. If it's not valid
12:01
thrown out, you may receive a warning.
12:05
C r l must be updated and maintained, which could be a maintenance nightmare.
12:11
Be familiar with certificate revocation.
12:15
Another method for specific revocation is O S C. P Online certificate status protocol.
12:22
This is a in real time process for checking a certificate status against a revocation list.
12:31
Oh, SCP stapling allows the Web server to staple
12:35
a time stamped O S. C. P response is part of a T. L s handshake with the client. So reduces the load on the C A.
12:43
The Web server is now responsible for handling oh SCP requests instead of the C A.
12:50
Oh, SCP stapling provides several benefits. Ts. First, it improves the performance of the secure connection.
12:58
Next privacy concerns are reduced because the end user's browser does not need to potentially contact the third party, see eight to verify the certificates and reveal the browsing history.
13:09
Finally, reliability is improved.
13:13
Another p k I component you need to be aware of is certificate trust models.
13:18
If your organization acts as its own, see A. It's known as a single C A,
13:24
and you can issue self signed certificates. This is the simplest scenario, but there's no redundancy.
13:31
It's possible for anyone to generate a self science certificate. In fact, this is an easy task to perform. Using Microsoft I. I s
13:39
The certificate will be x 509 but it'll be digitally signed by you.
13:45
This means that although it could be used to transmit your public, he it won't be trusted by browsers.
13:52
This will instead generate a certificate error message, which I'm sure you've all encountered
13:58
more common model and the one that reduces the risks inherent with a single C. A is the hierarchical. See a model
14:07
in this model, an initial route see a exists at the top of the hierarchy and subordinate. See Ace or intermediate See Ace reside beneath the root.
14:18
The subordinate See Ace provide redundancy and load balancing in case any of the other C ase fail or need to be taken off line.
14:28
Because of this model, you might hear p k I referred to as a trust hierarchy
14:35
a route see a differs from a subordinate ta is because the route C A is usually offline.
14:41
Remember, if the route see a this is the one it's all based on is compromised.
14:46
The higher architecture is therefore compromised.
14:50
If a subordinate ta is compromised, however, the route see a can revoke
14:56
the subordinate C A
14:58
certificate chaining is associated with those ideas.
15:03
It refers to the fact that a certificate handled by it are handled by a chain of trust.
15:09
You purchase a digital certificate from a C A. So you trust that See a certificate
15:15
in turn that see a trusts a route certificate.
15:18
In this example, the sea a certificate is an intermediary si es and the ultimate trust is the root certificate.
15:28
An alternative to this hierarchical model is the cross certification model often referred to as a web of trust.
15:37
In this, model, C A s are considered appears to each other
15:41
to achieve secure exchange of information
15:45
across the Internet.
15:46
There are is also a bridge C A, which provides a cross certification model using a central point of trust.
15:56
You should review these different certificate trust models that are all part of P K. I
16:02
key escrow
16:03
key escrow occurs when a C A or other entity maintains a copy of the private key associated with the public he signed by the sea. Eh?
16:14
So I give my private key to a trusted entity.
16:18
I escrow Mikey with them.
16:21
This scenario allows the C A or escrow agent have access to all of the information encrypted. Using the public key from a user certificate and to create digital certificates and signatures on behalf of the user
16:36
has some danger associated with it.
16:38
But despite public concerns about escrow for private use, key escrow is often considered a good idea In corporate p k I environments,
16:49
the key recovery agent is an entity that is, it has the ability to recover a key, the key components or plain text messages as needed.
17:00
The last topic associated with P k I. I'll be covering in this video is pinning
17:07
with certificate pinning
17:10
hashes of public. He's for popular Web servers are built into applications such as Web browsers.
17:15
This provides a method that extends beyond certificate validation.
17:19
This stops man in the middle attacks.
17:22
Http Public key pinning or h p. K p uses public key pins
17:30
which are essentially hashed values of the public key communicated to the browser client
17:34
from the server in the http header.
17:40
In this video, I covered a number of topics associated with P K I.
17:45
Let's practice on a few sample quiz questions.
17:48
Question one.
17:49
The job of this service is to issue certificates, verify the holder of a digital certificate
17:56
and ensure that the holders air certificates are who they claim to be.
18:02
The answer is a. This is the definition of a certificate authority,
18:07
or C A
18:10
question, too.
18:11
Which of the following is not contained in a standard X 509 certificate?
18:17
Remember the example I showed you of what often is contained in the next 509 certificate.
18:23
What is not contained?
18:25
The answer is C subject's private key. Only the subject's public key is included.
18:33
There are two labs associated with P K. I will give you hands on practice on these concepts. The first is understanding P K I. Concepts.
18:44
This module provides you with instruction and server hardware. Develop your hands on skill
18:48
in the areas of installing and configuring active directory certificate service is
18:53
and configuring certificate revocation lists
19:00
the other lab is managing certificates
19:03
where you will learn about managing certificate templates, configuring certificate, auto enrollment, implementing key archival and rolling user certificates, and managing key recovery.
19:15
Each of these laps will provide you with hands on experience on the concepts associated with P K I.
19:25
This concludes the video for section 6.4.
19:29
Given a scenario, implement public key infrastructure
19:33
and this concludes domain six cryptography and p K I
19:37
Please review your study material for more information on this topic.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor