Page 65 - Cyber Defense eMagazine June 2024
P. 65
Take inventory
The first step in managing digital trust is gaining visibility and insight into the parts of your business that
most depend on it. Take a close look at the processes that rely on digital trust, and understand how your
organization protects, uses, and manages digital identities, cryptographic keys, and related assets. You
can do the inventory manually, or save time by automating the processes, using technology tools to scan
your systems and/or ingest data from your IT asset management systems and other resources.
Understand and define your processes
Once you’ve acquired a strong understanding of your digital trust processes, you can build or strengthen
policies to support them more effectively and align them to your specific needs. A good place to start is
with foundational policies for trust, covering areas like cryptography and public key infrastructure. Then
you can zero in on processes and tools that need more specific attention.
Optimize PKI management
Achieving crypto-agility is key to a proactive approach to future threats. Centralizing policy enforcement
and automating management of cryptographic assets can make it easier to update cryptographic assets
at scale or mitigate issues more quickly. A centralized approach to managing digital assets and
certificates can also help you gain visibility, ease administration, and bring risk down.
Next steps
We’ve already seen the need for digital trust across a variety of industries, and its importance will only
grow. Regardless of where you are in your adoption of digital trust, it’s important to keep pace with new
threats, new digital business processes—and new opportunities. With a forward-looking strategy, you
can position your organization to meet today’s changing needs, as well as tomorrow’s.
About the Author
Mike Fleck is Head of Product Marketing at DigiCert. He has more than
25 years of cybersecurity industry experience across network security,
data encryption, threat intelligence, malware analysis, identity protection
and e-mail security, and holds a patent for transparent data encryption.
Mike can be reached online at https://www.linkedin.com/in/mfleckca/ and
at our company website https://www.digicert.com/
Cyber Defense eMagazine – June 2024 Edition 65
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.