Public Key Enabling (PKE)
Your PKI can often be a severely underutilised capability within your IT landscape
Public Key Enabling (PKE) is a term used to describe the process of changing systems to utilise Public Key Infrastructure (PKI). It is the incorporation of the use of certificates for security services such as authentication, confidentiality, data integrity, and non-repudiation.
Organisations taking steps to add PKI often do so to meet a point need such as adding HTTPS security to internal websites. PKI, however, can provide much higher value to the business than most organisations realise. Where the investment in PKI has already been made, additional major capability and security benefits can be realised for almost no capital or ongoing costssecurity
How can I use my PKI?
![Authentication Image of eye being scanned within a circle](https://cogitogroup.net/wp-content/uploads/2024/01/authentication.png)
Authentication
To ensure the authenticity of an individual, application or device
![Confidentiality Image of shredder shredding paper within a cirlce](https://cogitogroup.net/wp-content/uploads/2024/01/confidentiality.png)
Confidentiality
Ensuring that information can be kept private
![Integrity Image of lock within a circle](https://cogitogroup.net/wp-content/uploads/2024/01/integrity-1.png)
Integrity
That information cannot be manipulated without this being obvious to the recipient
![Non-Repudation Image of thumbs up in a circle](https://cogitogroup.net/wp-content/uploads/2024/01/non-repudiation.png)
Non-Repudiation
The creator or sender cannot disown the information or claim they did not create or send the information
Authentication Enabling
![physicalicon](https://cogitogroup.net/wp-content/uploads/2024/01/physicalicon-1.png)
People
PKI ensures greater authentication of people with soft or physical to logical & physical systems.
![personnelicon](https://cogitogroup.net/wp-content/uploads/2024/01/personnelicon.png)
Devices
PKI ensures greater authentication of devices – esp. when connecting to networks, zero-trust model.
![Websites Icon Icon of laptop and globe to demonstrate websites](https://cogitogroup.net/wp-content/uploads/2024/01/websites.png)
Websites
PKI ensures greater authentication of web sites, applications, services & APIs.
![Cloud Icon icon image with arrows to demonstrate cloud technology](https://cogitogroup.net/wp-content/uploads/2024/01/cloud.png)
Cloud
PKI enables stronger authentication needed for cloud environments.
Confidentiality Enabling
![Compliance Icon Icon of web page and pencil to demonstrate compliance](https://cogitogroup.net/wp-content/uploads/2024/01/compliance-1.png)
Compliance
PKI ensures greater level of auditing for compliance standads
![Encryption Icon Icon of hardware and key to demonstrate encryption](https://cogitogroup.net/wp-content/uploads/2024/01/encryption.png)
Encryption
Database encryption – e.g. Transparent Data Encryption
![Secure Icon Icon of shield to demonstrate security](https://cogitogroup.net/wp-content/uploads/2024/01/secure.png)
Secure
Secure communication channels – TLS in websites, apps, VPNs, etc
![Email Icon icon to demonstrate email](https://cogitogroup.net/wp-content/uploads/2024/01/email.png)
Confidentiality enables secure email
Integrity and Non-Repudiation
![Web Security Icon icon of laptop and shield to demonstrate web security](https://cogitogroup.net/wp-content/uploads/2024/01/web.png)
Web
PKI protects web and other services and avoids being able to spoof a website
![Device Trust Icon icon for device trust](https://cogitogroup.net/wp-content/uploads/2024/01/devicetrust.png)
Device Trust
PKI enables device trust – Trusting Laptops, Mobiles, industrial equipment, etc
![Digital Signing Icon icon for digital signing](https://cogitogroup.net/wp-content/uploads/2024/01/digitalsigning.png)
Digital Signing
PKI enables digital Document Signing and thereby ensuring document source and integrity
![Code Signing Icon Icon for code signing](https://cogitogroup.net/wp-content/uploads/2024/01/codesigning.png)
Code Signing
PKI enables code signing. It is verifying the source and integrity of software