ABSTRACT

Incidents can originate from insider threat or external attacks, system or application miscongurations, software or hardware failures, zero-day faults, and other vulnerabilities. Components of incident management include monitoring, response, discovery, reporting, and remediation. To begin the incident management discussion, let’s rst look at the areas of a PKI where a compromise might occur and the impact it has to an organization.