ABSTRACT

Cybersecurity from an information technology perspective is heavily dependent on PKI operations, in which applications are dependent on cybersecurity, and business processes are consecutively dependent on applications. us, applications and business are increasingly reliant on PKI. However, over the past lustrum, PKI has been under attack [B.7.19]. If we call the current state of PKI, version 1.0, then perhaps we need to consider what the next-generation PKI 2.0 might be like [B.7.18]. is chapter rst considers a few industry initiatives and then several advanced PKI controls that address cybersecurity, applications, and business controls.