Security/Guidelines/Key Management: Difference between revisions

Jump to navigation Jump to search
Line 137: Line 137:
* The recommended settings are identical to the user keys.
* The recommended settings are identical to the user keys.
* The keys must be accessible only by the admin user (root) and/or the system user requiring access.
* The keys must be accessible only by the admin user (root) and/or the system user requiring access.
When non-user keys are generated, a copy of their fingerprint and a description of their usage should be recorded in your team's inventory (e.g. a wiki page, Mozilla inventory, etc.)
Usage of machine keys should be registered in an inventory (a wiki page, ldap, an inventory database), to allow for rapid auditing of key usage across an infrastructure.


== PGP/GnuPG ==
== PGP/GnuPG ==
Confirmed users
529

edits

Navigation menu