Digital Certificate Operation in a Complex Environment
Sections in this document:search
often define different levels of security assurance. For
example it might not be appropriate to store your biscuit
recipes in a hardware cryptographic module or to do your
online banking using an unencrypted public network. To allow
you to choose the "right" level of security, allows with different security levels.|
'Rudimentary' or 'Basic' levels might be choosen if security requirements are not very high. For example in a 'rudimentary' security level your certificates and keys might be generated centrally and then delivered to you by email or on a floppy disk. Higher level assurance levels most likely will require hardware cryptography modules for all components within a PKI, including CA, RA and all .