five must haves to prevent encryption disasters

34
© 2013 Venafi Prepared for: 5 Must Haves to Prevent Encryption Disasters Intelligent People

Upload: venafi

Post on 15-Jan-2015

270 views

Category:

Education


0 download

DESCRIPTION

Simple errors, old and weak cryptography, and alarming, malicious attacks are turning digital certificates and encryption keys into an expressway to downtime, targeted attacks, failed compliance, and data breaches. Fortunately, there are simple steps you can take to make sure your organization doesn’t fall victim. From online banking to the production line, thousands of certificates and keys in every enterprise are the difference between controlling success or failure. In this live webinar, learn how enterprises are using NIST and industry best practices to develop an effective Enterprise Key and Certificate Management strategy. Go to http://www.venafi.com/five-musts-ekcm/ to view the full On Demand Webinar.

TRANSCRIPT

Page 1: Five Must Haves to Prevent Encryption Disasters

1© 2013 Venafi

Prepared for:

5 Must Haves to Prevent Encryption Disasters

Intelligent People

Page 2: Five Must Haves to Prevent Encryption Disasters

2

Agenda

• Brief review of major enterprise key and certificate management challenges

• Best practices…– Preventing downtime– Increasing private key security– Preparing for and responding to CA

compromise• Q&A

© 2013 Venafi

Page 3: Five Must Haves to Prevent Encryption Disasters

3

Certificate and Key Management Challenges

© 2013 Venafi

Certificate Authorities

Page 4: Five Must Haves to Prevent Encryption Disasters

4

Setting Up for SuccessEKCM is Cross-Functional

• Internal Policies• External Regulations• Separation of Duties• Compliance• Reporting

IT Operations

InfoSec

• SLAs• Speed of Deployment• Reporting• Cost of Service

AppOwners

DatacenterManager

• System Availability• Operational Efficiency• Best Practices• Monitoring• Management• Config Automation

Biz Units

• Data Security• Policy Enforcement• Compliance Reporting• Audit Readiness

Auditor

CAManager

Admin

Admin

Admin

Admin

Page 5: Five Must Haves to Prevent Encryption Disasters

5

Roles/Stakeholders

• PKI admin(s)• System administrators• Business application owners• Network team• Auditors• Executives• NOC• SOC• Help desk• …

© 2013 Venafi

Page 6: Five Must Haves to Prevent Encryption Disasters

6

Recipe for Disaster

PKI Admin

System Administrators

© 2013 Venafi

Page 7: Five Must Haves to Prevent Encryption Disasters

7

Preventing Downtime Due to Certificate Expirations

© 2013 Venafi

Page 8: Five Must Haves to Prevent Encryption Disasters

8

Causes of Downtime

© 2013 Venafi

Technical causes:• End entity certificate

expires• Intermediate root

certificate expires• Root certificates not

updated on relying parties

Operational causes:1. Poor inventory, tracking, and

management of certificates• End entity certificates• Intermediate roots• Roots

2. Poor Execution• Correct administrators NOT

notified of impending expiration

• Administrators notified but no action taken

• Renewed certificates not properly installed

• Certificates installed but applications not restarted

Page 9: Five Must Haves to Prevent Encryption Disasters

9

High-level Steps for Preventing Downtime

Create an inventoryCheck for certificates expiring imminently Compile and maintain contact information

for each certificate/keyMonitor for expiration and notifyValidate certificate/key installation and

operationReport

Page 10: Five Must Haves to Prevent Encryption Disasters

10

Establishing a Comprehensive Inventory

Certificate Inventory Database

Agent-based Discovery

Internal & External CAs

AA

A

AA

A

AA

ANetwork

Discovery

Import from CAs

Systems with Certificates

Network Discovery Engines

2

3

1

Individual Import by Admins

4

A - Agents

Page 11: Five Must Haves to Prevent Encryption Disasters

11

Establishing Initial OwnershipNotify Groups

© 2013 Venafi

Certificate Contact

www.abcd.com [email protected]

finance1.abcd.com [email protected]

ecom.abcd.com [email protected]

mktg-4.abcd.com [email protected]

hr1.abcd.com [email protected]

dmz-34.abcd.com [email protected]

acctg.abcd.com [email protected]

pr-fud.abcd.com [email protected]

brain.abcd.com [email protected]

cto.abcd.com [email protected]

Certificate Authorities

Export

Finance

IT

HR

Marketing

ThinkTank

Certificate Contact

www.abcd.com IT

finance1.abcd.com Finance

ecom.abcd.com IT

mktg-4.abcd.com Marketing

hr1.abcd.com HR

dmz-34.abcd.com IT

acctg.abcd.com Finance

pr-fud.abcd.com Marketing

brain.abcd.com ThinkTank

cto.abcd.com IT

Certificate Inventory Database

Import

Turn into Logical Groups

1

2

3Maintain

5Notify

4

Page 12: Five Must Haves to Prevent Encryption Disasters

12

Ongoing Ownership Management• System administrators are regularly reassigned• It is critical to have up-to-date ownership information

for…– Expiration notifications– Notifications in case of compromise or algorithm breakage– Other communications

• Invalid notification is worse than no notification at all

© 2013 Venafi

Reorg

Terminated

Inventory system must enable System Admins to maintain ownership information

Page 13: Five Must Haves to Prevent Encryption Disasters

13

Notify on Expiration

© 2013 Venafi

90 60 30Expired

15 10 5

ReportsExpiring < 15 days

Expiring <30 days

Expiring <90 days

www.venafi.com 2/15/13

ecom.venafi.com 2/17/13

mktg.venafi.com 2/19/13

eng.venafi.com 2/29/13

srv1.venafi.com 3/15/13

srv2.venafi.com 3/17/13

srv3.venafi.com 3/19/13

srvi4.venafi.com 3/29/13

srv5.venafi.com 5/15/13

srv6.venafi.com 6/17/13

EmailsYo!Whassup?

EscalationsCareer limiting…

Page 14: Five Must Haves to Prevent Encryption Disasters

14

x. Old Cert Expires

4. App Reset for New Cert

Expiration Notifications Alone Don’t Cut It

1. Steady State

New Cert

3. New Cert Installed

Application

Old Cert.

© 2013 Venafi

2. New Cert from CA

time

Cert in keystore

Cert in service (e.g. on network)

Renewal Window

Page 15: Five Must Haves to Prevent Encryption Disasters

15

Certificate ExpiringKeystore MismatchNetwork MismatchNotifications

New Cert

Network Mismatch Events

Keystore Mismatch Events

Old Cert Expires

App Uses New Cert

Monitoring and Validation

New Cert from CA

New Cert Installed

Cert Expiration Alerts

90 60 30 days…

Network Validation

Onboard Validation

© 2013 Venafi

Old Cert.

Application

Page 16: Five Must Haves to Prevent Encryption Disasters

16

Private Key Security

© 2013 Venafi

Page 17: Five Must Haves to Prevent Encryption Disasters

17

Server

Putting Private Keys at Risk

© 2013 Venafi

Server

Performance Monitoring

Customer Experience Monitoring

Security Monitoring

Private keys are manually passed to other groups/adminsfor distribution.

Keystore 1 Password = abc123

Keystore passwords are not changed regularly.

Keystore 2Password = abc123

Same password used on multiple keystores.

Admins manually manage private keys, making it possible to copy them.

Private keys and passwords are not changed when adminsleave the organization

Page 18: Five Must Haves to Prevent Encryption Disasters

18

Preventative Measures

• Implement hardware security modules (HSMs)– Considerations:

• Cost (initial and ongoing)• Application compatibility• Migration time

• Intermediation (separate admins from keys)

© 2013 Venafi

Page 19: Five Must Haves to Prevent Encryption Disasters

19

Web Server

Establishing EKCM PoliciesEliminating Admin Access to Keys

© 2013 Venafi

Ensure support for secure distribution

across multiple platforms and store

types.

Provide console for private key and certificate management.• Separate credentials for login• Granular access rights – separation

of duties• No access to private keys unless

required• Dual control (oversight)• Admin entitlement reporting• Audit trail of admin operations

Remove direct administrator access to private keys through

automation. Maintain complete audit log of all

operations.

Page 20: Five Must Haves to Prevent Encryption Disasters

20

Preparing for and Responding to CA

Compromise…and other eventualities

© 2013 Venafi

Page 21: Five Must Haves to Prevent Encryption Disasters

21

SubjectHacker

CA Compromise and Fraudulent Certificate Scenarios

© 2013 Venafi

CA

RA

C

CA System Compromise: Malware or other infiltration used to get fraudulent certificate signed by CA (without getting copy of CA private key).

Impersonation: Trick RA into issuing a fraudulent certificate. A

RA Compromise: Infiltrate RA or steal credentials and authorize fraudulent certificates. B

CA Key Theft: Stolen or derived copy of CA private key is used to issue fraudulent certificates.

DRoot CA

Root CA Compromise: Hacker is able to issue fraudulent certificates from Root CA (via system or signing key compromise).

E

Page 22: Five Must Haves to Prevent Encryption Disasters

22

High Level Considerations

• Preventing CA compromise– Use and maintain high security for CA(s)– Mandate regular audits

• Detecting rogue certificates– Anomaly and fraud detection on all

applications• Replacing certificates after a CA

compromise…

© 2013 Venafi

Page 23: Five Must Haves to Prevent Encryption Disasters

23

Recent Public Certificate Authority & Counterfeit Certificate Incidents

© 2013 Venafi

Year Incidents

2001 • VeriSign issues Microsoft Corporation code signing certificate to a non-Microsoft employee.

2008• Thawte issues certificate for Live.com to non-Microsoft

employee• Comodo issues mozilla.org certificate to Startcom• Organization forges VeriSign RapidSSL certificates

2011

• Comodo issues nine counterfeit certificates (Google, Yahoo, Live, etc.) when registration authority is compromised.

• StartSSL CA compromised• DigiNotar compromised. 531 fraudulent certificates issued.

Dutch government experiences major service outages.• Boeing CA compromised

2012 • Microsoft CA certificates forged by exploiting MD5 (Flame)

2013 • Buster Paper Comercial gets code signing certificate

* Electronic Freedom Foundation uncovers many more unpublicized CA incidents by analyzing CRLs from public CAs

Page 24: Five Must Haves to Prevent Encryption Disasters

24

NIST Alert on CA Compromisehttp://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf

These recent attacks on CAs make it imperative that organizations ensure they are using secure CAs and are prepared to respond to a CA compromise or issuance of a fraudulent certificates.

- NIST, July 2012

These recent attacks on CAs make it imperative that organizations ensure they are using secure CAs and are prepared to respond to a CA compromise or issuance of a fraudulent certificates.

- NIST, July 2012

Page 25: Five Must Haves to Prevent Encryption Disasters

25

CA Compromise & Counterfeit Certificate and Remediation Matrix

© 2013 Venafi

Revoke Counterfeit Certificates

Revoke CA Cert

Replace AllCerts from CA

Remove Root Cert from Relying Parties

A. Impersonation

B. RA Compromise

C. CA System Compromise

D. CA Signing Key Compromise

E. Root CA Compromise

Page 26: Five Must Haves to Prevent Encryption Disasters

26

Detailed Steps for Preparing for & Responding in the Venafi Best Practices Document

© 2013 Venafi

Steps  CA  Subject Relying Party 

a. Revoke all non‐expired certificates issued from the CA and issue a final CRL.       

b. Establish a point of contact or help desk to answer questions and provide support.       

c. Notify all CAs that have been issued certificates from the root CA that those CAs are no longer valid. Ensure they contact the Subjects to whom they have issued certificates that those certificates are no longer valid and must be replaced. 

     

d. Notify vendors of software or systems that include the certificate for the compromised root CA in their product trust stores that the certificate must be removed. 

     

e. Notify all Relying Parties to inform them that the root certificate for the compromised root CA must be removed from their trust stores. This notification may be provided through direct communication or public relations announcements. 

     

f. Notify all Subjects who have been issued certificates from the compromised CA that their certificate will need to be replaced and provide instructions. 

     

g. Replace all certificates from subordinates of the compromised root CA with new certificates from different CAs. For internal CAs, this may involve setting up a new CA. For external CAs, this may involve enrolling for new certificates from a different CA from the same vendor or selecting a different vendor. 

     

h. Inform all potential Relying Parties of the new CA that will be used.       

i. If a new root CA is established, make the root certificate for the new CA available for secure distribution to all potential Relying Parties. 

     

j. If a new root certificate is required to validate certificates, install this root certificate in all necessary trust stores.       

k. As an ongoing precaution, ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to the 

     

Steps  CA  Subject Relying Party 

a. Revoke the certificate of the compromised CA.      

b. Establish a point of contact or help desk to answer questions and provide support.       

c. Notify all Subjects who have been issued certificates from the compromised CA that their certificate will need to be replaced and provide instructions. 

     

d. Notify potential Relying Parties to ensure they are checking for revocation. This notification may be provided through direct communication or public relations announcements. 

     

e. Notify vendors of software or systems used by Relying Parties (e.g. browsers). If the potential use of the fraudulent certificate will have a high impact, it may make sense for software and system vendors to explicitly block the use of the fraudulent certificate. 

     

f. Replace all certificates from the compromised CA with new certificates from a different CA. For internal CAs, this may involve setting up a new CA. For external CAs, this may involve enrolling for new certificates. 

     

g. Inform all potential Relying Parties of the new CA that will be used.       

h. If a new root is required to validate the new certificates, make it available for secure distribution to all potential Relying Parties.       

i. If a new root certificate is required to validate certificates, install this root certificate in all necessary trust stores.       

j. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to the unavailability of the CRL or OCSP responder.)  

     

k. Track the replacement of certificates through the completion of the process.        

 

Steps  CA  Subject Relying Party 

a. Revoke the Fraudulent Certificate      

b. Revoke the credentials of the compromised RA (issuing new credentials if the RA will resume its duties).       

c. Carefully check all logs to ensure that all fraudulent certificates have been identified and revoked.       

d. Notify the Subject(s) of the Fraudulent Certificate(s)      

e. Notify potential Relying Parties to ensure they are checking for revocation. This notification may be provided through direct communication or public relations announcements. 

     

f. Notify vendors of software or systems used by Relying Parties (e.g. browsers). If the potential use of the fraudulent certificate will have a high impact, it may make sense for software and system vendors to explicitly block the use of the fraudulent certificate. 

     

g. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to an unavailable CRL or OCSP responder). 

     

 

Steps  CA  Subject Relying Party 

a. Revoke the Fraudulent Certificate      

b. Notify the Subject of the Fraudulent Certificate      

c. Notify potential Relying Parties to ensure they are checking for revocation. This notification may be provided through direct communication or public relations announcements. 

     

d. Notify vendors of software or systems used by Relying Parties (e.g. browsers). If the potential use of the fraudulent certificate will have a high impact, it may make sense for software and system vendors to explicitly block the use of the fraudulent certificate. 

     

e. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to an unavailable CRL or OCSP responder). 

     

 

Impersonation RA CompromiseCA Key or System Compromise Root CA Compromise

Preparatory Steps  CA  Subject Relying Party 

a. Develop, Communicate, and Track Compliance with Certificate Policies and Procedures : The installation and management of certificates and private keys is generally very distributed within enterprises, where installation and oversight typically falls to the each administrator responsible for the machines and applications where the certificates are deployed.  This increases the possibility that best practices will not be followed. Consequently, it is important to define, communicate, and educate personnel on clear policies and procedures. Recommendations for these policies and procedures are provided in the preparation steps below as well as other best practices from Venafi. 

     

b. Establish and Maintain Certificate Inventory: An important step in preparing for a CA compromise is building a comprehensive inventory of the certificates and private keys deployed in your environment. This includes tracking precisely which CAs are used by which platforms and applications so that appropriate action can be taken if one of them is compromised. A comprehensive inventory also enables you to identify all certificates that need to be replaced in the case of a compromise and to validate that they are actually replaced.   

A good first step in establishing an inventory is requesting a list of issued certificates from your known CAs. However, this may not account for all certificates in use in your environment, as some systems might use other, unknown CAs or self‐signed certificates of which you are not aware. It is often prudent to perform a manual inventory (asking all administrators to report the certificates they are responsible for) or automated inventory (performing automated network and/or file scans to discover certificates).  

 

While creating an inventory, it is critical to identify owners for each certificate and contact information. This enables you to rapidly contact all appropriate owners if a compromise occurs so they can take action. Because certificate deployments and owners change, it is important to implement a system for keeping inventory and ownership information up to date.  

 

You should periodically analyze the collected inventory data. Then 

     

a. Review CA Security and Communications: Once you have a complete list of all CAs in use in your environment—which may involve replacing certificates from unapproved CAs—review the security practices for each CA (internal and external) to assure yourself that the CAs are minimizing the risks of compromise. Review how each CA is monitored for potential compromise and the response and communication plans in place in case of a compromise. Ensure that the CA knows who within your organization to contact. It is important to review the security of your CAs (internal and external) on a periodic basis.   

Ensure that you are not using a root CA to issue end‐entity certificates. If a root is being used to issue end‐entity certificates, replace those certificates with certificates from an Intermediate CA. 

     

b. CA Transition Plan: If a CA is compromised, you must obtain certificates from another CA. It is best to have plans in place for the new CA before a CA compromise occurs. For external CAs, it may good to maintain a relationship with multiple CAs so that contractual relationships are in place prior to a CA compromise event that requires you to move away from a vendor entirely. For internal CAs, implement a plan for rapidly establishing a new CA in the event of a compromise. 

     

c. Education: Responding to a CA compromise involves multiple stakeholders and roles. A response will be more successful if individuals in each of those roles are educated beforehand. Here are some examples: 

a. CA Management Personnel: Provide education on monitoring for compromise events and procedures for taking remedial action (including communication plans) if a compromise occurs. 

b. Certificate Owners (Subjects): Ensure that all certificate owners understand the consequences of a CA compromise and the importance of maintaining up‐to‐date contact information so that they can be notified in case of a compromise. In addition, certificate owners should understand the steps they would take to rapidly replace their certificate(s) if a compromise occurs.  

c. Relying Parties: Ensure that all Relying Parties (i.e. owners of systems that check certificates to authenticate or communicate with other systems) understand the importance of configuring all systems to check revocation status. These checks ensure that systems do not trust certificates that have been revoked by the issuing CA. If revocation checking is interfering with operations, Relying Parties should notify the central PKI organization to determine ways of addressing the issues without disabling the 

     

a. Certificate Replacement Plan: If a CA is compromised, that CA’s certificate must be revoked and all of the certificates issued by the CA become invalid and must be replaced. In environments with large numbers of active certificates, large‐scale replacements can be very disruptive and can cause operations to stop for extended periods of time. Therefore, it is critical to have a well‐defined plan for replacing certificates in a rapid yet orderly fashion.   

An inventory and list of owners serve as the foundation for a rapid response by ensuring that all certificate owners can be contacted when a compromise occurs. Certificate owners must also understand the steps for replacing certificates. However, since many certificate owners do not perform certificate operations frequently, they will likely need assistance. It is therefore important to have a plan for staffing a help desk to handle the large number of support requests as all certificates are replaced. If high priority systems and certificates have been identified during the inventory process, the replacement plan should also include steps for ensuring those certificates are replaced early in the process.  

Finally, it is important to have a method for monitoring the replacement of certificates so that it is clear which systems are not safe, where problems are occurring and when the process is complete. This monitoring and tracking also makes it possible to report back to executives and other stakeholders. A target timeframe should be set for the amount of time required to replace certificates and get systems and business applications back in operation. 

     

b. Root Inventory: Establish an inventory of all roots that are trusted in your organization and establish a plan for replacing them if necessary. This step is important in case a root CA is compromised and a root must no longer be trusted. 

     

 

a. Revocation Checking: Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to an unavailable CRL or OCSP responder). All standard builds and images (e.g. operating systems and applications) should have revocation checking enabled. In addition, wherever possible, application configuration management systems should be used to ensure that revocation checking is not turned off. 

     

b. Overall Response Plan: Organizations must have an overall CA compromise response plan. This plan must identify key points of contact (who should be contacted first in case a compromise is detected), delineate roles and responsibilities, provide a communications plan (to Subjects, Relying Parties, executives, etc.), specify a certificate replacement plan, provide a CA migration plan, and support other elements described in this document. 

     

 

Preparing for a CA Compromise

Page 27: Five Must Haves to Prevent Encryption Disasters

27

Preparing for a CA Compromise

Inventory Server-side and Client-side Certs

© 2013 Venafi

BCreate CA Compromise Response Plan

Establish Backup CA

Plans

E

Enforce Revocation Checking on Relying

Party SystemsI

ADocument Clear Certificate Policies

Review CA Security and

Communications Policies

D

K

C Educate all Stakeholders

F

Inventory Root CAs that are Trusted on

Relying Party Systems J

Ensure only Approved Roots are Trusted

GVerify that

only Approved CAs are used.

Identify Cert Owners (Subjects) and Relying Parties

H

Systems Trusting Certificates

(Relying Parties)

Systems Where Certificates are

Installed (Subjects)

Certificate Owners

CAs

Page 28: Five Must Haves to Prevent Encryption Disasters

28

Track and Report on Progress

Responding to a CA Compromise

EReplace Certificates

Validate That Revocation Checking is Enabled on Relying Party Systems G

I

C

© 2013 Venafi

Notify Subjects, Relying Parties,

and Vendors

D

FRemove/ Replace

Root Certificates

Validate Cert & Root ReplacementH

Establish Clear Understanding of What Occurred (What Type of Compromise, etc.)

A

Activate Help Desk

B

Revoke Certificates & Establish New CA(s)

Page 29: Five Must Haves to Prevent Encryption Disasters

29

The Threat is Evolving

© 2013 Venafi

Attackers stole private keys from two

Taiwanese companies and Adobe to sign

code.

Attackers compromise or dupe certificate authorities

to issue fraudulent certificates for further

attacks.

Attackers exploited MD5 to create a face

Microsoft CA certificate and then

sign code.

Hackers are increasingly targeting public key infrastructure for attacks because it is a broadly used security mechanism.

Poor certificate management practices put you at risk.

CA CompromisesCA Compromises

DuquDuqu FlameFlame

StuxnetStuxnet AdobeAdobe

BusterBuster

Page 30: Five Must Haves to Prevent Encryption Disasters

30

Diagram of PKI Ecosystem

© 2013 Venafi

Root CA

Relying Party

End Entity Certificate

OCSP Responder

CRL Distribution

Point

CRLRegistration Authority

Subject

Issuing CA Certificate

CRL

Root Certificate

IssuingCACA

Page 31: Five Must Haves to Prevent Encryption Disasters

31

Certificate and Key Management Challenges

© 2013 Venafi

Certificate Authorities

Page 32: Five Must Haves to Prevent Encryption Disasters

32

Summary of Best Practices

• Create an inventory• Analyze the inventory and policy

compliance• Compile and maintain ownership

information for each certificate/key• Monitor, validate, and notify• Manage enrollment• Optimize and secure provisioning

– Private Key Management• Educate all stakeholders

Page 33: Five Must Haves to Prevent Encryption Disasters

33© 2013 Venafi. All rights reserved.

Next Steps

• Attend the third part of this webinar series: “Establishing EKCM policies and Ensuring Compliance” Mar 21, 11am EST, 8am PST, 4pm GMT

• Download NIST’s ITL Bulletin: “Preparing for and Responding to CA Compromise”

www.venafi.com/NIST

• Questions?– Paul Turner

[email protected]

Next Steps

• Attend the third part of this webinar series: “Establishing EKCM policies and Ensuring Compliance” Mar 21, 11am EST, 8am PST, 4pm GMT

• Download NIST’s ITL Bulletin: “Preparing for and Responding to CA Compromise”

www.venafi.com/NIST

• Questions?– Paul Turner

[email protected]

Today’s Presentation

NIST ITL Bulletin

Page 34: Five Must Haves to Prevent Encryption Disasters

34© 2013 Venafi

Unpublished Work of Venafi, Inc. All Rights Reserved.

This work is an unpublished work and contains confidential, proprietary, and trade secret information of Venafi, Inc. Access to this work is restricted to Venafi employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Venafi, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.

General Disclaimer

This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Venafi, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Venafi, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Venafi marks referenced in this presentation are trademarks or registered trademarks of Venafi, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

© 2013 Venafi© 2013 Venafi