
Microsoft Cloud PKI with Richard Hicks
RunAs Radio
00:00
Secure Your Private Key: Protect with TPM
Certificates can effectively enhance security, but improper management of private keys poses significant risks. Merely marking a key as non-exportable does not guarantee protection, as local administrative access can circumvent these protections. Tools like Mimikatz can exploit vulnerabilities to extract private keys. To ensure robust authentication—both for users and devices—it's critical to protect private keys using Trusted Platform Module (TPM) technology. By binding keys to devices with TPM, organizations can mitigate the security challenges illustrated by past exploits, such as the Sony incidents, linked to poorly secured private keys.
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.