Adobe 22002484 User Guide - Page 241

Protecting digital IDs, Removing sensitive content, Preparing PDFs for distribution

Page 241 highlights

USING ACROBAT 9 STANDARD 236 Security More Help topics "Delete a certificate from trusted identities" on page 224 Protecting digital IDs By protecting your digital IDs, you can prevent unauthorized use of your private keys for signing or decrypting confidential documents. Make sure that you have a procedure in place in the event your digital ID is lost or stolen. How to protect your digital IDs When private keys are stored on hardware tokens, smart cards, and other hardware devices that are password- or PINprotected, use a strong password or PIN. Never divulge your password to others. If you must write down your password, store it in a secure location. Contact your system administrator for guidelines on choosing a strong password. Keep your password strong by following these rules: use eight or more characters; mix uppercase and lowercase letters with numbers and special characters; choose a password that is difficult to guess or hack, but that you can remember without having to write it down; do not use a correctly spelled word in any language, as they are subject to "dictionary attacks" that can crack these passwords in minutes; change your password on a regular basis; contact your system administrator for guidelines on choosing a strong password. To protect private keys stored in P12/PFX files, use a strong password and set your password timeout options appropriately. If using a P12 file to store private keys that you use for signing, use the default setting for password timeout option so that your password is always required. If using your P12 file to store private keys that are used to decrypt documents, make a backup copy of your private key or P12 file so that you can open encrypted documents if you lose your keys. The mechanisms used to protect private keys stored in the Windows certificate store vary depending on what company has provided the storage. Contact the provider to determine how to back up and protect these keys from unauthorized access. In general, use the strongest authentication mechanism available and create a strong password or PIN when possible. What to do if a digital ID is lost or stolen If your digital ID was issued by a certificate authority, immediately notify the certificate authority and request the revocation of your certificate. You should also stop using your private key. If your digital ID was self-issued, destroy the private key and notify anyone to whom you sent the corresponding public key (certificate). Removing sensitive content Preparing PDFs for distribution Before you distribute a PDF, you may want to examine the document for sensitive content or private information that can trace the document to you. Such information may be hidden or not immediately apparent. For example, if you created the PDF, the document metadata likely lists your name as the author. You may also want to remove content that can inadvertently change and modify the document's appearance. JavaScript, actions, and form fields are types of content that are subject to change. If your document doesn't require these items, remove them before you distribute the document. You can use the Examine Document command to find and remove hidden content from a PDF. Last updated 9/30/2011

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380

236
USING ACROBAT 9 STANDARD
Security
Last updated
9
/30/2011
More Help topics
Delete a certificate from trusted identities
” on page
224
Protecting digital IDs
By protecting your digital IDs, you can prevent unauthorized use of your private keys for signing or decrypting
confidential documents. Make sure that you have a procedure in place in the event your digital ID is lost or stolen.
How to protect your digital IDs
When private keys are stored on hardware tokens, smart cards, and other hardware devices that are password- or PIN-
protected, use a strong password or PIN. Never divulge your password to others. If you must write down your
password, store it in a secure location. Contact your system administrator for guidelines on choosing a strong
password. Keep your password strong by following these rules: use eight or more characters; mix uppercase and
lowercase letters with numbers and special characters; choose a password that is difficult to guess or hack, but that you
can remember without having to write it down; do not use a correctly spelled word in any language, as they are subject
to “dictionary attacks” that can crack these passwords in minutes; change your password on a regular basis; contact
your system administrator for guidelines on choosing a strong password.
To protect private keys stored in P12/PFX files, use a strong password and set your password timeout options
appropriately. If using a P12 file to store private keys that you use for signing, use the default setting for password
timeout option so that your password is always required. If using your P12 file to store private keys that are used to
decrypt documents, make a backup copy of your private key or P12 file so that you can open encrypted documents if
you lose your keys.
The mechanisms used to protect private keys stored in the Windows certificate store vary depending on what company
has provided the storage. Contact the provider to determine how to back up and protect these keys from unauthorized
access. In general, use the strongest authentication mechanism available and create a strong password or PIN when
possible.
What to do if a digital ID is lost or stolen
If your digital ID was issued by a certificate authority, immediately notify the certificate authority and request the
revocation of your certificate. You should also stop using your private key.
If your digital ID was self-issued, destroy the private key and notify anyone to whom you sent the corresponding public
key (certificate).
Removing sensitive content
Preparing PDFs for distribution
Before you distribute a PDF, you may want to examine the document for sensitive content or private information that
can trace the document to you. Such information may be hidden or not immediately apparent. For example, if you
created the PDF, the document metadata likely lists your name as the author.
You may also want to remove content that can inadvertently change and modify the document’s appearance.
JavaScript, actions, and form fields are types of content that are subject to change. If your document doesn’t require
these items, remove them before you distribute the document. You can use the Examine Document command to find
and remove hidden content from a PDF.