A company has a corporate infrastructure where end users manage their own certificate keys. Which of the
following is considered the MOST secure way to handle master keys associated with these certificates?
Key escrow with key recovery
Trusted first party
Personal Identity Verification
Trusted third party