The Discovery of digital certificates installed on the endpoints of the network would require certificate scanning. Scanning would store details of the certificate such as location, type, health, expiration date, position in the chain of trust, etc. This would help detect flaws in the network and also help in mapping the network infrastructure.
While we can keep track of certificates manually, we would need supplementary materials or files such as spreadsheet which can expose critical data, and can also result in scalability issue where we have to comprehend thousand of endpoints where automation can help.
Certificate Scanning can be automated to scan at a particular time, or can be initiated manually. They can scan network on-premises or the infrastructure on the cloud. The scans can also be customized such as to carry out a specific area of the network, etc. The output can be available on dashboards or can be sent via emails as well.
Digital certificates are used across the Internet to authenticate users exchanging data with one another. Since every legitimate website uses a certificate, certificate management is extremely important. If a certificate were to be stolen and misused, an attacker could pose as another, more legitimate, source and infect a user with malware via their website. The expiration of a certificate of a certificate can result in an outage, causing an organization to lose out on potential customers. These are just a few reasons to learn more about certificate management.
What is Certificate Management?
Certificate management is the process of monitoring, processing, and executing every process in a certificate’s lifecycle. Certificate management is responsible for issuing, renewing, and deploying certificates to endpoints (servers, appliances, devices, etc.) so that network services are uninterrupted. Certificate management should also automate tasks (issuing, renewal, and so on), as well as provide real time status of the infrastructure of the network.
Certificate management helps manage the network and prevent interruptions and downtime, while providing a detailed monitoring of the whole infrastructure. Good certificate management plans should be able to handle any network, even ones with thousands of devices. If a certificate expires or is misconfigured, catastrophic outages all over the network may occur.
What is a Digital Certificate?
Any discussion of certificate management would be incomplete without explaining what a digital certificate is. A certificate, also known as an SSL/TLS certificate, is a digital identifier for users, devices, and other endpoints within a network. Certificates are linked with a public/private key pair and verify that the public key, which is matched with the valid certificate, can be trusted. The main job of a certificate is to ensure that data sent across a connection between a user and a server is kept private. The certificates does this by encrypting and decrypting data as it is sent across the connection. This is achieved through something called an SSL/TLS Handshake.
A TLS Handshake is executed as follows:
The client hello occurs when the client sends a request to the server to communicate. The TLS version, the cipher suites
supported, and a string of random bytes known as the “client random” are included in the hello.
In the server hello, the server acknowledges the client hello. It then ensures it is using a TLS version that is
compatible with the client TLS version, selects a compatible cipher suite from the ones offered by the client, and sends
its certificate, the server random (similar to the client random), and the public key to the client.
The validity of the server’s certificate is first checked by the client through the certificate authority. The certificate authority, or CA, is a
highly trusted entity given the responsibility of signing and generating digital certificates.
The client then encrypts a random string of bytes, called the “Pre-Master String” with the server’s public key and sends
it back to the server. This ensures that only the server can decrypt the key with its own private key, acting as another
level of security.
Session Key Creation
The server decrypts the pre-master key, and then both the client and server create session keys from the client random,
the server random, and the premaster string.
The client and server then send each other messages saying they have finished creating their keys, and they compare keys
with each other. If the session keys match, the TLS Handshake is completed, and the session keys are used to encrypt and
decrypt any data sent between the server and client.
Once created, certificates can be used for authentication of servers, clients, or other devices. Certificates are considered valid for a certain time period, and expire after that time frame. Certificates follow a constant lifecycle which include phases such as creation, renewal, suspension, expiration, and more. If certificates are left to expire, then the certificate holder will no longer be trusted, resulting in a loss of service for the website or device being used. To receive a certificate, a user or website must first go through a certificate authority or sign one themselves.
Certificates can be generated through either a trusted certificate authority or by signing a certificate themselves. Certificate authorities, or CAs, generate certificates for users to be used for TLS/SSL authentication. To ensure a certificate authority can be trusted, the chain of trust of the CA can be followed back to the source CA. A chain of trust is a chain of certificates published by trusted CAs, leading all the way back to the Root CA. To start the process of acquiring a digital certificate, the requestor must send out a Certificate Signing Request (CSR) to the CA. The CSR must have the public key of a key pair created by the requestor, along with information to confirm the identity of the requestor, such as a social security number or driver’s license. Once the requestors identity has been confirmed, the certificate is signed and returned by the CA and can be used for identification of the requestor.
The other option to get a certificate is to create one yourself using the same information, and then to self-sign it. This is used less often, because the identity of the signer cannot be verified with other trusted CAs, thus rendering the self-signed certificate suspicious. Due to this, many will not accept a self-signed certificate, so using a CA to create a certificate is the suggested method.
There are several distinct stages to the certificate lifecycle, which are shown below.
Discovery is the first stage of the certificate lifecycle. In the discovery phase, the network is scanned for
expired, or unusable certificates. This phase also ensures any certificates already in place have been deployed
properly. Certificates with vulnerabilities and other weaknesses can also be detected and fixed or replaced. The
different certificates are commonly inventoried together in this phase to allow for tracking of certificate
grouping of related certificate types.
In this stage the CA creates the certificate itself, or the user purchases a certificate from a trusted CA. The
for the certificate is created and the public key, CSR, and personally identifiable information are sent to the CA
certificate creation. If an organization or user does not have or does not wish to create a chain of trusted CAs,
certificate is purchased instead of being created.
This stage deals with the distribution and installation of the certificate in its proper place. All aspects of
certificate’s configuration are checked in the installation phase, including the key pairs, the cipher suites, and
digital signature. The certificate is then installed onto the appropriate endpoint it was created for, and begins
authentication of that endpoint.
One of the most important stages of the certificate lifecycle is the storing phase. Certificates must be
not reusable by attackers, thus they must be kept in a secure and centralized location. The storing phase can also
inventory the certificates into groups, if inventorying was not done in the discovery phase.
This is the longest phase, where the certificates are monitored throughout the duration of their expiration
the expiration date is reached, or sometimes right before, certain certificate management systems will
renew certificates. If automatic certificate management systems are not being used, then a system administrator
need to monitor the network’s certificates and renew, revoke, or replace any certificate that reaches its
There are benefits to both manual and automatic monitoring, which will be discussed in-depth in the next section,
there are two important benefits which stand above the rest. The biggest benefit of manual monitoring is that if
unexpected issue occurs, then the monitor can react in real time to the problem, whereas an automatic system will
know what to do. On the other hand, an automatic monitor’s biggest benefit is that certificate renewals,
etc. will not be forgotten, which can occur if a human is monitoring certificates for years.
The renewal process of certificates begins once the validity of the certificate has run out. Once the user or
systems decide to renew the certificate, a CSR is resent to the original issuing CA to get the certificate
process occurs as it did with originally creating the certificate, but much more quickly.
If the issuing CA has be decommissioned, a certificate is being misused, or for a host of other reasons, then a
certificate can be revoked. Once revoked, the certificate is placed on a Certificate Revocation List, or CRL, if a
is in use. A CRL is a list of certificates revoked by the CA that should no longer be trusted. If an Issuing CA’s
certificate is on a CRL, then that CA cannot be used in a chain of trust for other CAs or certificates. A downside
using CRLs is that revoked certificates are only published periodically, not every time a certificate is revoked.
issue means a user could renew their certificate with their issuing CA, even though a few hours ago their
was revoked for illegitimate usage.
If a CA’s certificate is revoked or if the certificate owner wishes to move from paid certificates to their own
Key Infrastructure, then the replacement phase occurs. This occurs less often, as it is easier to just renew a
certificate with the original issuing CA.
The certificate lifecycle is not set in stone. Different organizations will have different stages, combine
leave out entire stages entirely. As long as the certificates are discovered, created, stored, monitored, and
then that is considered a certificate lifecycle.
Manual vs Automated Infrastructure
One of the most important parts of a company’s data security policy is the certificate management infrastructure put into place within the organization. A manual infrastructure involves having an employee create a spreadsheet to keep track of validity periods, policies, revocations, and configuration data of all the certificates within the organization. This method will work with a smaller company with an infrastructure only dealing with a few certificates, but many larger companies can have thousands upon thousands of certificates, making manual infrastructures too complicated. The other option is to create an automated certificate lifecycle infrastructure, which is the more common method. Below is a table highlighting the differences between manual and automated certificate management infrastructures.
Handled via a spreadsheet and a user keeping track of all the certificates within the organization
Streamlined and handled automatically; Certificates renewed/replaced/revoked as soon as necessary
Costs many man hours
Less cost and no man hours needed
Must be constantly kept track of by the employee in charge to ensure certificates do not expire
Is constantly watched by the software set up in the infrastructure, allowing for quick renewal or replacement of certificates
Easy and quick to implement; Only a spreadsheet is required
The software must be implemented correctly, or certificates will not be monitored correctly
One of the most important reasons to have a strong, automated certificate management system is if you have your own Public Key Infrastructure (PKI). A PKI is an infrastructure created to authenticate users based on digital certificates. PKIs can encrypt communications as well. The most common PKI is TLS/SSL, which uses both symmetric and asymmetric encryption in securing connections between two users. The core trust of a PKI comes from the certificates traded between the two sides of the connection. Most PKIs use a two layer architecture, which includes a Root CA and an Issuing CA.
Root CA is a certificate authority that is kept offline and creates a certificate for the online Issuing CA. This creates a chain of trust with all certificates issued by the Issuing CA, as the Root CA is kept offline so it is therefore secure from malicious intent. Issuing CAs distribute certificates for end users and devices. The less commonly used three tier architecture for a PKI includes an Intermediate CA between the Root and Issuing CA, which act as a go between for the Root and Issuing CA. The reason automated certificate management is mainly used by PKIs is because it is more secure to create a PKI correctly once and then let the automated services keep the certificates up to date. This cuts down on the cost to the company, the man hours required to keep the PKI running, and human error. Since so many organizations are creating their own PKI, proper certificate management is key to any company’s security plan.
Another reason that so much importance is put onto certificate management is the need for every device and user that is connected to the Internet to have a digital certificate. Whenever a user or a device connects to a website, the authenticity of their digital certificate is checked, along with the certificate of the website. By having a strong chain of trust and a valid certificate, you can go anywhere on the Internet. However, a certificate is invalid or expired, if the user or device that certificate belongs to cannot go to most websites, as a secure connection cannot be established. The same holds true for website certificates. If their digital certificate is invalid, then users will not or cannot use that website, for fear of getting malware or viruses on their device.
One more reason to ensure strong certificate management is so that breaches do not occur in an organization. If a certificate were to be allowed into a network, even though it has untrusted CAs in its chain of trust, then the owner of that certificate could steal sensitive data or otherwise misuse company data for malicious purposes. Also, if the certificates are not stored properly, then an attacker could steal that certificate and pose as a legitimate user, while stealing, changing, or deleting sensitive data.
Other Certificate Uses
There are a number of other uses for digital certificates, which are listed below.
Point of Sales System
Internet of Things Devices
SSH Key Management
Customer Service Websites
Certificate Management with Encryption Consulting
Encryption Consulting provides a variety of services relating to certificate management. We offer PKI assessments,CP/CPS development for PKIs, and PKI Design and Implementation services. Our PKI assessment will assess the current certificate management practices of our customer and help with the development of a strategy and roadmap for certificate management. Our CP/CPS development and PKI design and implementation services provide assistance in creating and implementing all the stages of a PKI, from on-premises to the cloud. We can provide our services via video or in person, at the customer’s behest. We also provide services to help develop and implement certificate management systems into new and current infrastructure.