Certificate chain of trust refers to the list of certificates which start from the certificate you have all the way back to the root CA. There are only a handful of Root CAs that an organization may trust. If we need to trust a certificate, we also need to trust the issuer of that certificate, and the issuer of that certificate, and so on. This goes on until we find the Root CA where its certificate is checked and determined if it is trusted. If the root CA has a valid and trusted certificate, all intermediate CAs and the server’s certificate are automatically deemed valid.

About the Author

Search any posts

A collection of Encryption related products and resources that every organization should have!

Cyber security experts conference 2022

Free Downloads

Datasheet of Encryption Consulting Services

Encryption Consulting is a customer focused cybersecurity firm that provides a multitude of services in all aspects of encryption for our clients.

Download

The Discovery of digital certificates installed on the endpoints of the network would require certificate scanning. Scanning would store details of the certificate such as location, type, health, expiration date, position in the chain of trust, etc. This would help detect flaws in the network and also help in mapping the network infrastructure.

While we can keep track of certificates manually, we would need supplementary materials or files such as spreadsheet which can expose critical data, and can also result in scalability issue where we have to comprehend thousand of endpoints where automation can help.

Certificate Scanning can be automated to scan at a particular time, or can be initiated manually. They can scan network on-premises or the infrastructure on the cloud. The scans can also be customized such as to carry out a specific area of the network, etc. The output can be available on dashboards or can be sent via emails as well.

About the Author

Anish Bhattacharya is a Consultant at Encryption Consulting, working with PKIs, HSMs, creating Google Cloud applications, and working as a consultant with high-profile clients.

Search any posts

A collection of Encryption related products and resources that every organization should have!

Cyber security experts conference 2022

Free Downloads

Datasheet of Encryption Consulting Services

Encryption Consulting is a customer focused cybersecurity firm that provides a multitude of services in all aspects of encryption for our clients.

Download

Let's talk