Certificate Lifecycle Management Best Practices Guide
Certificate Lifecycle Management Best Practices Guide
15 best practices to
avoid downtime, protect your brand,
maintain compliance, and
avoid data breaches.
Certificate Lifecycle Management Best Practices Guide
Whether it’s SSL/TLS, email signing, code signing, client, device, or IoT certificates, digital certificates are the bedrock of trust
for your organization in the digital age. Mismanaging certificates (and, therefore, mismanaging your organization’s digital trust)
can lead to catastrophic consequences. The purpose of this guide is to help you implement certificate management industry best
practices to avoid similar issues for your organization.
6.7%
Domain Registration
15.5%
Web Hosting
21%
SSL
Source: ResearchandMarkets.com
Imagine if certificates
attended sports games…
If each seat in the world’s
largest stadium (Narendra
Modi Stadium) represented
one digital certificate, that’s
Companies and Organizations Globally Are
still less than half as many Managing More Certificates Than Ever
certificates as the average
How many certificates does the average organization use? A lot. Keyfactor and the Ponemon
organization uses. Institute report that 46% of organizations have between 50,000 and one million internally
trusted digital certificates in use. Another 8% report having more than one million such
certificates within their IT environments.
These are astonishing numbers, particularly when you consider the average number of
internally trusted certificates survey respondents reported having was 267,620. Imagine if
certificates attended sports games. It means that if each certificate took up a seat, it would
require more than double the seating capacity of Narendra Modi Stadium, which is the
world’s largest cricket stadium (located in Ahmedabad, India). This number is in addition to
the average of 1,942 publicly trusted certificates they report having. And each one of those
certificates represents a security risk opportunity for your organization.
Let’s look at it from another way. Companies have an average number of certificates that
falls within the population ranges of several small countries, including French Polynesia
Image Credit
Lucifer Danglinton (284,999). And 17% of surveyed organizations indicate that they have more privately and
The Narendra Modi Stadium publicly trusted certificates in their IT environments than the populations of Maldives
Creative Commons Source
(565,272) and Djibouti (1.025 million).
15 Certificate Management Best Practices
Unless you’re a security organization that’s technically mature and sophisticated, spinning up a proprietary management
solution isn’t ideal, either. This is why many companies opt to use a third-party centralized certificate lifecycle management
(CLM) solution.
Using a centralized CLM tool gives you complete visibility of your certificate management lifecycle and IT environment. This
way, you know
Run discovery scans (internally and externally) on your network to ensure shadow
shadow certificates don’t escape your oversight.
Monitor CT logs for your domains via API and set email notifications to ensure no certificates
slip through the cracks.
When you find a shadow certificate, talk with the requestor to educate them on the proper
procedures to use in the future.
You’re going to find shadow certificates eventually. Scanning frequently (ideally, weekly) ensures you don’t find them
too late.
With great power comes great responsibility. Ensure that you have the right people in place to take these critical functions
and give them — and only them — access to do them.
Start with the lowest-level employee with permissions to fulfill the request. Escalate over the next few hours, days, or weeks
to ensure that things are dealt with in a timely manner. This is especially critical for renewals, to ensure there’s no margin
for downtime due to an expired certificate.
6 Issue All Certificates From a Fully Managed PKI
(Avoid Self-Signed Certificates)
For some organizations, the simplest, most secure option is to always use certificates issued by a publicly trusted certificate
authority, even within your private network. This gives you the certificates you need, issued from a fully audited CA with minimal
management workload.
Whatever you do, never use self-signed certificates. If your company has a use case that requires issuing your own certificates
(for example, a non-existent domain), be sure that you’re issuing certificates from a fully managed private CA that offers:
Certificate logging
Certificate revocation list (CRL)
Issuance policies and auditing
Vulnerability testing
But there are staunch free DV SSL/TLS certificate lovers in the industry. And we get it — who doesn’t like free stuff? What we
also must point out, however, is that they’re also the go-to tools for cybercriminals. PhishLabs reports that 94.5% of domain
phishing attacks used DV SSL/TLS certificates.
Let’s put it another way: Encryption = secure but encryption ≠ safe. It’s only safe if it’s secure, the message integrity is
protected, and you know who’s on the other end of the connection to receive your data.
Bad guys can use these free certificates on their phishing websites to make them look more legitimate. (PhishLabs reports
that nearly 83% of phishing attacks use HTTPS.) But without a way to check your website’s authenticity with verifiable digital
identity, then visitors may not be able to distinguish your website from the imposter’s. That’s bad news for you and your
customers and great news for bad guys everywhere.
When you don’t have to wait two to three days for validation, certificate issuance becomes instant!
9 Automate the Entire Issuance Process
While automatic certificate validation is great, it’s not the only automation you can put to use when it comes to certificate
management. You also can automate other crucial steps in the certificate issuance process:
You can save time by automating these processes via an integration — for example, a pre-built server agent, API, Active Di-
rectory integration, the ACME protocol, and/or a key management tool, etc. But the fun doesn’t end there, though. You can
use automation in other ways as well…
Although the specifics vary from one platform to the next, the concept is the same: install a client on your server and/or endpoint
that will handle everything regarding the installation and configuration of your digital certificates.
This is particularly important when you consider the shifting landscape around SSL/TLS certificate validity periods. In the
past few years, we’ve seen moves to shorten the certificate validity lifecycle. They’ve gone from just over to two years (825
days) to just over a year (398 days). The shorter the periods become, the harder it will be to manage all of your certificates
manually. If even one certificate accidentally falls between the cracks and expires, your organization will be in for a world of
hurt.
If you’re renewing 30 days before expiration, set a notification for 15 days prior. If you get the notification, it means that
something went wrong and you still have two weeks left to address the issue. Renewals aren’t the only reason to set
notifications — you should also set notifications for pending requests, revocations, reissuances, etc.
13 Generate and Review Reports Regularly
Compliance isn’t fun, regardless of your industry. It’s a time-consuming, taxing, and burdensome process that has to be
done. But there is good news: having the right certificate management platform can help you ease this burden, too.
Some certificate management platforms generate comprehensive reports that help you to stay abreast of the following:
When possible, protect your keys by storing them in a secure cryptographic solution such as a key vault or a hardware
security module (HSM). For example, an HSM is an appliance that serves as an isolated, secure place to store keys while
enabling their usage. This way, authorized users can still use the keys as needed without risking their exposure through
direct access. To meet new industry standards, all code signing certificates and keys must be securely generated and
stored on FIPS 140-2 Level 2, Common Criteria EAL 4+ or equivalent compliant physical cryptographic devices or cloud-
based cryptographic storage solutions.
Carefully review your processes and systems to avoid inadvertent disclosure of your private keys. Here are a few ways keys
are accidentally disclosed:
t
s
icing, sp ll with one
icaCteertificnasteAtM
r
’ KI
iled pr
e
ca
r
if e deta a free Meet
e
C I& o y .
PKI & PK | Soluti
ad e fo rm
Re info tabitiasved
y
oduct tions.
P
refoser nun to many solu
I
and pr expep
u e
rts
K
t re
r
r PK s
I
men
P h saonlece, get ac cess.
i
Bp a
es.ofitou
KCoI m
g
ana n tin A ltation
repnre t smeee ns At- e Consu
te M olutio
o m dleifsfere Schedul
P
ica ndith15sa cee.nt S
PKI
& C ertif C I aagnemtw e arfiecatAe Lifecyacnization’s Un rskeofho resur
rc
of
esa ngs
eeti Cs.
h aw
ifoicnasteA
M
t- Aa n
- a
G genm
la
K
t ta ertti
oukeldhn’ou rent m:en
P n
re MapatreSPoKIf& Caetcrthes Your Org
i PKInso
lu tionsn’t shta
hould nitdh u1sa deifsefere
5 frle
e PmK
guprides
taInti&tveSolu
ge guide:
e
a
ri ng s s w r a n a
tio sh itah o
p
pa ee
ely comPKI soluent mee tiang
srcw M
ateh our fr
mn
Com gem
Accuratparing 15 recses tifsicwit
Coe
differ gopf ro eres
com and ion-mhaokuin rs -makinKgI &prCoc e.
at M ratelysearch decista kedecisionuide: P olutions At-
A-Glanc
ne Th
i
Venaf
Accu re yourlin
-
en’tyo ur S crypto
a
g
ement
the O
e ag er in
ould
mlinetream frean
n ur M Pione certificate I
Strea tioSns sh erwtiitfihcaote
Ma
a fi Factor to- , PK
e
V Kn ey ry p & ag ty ement, &
ili
s o lu PKI c&eCs s e r inrcof PaKteI ices ag
PKI pro e de rtific y servI
PioPnrovi ceecuritt, & PKe 2001.
man
ons.
ring king iew X
p a a A ppaV c to r er in a gcy
y, rs
ilitbe e ns sinc soluti
m n-m F ov&id m
e tion
ly co cisio ine
Key erging PprKI tyic&esPKI- m&
Emider ofto agsili
ansoaglu
s.
urate your de eEng erv 01. tion
Acc ne Manag Zoho Prothve creyp urity sp
rs cervisce ceac20e. solu
amli wXform by er einrange cyas
ieat be-a -Stion sin
S tr e A p p
ITVpl v
a id
w id KI- o lu
go ofgfeprsro &tiPons. & s
itylu
Secti thatrgin arageilso
eset
rgin ate Eme so pto
ft w ace.
Sec ongdela Eng certific o e cry ice sp
of
ert icate M amnam ercial by se Zodh onnge th -a-Serv
DigiC ce rt if co rm
oy, fo cu e ra a s
m m ercial d on au
IT plaortfit rs a widINtiG
th o n s.
#1 co y, focuse offe RIColu
thtiorgoit OaBtN. & Pare s
SthM
au
Sec erprise.rgeIC st INFO RMATIof softw
ate
Ent ondBlaAS certific RICIN
G
Sec ercial ns e d
at oNn- AND P
-a
te m lufo tiousATI
cM O
ifica com riSo tyF, OR
ia l cert and BaA uSthICo IN
gl an ce
erc ority .
omm th . SMB
#1 c icate au rovider
if p
cert l trust
a
digit
NG
W
RVIE
OVE Key st
ats
t Names
Produc
model
Pricing
cal
for typi
Pricing ents (see
m
require )
low
key be
er
l custom
Typica
size
Our PKI Buyer’s Guide is a useful resource that explores and compares
several vendors’ managed PKI platforms. This gives you a side-by-side
look at the tools’ prices, features, and support offerings
to help you choose the right solution.
Identify the solution that best fits your goals and budget.
Negotiate the lowest price on your chosen solution.
Implement a best-in-class certificate management solution for your organization.
Like we said at the top: we’ll help you implement a certificate management system that makes your job easier while improving
your company’s security posture, reducing risk, and improving efficiency.
Get started with a free consultation with one of our PKI experts.
We’re partners with several of the industry’s leading certificate authorities and vendors to offer a variety of certificate man-
agement and web security solutions. And now that we’re part of the DigiCert family, our commitment and ability to serve our
customers will also continue to grow.
www.theSSLstore.com/resellers
146 2nd St. N. #201, St. Petersburg, FL 33701 US
©2023 The SSL Store™. A subsidiary of DigiCert, Inc. All rights reserved. www.theSSLstore.com/enterprise
V1.3 JUNE
V1.2 MAY2023
2023